Wireless Personal Communications

, Volume 37, Issue 3–4, pp 455–469 | Cite as

Security Framework for Wireless Sensor Networks

  • Neeli R. Prasad
  • Mahbubul Alam


Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.

One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.

With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).

This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users.


wireless sensor network security framework authentication SNEP 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    N. Prasad, Adaptive Security for Heterogeneous Networks, Ph.D. Thesis, 2004.Google Scholar
  2. 2.
    S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, “A Security Architecture for Mobile Wireless Sensor Networks”, Security in Ad-hoc and Sensor Networks: First European Workshop (ESAS 2004) Heidelberg, Germany, August 6, 2004.Google Scholar
  3. 3.
    Ed Callaway et al., “Home Networking with 802.15.4: A Developing Standard for Low-Rate Wireless Personal Area Networks”, IEEE Communication Magazine, August 2002.Google Scholar
  4. 4.
    F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, Vol. 40, No. 8, pp. 102–114, August 2002.CrossRefGoogle Scholar
  5. 5.
    A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E Culler, “SPINS: Security Protocols for Sensors Networks”, Wireless Networks 8, Kluwer Academic Publishers, pp. 521–534, 2002.Google Scholar
  6. 6.
    G. Frey and H.G. Ruck, “The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems”, IEEE Trans. Inform. Theory, Vol. 45, No. 5, 1717–1719, 1999.MathSciNetCrossRefGoogle Scholar
  7. 7.
    N.P. Smart, “An Identity Based Authenticated key Agreement Protocol Based on the Weil Pairing”, Electronics Letters, Vol. 38, pp. 630–632, 2002.CrossRefGoogle Scholar
  8. 8.
    L. Chen and C. Kudla “Identity Based Authenticated Key Agreement Protocols from Pairings”, HP Laboratories, Bristol, February 12th, 2003.Google Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  1. 1.Center of Tele-InFrastructure (CTIF)Aalborg UniversityAalborgDenmark

Personalised recommendations