TY - JOUR
T1 - An identity based routing path verification scheme for wireless sensor networks
AU - Khan, Haibat
N1 - Haibat Khan received his BE in Avionics Engineering from National University of Sciences and Technology (NUST) of Pakistan in 2005 and his ME in Computer Science and Technology (Major: Information Security) from University of Electronic Science and Technology of China (UESTC) in 2013. He is currently a PhD candidate at the Information Security Group of Royal Holloway, University of London. His research usually focuses on practical applications of cryptography.
PY - 2018
Y1 - 2018
N2 - While the ability to express routing policies in wireless sensor networks (WSNs) has been well-studied, unfortunately, the ability to enforce these policies has not been. The core challenge is that if we assume an adversarial, decentralised, and high-speed environment, then how can the receiving node be sure that the path being announced by the incoming packet is the actual path followed by it? In this paper we describe the networking primitive, called routing path verification (RPV), which serves as a tool to enforce routing policies and presents a solution to the defined core challenge. We assess the security of the proposed RPV construction in a formal way. More significantly we augment a suitable key exchange protocol with our proposed RPV construction, to achieve an overall RPV scheme. We also evaluate the computational, communication and storage overhead of our proposed scheme and the experimental results show that the approach is quite scalable.
AB - While the ability to express routing policies in wireless sensor networks (WSNs) has been well-studied, unfortunately, the ability to enforce these policies has not been. The core challenge is that if we assume an adversarial, decentralised, and high-speed environment, then how can the receiving node be sure that the path being announced by the incoming packet is the actual path followed by it? In this paper we describe the networking primitive, called routing path verification (RPV), which serves as a tool to enforce routing policies and presents a solution to the defined core challenge. We assess the security of the proposed RPV construction in a formal way. More significantly we augment a suitable key exchange protocol with our proposed RPV construction, to achieve an overall RPV scheme. We also evaluate the computational, communication and storage overhead of our proposed scheme and the experimental results show that the approach is quite scalable.
KW - security protocols; routing security;
KW - wireless sensor networks
KW - routing policy control
UR - http://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=ijsnet
U2 - 10.1504/IJSNET.2018.088365
DO - 10.1504/IJSNET.2018.088365
M3 - Article
SN - 1748-1279
VL - 26
SP - 54
EP - 68
JO - International Journal of Sensor Networks
JF - International Journal of Sensor Networks
IS - 1
ER -