Abstract
As wireless sensor networks edge closer towards wide-spread deployment, security issues become a central concern. However, the more challenging it becomes to fit the security of WSN into that constrained environment including very limited energy resources, low abilities to resist physical attacks, and lack of feedback mechanisms for abnormal cases off-line. Thus the research of security issues in WSN is very important. The intent of this chapter is to investigate the security related issues in wireless sensor networks. Firstly, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area. Then, the following four aspects are investigated.
-
(1)
The cryptographic mechanisms.
-
(2)
Various keying mechanisms for the key management issue.
-
(3)
A panoramic view and detailed analysis of the trust management.
-
(4)
A set of effective strategies based on protecting location privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Li P, Lin Y P, Zeng W N (2006) Search on security in sensor networks. Journal of Software, 17 (12): 2577–2588.
Chong C Y, Kumar S P (2003) Sensor networks: Evolution, opportunities, and challenges. Proceeding of the IEEE, 91(8): 1247–1256.
Huang L, Liu L (2008) Extended Watchdog Mechanism for Wireless Sensor Networks. Journal of Information and Computing Science, 3(1): 39–48.
Roman R, Zhou J, Lopez J (2005) On the Security of Wireless Sensor Networks. In Proceedings of 2005 ICCSA Workshop on Internet Communications Security, LNCS 3482, pp. 681–690.
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications Anchorage.
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Communications of the ACM, 47(6).
Pathan ASK, Lee H-W, Hong C S (2006) Security in wireless sensor networks: issues and challenges. Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference, 2(20–22).
Nagai C H (2006) Intrusion Detection for Wireless Sensor Networks. Ph.D. Term 2 Paper, The Chinese University of Hong Kong. Department of Computer Science and Engineering. www.cse.cuhk.edu.hk/≈lyu/student/phd/edith/edith term2.pdf. Accessed 19 June, 2011.
Islam M S, Khan R H, Bappy D M (2010) A Hierarchical Intrusion Detection System in Wireless Sensor Networks. IJCSNS International Journal of Computer Science and Network Security, 10(8).
Wood A D, Stankovic J A (2002) Denial of Service in Sensor Networks. Computer, 35(10): 54–62.
Anderson R, Kuhn M (1996) Tamper Resistance a Cautionary Note. In Proceedings of 2nd Usenix Workshop Electronic Commerce, pp. 1–11.
Johnson D B, Maltz D A (1996) Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing, vol. 353, T. Imielinski and H. Korth, eds., Kluwer Academic, pp. 153–181.
Karp B, Kung H T (2000) GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In Proc. of 6th Ann. Int’l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, New York, pp. 243–254.
Perkins C E, Bhagwat P (1994) Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proc. of SIGCOMM, ACM Press, New York, pp. 234–244.
Cheung S, Levitt K N (1997) Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. Proc. Workshop New Security Paradigms, ACM Press, New York, pp. 94–106.
Schuba C L (1997) Analysis of a Denial of Service Attack on TCP. In Proc. of IEEE Symp. Security and Privacy, IEEE Press, Piscataway, N. J., pp. 208–223.
Perrig A, Szewczyk R, Wen V, Culler D, Tygar J D (2001) SPINS: Security protocols for sensor networks. In Proc. of the 7th Annual Int’l Conf. on Mobile Computing and Networks. ACM Press, New York, pp. 189–199.
Zhu S, Setia S, Jajodia S (2003) LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 62–72.
Chan H, Perrig A, Song D (2003). Random key predistribution schemes for sensor networks. In Proc. of the IEEE Symp. on Research in Security and Privacy. IEEE Computer Society, pp. 197–213.
Li P, Lin Y P (2006) Search on security in sensor networks. Journal of Software, 17(12): 2577–2588.
Zhang X Y, Heys H M, Li C (2010) Energy Efficiency of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks. Communications (QBSC), 2010 25th Biennial Symposium on Digital Object Identifier: 10.1109/BSC.2010.5472979
Goldwasser S, Micali S (1984) Probabilistic encryption. Journal of Computer Security, 28: 270–299.
Ren K, Yu S, Lou W, Zhang Y (2009) Multi-user broadcast authentication in wireless sensor networks. IEEE Transactions on Vehicular Technology, 58(8): 4554–4564.
Menezes A J, Van Oorschot P C., Vanstone S A (1996) Handbook of applied cryptology. Retrieved from http:/www.cacr.math.uwaterloo.ca/hac/about/chap10.pdf. Accessed 19 June, 2011.
Shih W, Hu W, Corke P, Overs L (2008) A public key technology platform for wireless sensor networks. In Proceedings of the 6th ACM conference on Embedded Network Sensor Systems, pp. 447–448.
Schmidl G, Rossi F (2010) A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. CNSA 2010, CCIS 89, pp. 452–462. Springer-Verlag, Heidelberg.
Huang Q, Cukier J, Kobayashi H, Liu B D, Zhang J Y (2003) Fast authenticated key establishment protocols for wireless sensor networks. In Proc. of the 2nd ACM Int’l Conf. on Wireless Sensor Networks and Applications. San Diego: ACM press, New York, pp. 141–150.
Szczechowiak P, Oliveira L, Scott M, Collier M, Dahab R (2008) Nanoecc: testing the limits of elliptic curve cryptography in sensor networks. In Proceedings of European Conference on Wireless Sensor Networks (EWSN ′08), pp. 305–320, Springer, New York.
Azarderskhsh R, Reyhani-Masoleh Arash (2011) Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks. EURASIP Journal on Wireless Communications and Networking. Volume 2011, Article ID 893592, 12 pages. DOI: 10.1155/2011/893592.
Malan D J, Welsh M, Smith M D (2004) A public-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography. Retrieved from http://airclic.eecs.har vard.edu/publications/secon04. pdf. Accessed 19 June, 2011.
Crossbow I (2008). Technology MICA2: Wireless measurement system. http://www.xbow.com/Products/Product pdf files/Wireless pdf/6020-0042-04 MICA2.pdf. Accessed 19 June, 2011
Du W L, Wang R H, Ning P (2005) An efficient scheme for authenticating public keys in sensor networks. In Proc. of the 6th ACM Int’l Symp. on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 58–67. ACM press, New York.
Su Z, Lin C, Feng F J, Ren F Y (2007) Key management schemes and protocols for wireless sensor networks. Journal of Software, 18(5): 1218–1231.
Eschenauerl L, Gligor V D (2002) A key-management scheme for distributed sensor networks. In proceedings of the 9th ACM Conference on Computer and Communications Security (CCS’02).
Du W L, Deng J, Han Y H, Chen S G, Varshney P K (2004) A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of IEEE INFOCOM 2004.
Blundo C, Santis A D, Herzberg A, Kutten S, Vaccaro U, Yung M (1992) Perfectly Secure key distribution for dynamic conferences. In Crypto.
Du W L, Ning P (2003) Establishing pairwise keys in distributed sensor networks. CCS’03.
Du W L, Deng J, Han Y S, Varshney P, Katz J, Khalili A (2003) A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks. CCS’03.
Curiac D, Plastoi M (2009) Combined Malicious Node Discovery and Self-Destruction Technique for Wireless Sensor Networks. IEEE DOI 10.1109/ SENSORCOMM.2009.72.
Dong H, Guo Y, Yu Z Q, Chen H (2009) A Wireless Sensor Networks Based on Multiangle Trust of Node. 2009 International Forum on Information Technology and Applications.
Viljanen L (2005) Towards an Ontology of Trust. In Proceedings of the Trust Bus 2005, LNCS 3592, pp. 175–184.
Crosby G V, Pissinou N, Gadze J (2006) A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks. In Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems, pp. 13–22.
Ganeriwal S, Balzano L K, Srivastava M B (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Trans. Sens. Netw. 4, 1–37.
Tang W, Hu J B, Chen Z (2005) Research on a Fuzzy Logic-Based Subjective Trust Management Model. J. Comput. Res. Develop. 42, 1654–1659.
Krasniewski M, Varadharajan P, Rabeler B, Bagchi S, Hu Y C (2005) TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In Proceedings of the 2005 International Conference on Dependable Systems and Networks, pp. 672–681.
Song F, Zhao B H (2008) Trust-Based LEACH Protocol for Wireless Sensor Networks. In Proceedings of the Second International Conference on Future Generation Communication and Networking, pp. 202–207.
Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2003) Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks. In Proceedings of the SenSys, pp. 324–325. Sensors 2011, 111360.
Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-Centric Isolation of Misbehavior and Trust Routing in Energy-Constrained Sensor Networks. In Proceedings of the 23rd IEEE International Performance, Computing, and Communications Conference, pp. 463–469.
Hur J, Lee Y, Hong S M, Yoon H (2005) Trust Management for Resilient Wireless Sensor Networks. In Proceedings of the 8th International Conference on Information Security and Cryptology, pp. 56–68.
Hur J, Lee Y, Yoon H, Choi D, Jun S (2005) Trust Evaluation Model for Wireless Sensor Networks. In Proceedings of the 7th International Conference on Advanced Communication Technology, pp. 491–496.
Almenarez F, Marin A, Diaz D, Sanchez J (2006) Developing a Model for Trust Management in Pervasive Devices. In Proceedings of 4th IEEE Annual International Conference on Pervasive Computing and Communications, pp. 267–271.
Almenarez F, Marin A, Campo C, Garcia R C (2004) PTM: A Pervasive Trust Management Model for Dynamic Open Environments. In Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust.
Almenarez F, Marin A, Campo C, Garcia RC (2005) Trust AC: Trust-based Access Control for Pervasive Devices. In Proceedings of the 2nd International Conference on Security in Pervasive Computing, pp. 225–238.
Hsieh M Y, Huang Y M, Chao H C (2007) Adaptive Security Design with Malicious Node Detection in Cluster-Based Sensor Networks. Comput. Commun. 30, pp. 2385–2400.
Marmol F G, Perez G M (2010) Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Comput. Stand. Interfaces 2010, 32, pp. 185–196.
Lopez J, Roman R, Agudo I, Fernandez C G (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Comput. Commun. 33, pp. 1086–1093.
Li J L, Gu L Z, Yang Y X (2009) A New Trust Management Model for P2P Networks. J. Beijing Univ. Posts Telecommun. 32, pp. 71–74.
Li J L, Gu L Z, Yang Y X (2009) A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. J. Electron. Inf. Technol. 31, pp. 2786–2790.
Li L, Fan L, Hui H (2009) Behavior-Driven Role-Based Trust Management. J. Softw. 20, pp. 2298–2306.
Feng R, Xu X F, Zhou X, Wan J W (2011) A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory. Sensors 2011, 11, pp. 1345–1360; doi:10.3390/s110201345.
Carman D, Kruus P, Matt B (2000) Constraints and approaches for distributed sensor network security. Technical Report #00-010. NAI Labs. http://www.csee.umbc.edu/courses/graduate/CMSC691A/Spring04/papers/nailabsreport00-010final.pdf. Accessed 9 December, 2010.
Yi O, Le Z Y, Chen G, Ford J, Makedon F (2006) Entrapping adversaries for source protection in sensor networks. World of Wireless, Mobile and Multimedia Networks, WoWMoM 2006. International Symposium.
Doumit S, Agrawal D P (2003) Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks. MILCOM 2003—IEEE Military Communications Conf., 22(1): 609–614.
Marti S, Giuli T, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In proc. ACM MobiCom, pp. 255–265.
Khalil I, Bagchi S, Shroff N B (2005) LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In International Conference on Dependable Systems and Networks (DSN), pp. 612–621.
Wang X, Xu J, Wang J (2009) Detection and location of malicious nodes based on source coding and multi-path transmission in WSN. High Performance Computing and Communications, HPCC’ 09. 11th IEEE International Conference.
Wang X, Wong J (2007) An End-to-end Detection of Wormhole Attack in Wireless Ad Hoc Networks. In Proceedings of the 31st Annual International Computer Software and Applications Conference-Vol. 1-(COMPSAC 2007).
R. da Silva A, Martins M, Rocha B (2005) Decentralized Intrusion Detection in Wireless Sensor Networks. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet’ 05), pp. 16–22.
Tseng C-Y, Balasubramanyam P, Ko C, Limprasittiporn R, Rowe J, Levitt K (2003) A specification-based intrusion detection system for AODV. In Proceedings of the 1st ACM workshop on Security of Ad Hoc and sensor networks.
Momani M, Agbinya J, Navarrete G P, Akache M (2006) A New Algorithm of Trust Formation inWireless Sensor Networks. In The 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless’ 06).
Yao Z Y, Kim D Y, Lee I (2005) A security framework with trust management for sensor networks. In Proc. of the 1st IEEE/CREATE-NET Workshop on Security and QoS in Communication Networks Athens. Piscataway, IEEE Computer Society, pp. 190–198.
Yao Z Y, Kim D, Doh Y (2006) PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proc. of the IEEE Int’l Conf. on Mobile Ad Hoc and Sensor Systems (MASS). Piscataway, IEEE Computer Society, pp. 437–446.
Shaikh R A, Jameel H, Lee S, Rajput S, Song Y J (2006) Trust management problem in distributed wireless sensor networks. In Proc. of the RTCSA. Piscataway, IEEE Computer Society, pp. 411–414.
Ryutov T, Neuman C (2007) Trust based approach for improving data reliability in industrial sensor networks. In Etalle S, eds. In Proc. of the IFIP Int’l Federation for Information, 238: 349–365.
Probst M J, Kasera S K (2007) Statistical trust establishment in wireless sensor networks. In Proc. of the Int’l Conf. on Parallel and Distributed Systems. IEEE Computer Society, pp. 1–8.
Agah A, Das S K, Basu K (2004) A game theory based approach for security in wireless sensor networks. In Proc. of the IEEE Int’l Conf. on Performance, Computing and Communications. Piscataway, IEEE Computer Society, pp. 259–263.
Blaze M, Feigenbaum J, Lacy J (2002) Decentralized Trust Management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173.
Ellison C M, Frantz B, Lampson B, Rivest R, Thomas B M, Ylonen T (2010) Simple Public Key Infrastructure Certificate Theory. Retrieved from http://www.ietf.org/ietf/1id-abstracts.txt. Accessed 9 December, 2010.
Li N H, Mitchell J C (2003) RT: A Role-Based Trust-management Framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition, pp. 201–212.
Li N H, Mitchell J C, Winsborough WH (2005) Beyond Proof-of-Compliance: Security Analysis in Trust Management. J. ACM, 52, 474–514.
Josang A, Ismail R (2002) The Beta Reputation System. In proceeding of 15th Bled Electronic Commerce Conference, pp. 17–19.
Srinivasan A, Teitelbaum J, Wu J (2006) Distributed Reputation-based Beacon Trust System. In Proceedings of 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277–283.
Josang A, Ismail R, Boyd C (2007) A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems, pp. 618–644.
Wagner D (2004) Resilient aggregation in Sensor Networks, In Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks, pp. 78–87.
Capkun S, Srivastava M, Cagalj M (2006) Securing localization with hidden and mobile base stations. In INFOCOM 2006.
Lazos L, Poovendran R (2004) SeRLoc: Secure range-independent localization for wireless sensor networks. In ACM WiSe 2004.
Lazos L, Poovendran R, Capkun S (2005) ROPE: Robust position estimation in wireless sensor networks. In IPSN 2005.
Li Z, Trappe W, Zhang Y, Nath B (2005) Robust statistical methods for securing wireless localization in sensor networks. In IPSN 2005.
Liu D, Ning P, Du W (2005) Attack-resistant location estimation in sensor networks. In IPSN 2005.
Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In ACM Wise 2003.
Capkun S, Hubaux J P (2005) Secure positioning of wireless devices with application to sensor networks. In INFOCOM 2005.
Vora A, Nesterenko M (2004) Secure location verification using radio broadcast. In International Conference on Principles of Distributed Systems.
Kamat P, Zhang Y, Trappe W (2005) Enhancing Source-Location Privacy in Sensor Network Routing. In Proc. of IEEE ICDCS’ 05.
Xi Y, Schwiebert L, Shi W (2006) Preserving location privacy in monitoring based wireless sensor networks. In Proceedings of the 2th International Workshop on Security in Systems and Networks (SSN’06). IEEE Computer Society.
Yao J, Wen G (2008) Preserving Source-Location Privacy in Energy Constrained Wireless Sensor Networks. In Proc. of ICDCS 2008 workshops. IEEE Press.
Ozturk C, Zhang Y, Frappe W (2004) Source-location privacy for networks of energy constrained sensors. In Proceedings of 2nd IEEE Workshop off Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS04), pp. 68–72.
Braginsky D, Estrin D (2002) Rumor routing algorthim for sensor networks. In Proceedings of the 1st ACM international workshop on wireless sensor networks and applications.
Eugster P T H, Guerraoui R, Handurukande S B, Kouznetsov P, Kermarrec A-M (2003) Lightweight probabilistic broadcast. ACM Transactions on Computer Systems (TOCS), 21(4): 341–374.
Shao M, Yang Y, Zhu S (2008) Towards Statistically Strong Source Anonymity for Sensor Networks. In Proc. of IEEE INFOCOM’ 08.
Yang Y, Shao M, Zhu S (2008) Towards event source unobservability with minimum network traffic in sensor networks. In Proc. of ACM WiSec’08.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Li, P., Sun, L., Fu, X., Ning, L. (2013). Security in Wireless Sensor Networks. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-36511-9_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36510-2
Online ISBN: 978-3-642-36511-9
eBook Packages: Computer ScienceComputer Science (R0)