Skip to main content

An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications

  • Conference paper
Lightweight Cryptography for Security and Privacy (LightSec 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8162))

  • 993 Accesses

Abstract

Security and location privacy in wireless sensor networks has drawn a lot of attention in recent years. Yet, the existing solutions are not likely to bring an optimal security/cost trade-off for real networks. They target a single attacker model and static application scenario requirements. However, both the attacker model and the requirements may evolve during the network lifetime. We propose an adaptive security architecture that allows for a dynamic adjustment of a security/cost trade-off. It consists of five security levels, each targeting a different attacker model. The security levels deploy both existing and novel security and privacy mechanisms. We also introduce a novel lightweight scheme for the dynamic security level interchange. The proposed architecture targets a particular application scenario where both traditional security and location privacy are concerned.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: IFIP/IEEE International Symposium on Integrated Network Management, IM 2009, pp. 315–318 (June 2009)

    Google Scholar 

  2. Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216–230 (2006)

    Article  Google Scholar 

  3. Jiang, X., Liang, C.-J.M., Chen, K., Zhang, B., Hsu, J., Liu, J., Cao, B., Zhao, F.: Design and evaluation of a wireless magnetic-based proximity detection platform for indoor applications. In: Proceedings of the 11th International Conference on Information Processing in Sensor Networks, IPSN 2012, pp. 221–232. ACM, New York (2012)

    Chapter  Google Scholar 

  4. Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. Journal of Information Assurance and Security 4, 582–603 (2009)

    Google Scholar 

  5. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location privacy in sensor network routing. In: ICDCS 2005, pp. 599–608. IEEE Computer Society, Washington, DC (2005)

    Google Scholar 

  6. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, pp. 162–175. ACM, Baltimore (2004)

    Chapter  Google Scholar 

  7. Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, pp. 142–163. IOS Press (2008)

    Google Scholar 

  8. Kůr, J., Matyáš, V., Stetsko, A., Švenda, P.: Attack detection vs. Privacy – how to find the link or how to hide it? In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols XIX. LNCS, vol. 7114, pp. 189–199. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  10. Luk, M., Mezzour, G., Perrig, A., Gligor, V.: Minisec: A secure sensor network communication architecture. In: 6th International Symposium on Information Processing in Sensor Networks, IPSN 2007, pp. 479–488 (April 2007)

    Google Scholar 

  11. Luk, M., Perrig, A., Whillock, B.: Seven cardinal properties of sensor network broadcast authentication. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 147–156. ACM, New York (2006)

    Chapter  Google Scholar 

  12. Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 314–323 (October 2007)

    Google Scholar 

  13. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  14. Rios, R., Lopez, J.: Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. The Computer Journal 54(10), 1603–1615 (2011)

    Article  Google Scholar 

  15. Ruiz, L.B., Nogueira, J.M.S., Loureiro, A.A.F.: MANNA: a management architecture for wireless sensor networks. IEEE Communications Magazine 41(2), 116–125 (2003)

    Article  Google Scholar 

  16. Xue, Q., Ganz, A.: Runtime security composition for sensor networks (SecureSense). In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol. 5, pp. 2976–2980 (October 2003)

    Google Scholar 

  17. Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kůr, J., Matyáš, V. (2013). An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications. In: Avoine, G., Kara, O. (eds) Lightweight Cryptography for Security and Privacy. LightSec 2013. Lecture Notes in Computer Science, vol 8162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40392-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40392-7_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40391-0

  • Online ISBN: 978-3-642-40392-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics