Advertisement

Journal of Network and Systems Management

, Volume 20, Issue 3, pp 417–452 | Cite as

Configuration Tool for a Wireless Sensor Network Integrated Security Framework

  • Victor Cionca
  • Thomas Newe
  • Vasile Teodor Dădârlat
Article

Abstract

Wireless Sensor Networks (WSNs) will benefit from security frameworks that provide easy to use security while hiding inherent complexity. In comparison to traditional networks, the hardware constraints of wireless sensors demand that network security be configured based on application parameters, in order to provide the desired level of security while efficiently using available resources. Such a security framework is discussed in this paper, with special focus on security configuration, where a configuration methodology is presented in detail. The methodology is implemented as a Java tool with SQLite database backing, and to prove its validity, a sample application is presented and tested. Also, experimental proofs are provided to support the methodology, and the general necessity of configuring security for WSN applications.

Keywords

Wireless sensor networks Security framework Security configuration 

Notes

Acknowledgments

The authors wish to thank the following for their financial support: the Embark Initiative and Intel, who fund this research through the Irish Research Council for Science, Engineering and Technology (IRCSET) postgraduate Research Scholarship Scheme. Also, many thanks go to the anonymous reviewers for their most valuable comments that helped complete this paper.

References

  1. 1.
    Zhu, S., Setia, S., and Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM, New York, NY, USA (2003)Google Scholar
  2. 2.
    Prasad, N.R., Alam, M.: Security framework for wireless sensor networks. Wirel. Pers. Commun. 37, 455–469 (2006)CrossRefGoogle Scholar
  3. 3.
    Law, Y.W., Havinga, P.J.M.: How to secure a wireless sensor network. Intelligent sensors, sensor networks and information processing conference, 2005. In: Proceedings of the 2005 International Conference on Dec., pp. 89–95 (2005)Google Scholar
  4. 4.
    Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible security synthesis for wireless sensor networks. In: MidSens ’08: Proceedings of the 3rd International Workshop on Middleware for Sensor Networks, pp. 19–24. ACM, New York, NY, USA (2008)Google Scholar
  5. 5.
    Peter, S., Piotrowski, K., Langendorfer, P.: In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. In: Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, pp. 778–785 (2008)Google Scholar
  6. 6.
    Jinwala, D., Patel, D., Dasgupta, K.: Configurable link layer security architecture for wireless sensor networks. J. Inform. Assur. Sec. 4(4), 582–603 (2009)Google Scholar
  7. 7.
    de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: Integrated Network Management, 2009. IM’09. IFIP/IEEE International Symposium, pp. 315–318 (2009)Google Scholar
  8. 8.
    Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, Chap. 6, pp. 142–163. IOS Press (2008)Google Scholar
  9. 9.
    Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security (final). DARPA Project report (cryptographic technologies group, trusted information system, NAI Labs) (2000)Google Scholar
  10. 10.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162–175. ACM, New York, NY, USA (2004)Google Scholar
  11. 11.
    Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: IPSN ’07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 479–488. ACM, New York, NY, USA (2007)Google Scholar
  12. 12.
    Singh, K., Muthukkumarasamy, V.: Analysis of proposed key establishment protocols in multi–tiered sensor networks. J. Netw. 3, 13 (2008)CrossRefGoogle Scholar
  13. 13.
    Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey, pp. 05–07. Rensselaer Polytechnic Institute, Troy, New York (2005) (technical report)Google Scholar
  14. 14.
    Chipcon, CC2420 datasheet rev 1.2. Tech. rep. (2004)Google Scholar
  15. 15.
    Hu, W., Corke, P., Shih, W., Overs, L.: secfleck: A public key technology platform for wireless sensor networks. Wireless Sensor Networks Book Series. Lecture Notes in Computer Science, vol. 5432, pp. 296–311. Springer, Berlin/Heidelberg (2009). ISBN: 978-3-642-00223-6Google Scholar
  16. 16.
    Becher, E., Benenson, Z., Dornseif, M.: Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC), pp. 104–118 (2006)Google Scholar
  17. 17.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of 2003 IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska, pp. 113–127 (2003)Google Scholar
  18. 18.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8, 521–534 (2002)zbMATHCrossRefGoogle Scholar
  19. 19.
    Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Information Processing in Sensor Networks, 2008. IPSN ’08. International Conference, pp. 245–256 (2008)Google Scholar
  20. 20.
    Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S. C.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. In: Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference, pp. 247–256 (8–12 March 2005)Google Scholar
  21. 21.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS ’02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York, NY, USA (2002)Google Scholar
  22. 22.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP ’03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC, USA (2003)Google Scholar
  23. 23.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM, New York, NY, USA (2003)Google Scholar
  24. 24.
    ZigBee Alliance, Zigbee specification v1.0 (2004)Google Scholar
  25. 25.
    Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Cryptogr. 28(2), 119–134 (2003)MathSciNetzbMATHCrossRefGoogle Scholar
  26. 26.
    Clark, J., Jacob, J.: A survey of authentication protocol literature. http://cs.york.ac.uk/jac/papers/drareview.ps.gz (1997)
  27. 27.
    OpenSSL website. http://www.openssl.org/
  28. 28.
    Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw 2, 65–93 (2006)CrossRefGoogle Scholar
  29. 29.
    Levis, P., Gay, D., Handziski, V., Hauer, J.-H., Greenstein, B., Turon, M., Hui, J., Klues, K., Sharp, C., Szewczyk, R., Polastre, J., Buonadonna, P., Nachman, L., Tolle, G., Culler, D., Wolisz, A.: Berlin, Technische Universität, Crossbow Inc., Arched Rock Corporation, T2: A second generation OS for embedded sensor networks. Tech. rep. (2005)Google Scholar
  30. 30.
    Realtime Technologies LTD, Shimmer—wireless sensor platform. http://www.shimmer-research.com/wp-content/uploads/2010/08/Shimmer-2R-Capabilities-Overview.pdf (2010)
  31. 31.
    Dishongh, T.J., McGrath, M.: Wireless sensor networks for healthcare applications, chap. 7. Artech House Publishers (2010)Google Scholar
  32. 32.
    Burrows, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)CrossRefGoogle Scholar
  33. 33.
    De Decker, B., Piessens, F.: Cryptolog: a theorem prover for cryptographic protocols. In; DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, USA, September (1997)Google Scholar
  34. 34.
    Thouvenin, R.: Implementing and Evaluating the Dynamic Manet On-demand Protocol in Wireless Sensor Networks. Master’s thesis, University of Aarhaus (2007)Google Scholar
  35. 35.
    Ganesan, D., Krishnamachari, B., Woo, A., Culler, D., Estrin, D., Wicker, S.: Complex behavior at scale: an experimental study of low-power wireless sensor networks. UCLA Computer Science Technical Report UCLA/CSD-TR 02-0013 (2002)Google Scholar
  36. 36.
    NIST (National Institute of Standards and Technology), Special publication 800-57 part1. Tech. rep. (2007)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2011

Authors and Affiliations

  • Victor Cionca
    • 1
  • Thomas Newe
    • 1
  • Vasile Teodor Dădârlat
    • 2
  1. 1.Department of Electronic and Computer EngineeringUniversity of LimerickLimerickIreland
  2. 2.Department of Computer ScienceTechnical University of Cluj-NapocaCluj-NapocaRomania

Personalised recommendations