Skip to main content

WSN Security

  • Chapter
  • First Online:
Wireless Sensor Networks

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

The ubiquitous nature of WSN applications and their access to confidential information, either sensed directly or gained from their environments, makes them attractive targets for unscrupulous individuals to subvert, in an attempt to gain access to the WSNs and/or disrupt the interactions of users with both the networks and subsequently with their environment. Consequently, providing effective security is crucial for the successful adoption and operation of WSNs. We cannot deploy such a critical technology without first addressing the security and privacy challenges to ensure that it does not compromise those whom it is meant to benefit. This chapter provides a general review and categorization of the fundamental security primitives required to establish secure WSNs. The ZigBee security service is introduced as an example. The chapter then discusses Denial of Service (DoS) attacks and defences, focusing on the threat of a DoS attack on a WSN. A framework for increasing the resistance of WSNs to remote DoS threats is introduced, implemented, and evaluated using a WSN based home automation as a case study.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)

    Article  Google Scholar 

  • Chiba, T., Katoh, T., Bista, B.B., Takata, T.: DoS packet filter using DNS information. Proceedings of 20th International Conference on Advanced Information Networking and Applications, Vienna, Austria, April 2006, pp. 6–11

    Google Scholar 

  • Du, X., Chen, H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4), 60–66 (2008)

    Article  MathSciNet  Google Scholar 

  • Elahi, A., Gschwender, A.: ZigBee Wireless Sensor and Control Network. Prentice Hall, NJ (2009)

    Google Scholar 

  • Gill, K., Yang, S.H.: Secure Remote Access for Home Automation Systems’, Measurement + Control, vol. 41(10), pp. 305–309 (2008)

    Google Scholar 

  • Gill, K., Yang, S.H., Yao, F., Lu, X.: A Zigbee-based home automation system. IEEE Trans. Consum. Electron. 55(2), 422–430 (2009)

    Article  Google Scholar 

  • ITU-T.: Security architecture for open systems interconnection for CCITT applications—recommendation X.800. Available at http://www.itu.int/rec/T-REC-X.800-199103-I/en (1991)

  • Kwon, T., Hong, J.: Secure and efficient broadcast authentication in wireless sensor networks. IEEE Trans. Comput. 59(8), 1120–1133 (2010)

    Article  MathSciNet  Google Scholar 

  • Mirkovic, J. Prier, G., Reiher, P.: Source-end DDoS defense. Proceedings of the Second IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA, April 2003, pp. 171–178

    Google Scholar 

  • Mirkovic, J.: D-WARD: Source-end defense against distributed denial-of-service attacks. PhD Thesis in University of California (2003)

    Google Scholar 

  • Ning, P., Liu, A., Du, W.L.: Mitigation DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Netw. 4(1), 1–35 (2008)

    Article  Google Scholar 

  • Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  • Ratul, M., Steven, M.B., Sally, F., John, I., Vern, P., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput. Commun. Rev. 32(3), 62–73 (2002)

    Article  Google Scholar 

  • Ricciato, F., Coluccia, A., D’Alconzo, A.: A review of DoS attack models for 3G cellular networks from a system-design perspective. Comput. Commun. 33(5), 551–558 (2010)

    Article  Google Scholar 

  • Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 208–303

    Google Scholar 

  • Thomer, M.G., Massimiliano, P.: MULTOPS: A data-structure for bandwidth attack detection. Proceedings of 10th Usenix Security Symposium, Washington, D.C., USA, August 2001, pp. 23–29

    Google Scholar 

  • Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)

    Google Scholar 

  • ZigBee Alliance.: ZigBee specification. Available at http://www.zigbee.org. Last Accessed June 2012

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shuang-Hua Yang .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag London

About this chapter

Cite this chapter

Yang, SH. (2014). WSN Security. In: Wireless Sensor Networks. Signals and Communication Technology. Springer, London. https://doi.org/10.1007/978-1-4471-5505-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-5505-8_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-5504-1

  • Online ISBN: 978-1-4471-5505-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics