Security architectures in wireless sensor network

  • Vandana Bhasin
  • Sushil Kumar
  • P. C. Saxena
  • C. P. Katti
Original Research
  • 1 Downloads

Abstract

Sensor networks are an apt amalgamation of sensing, processing and communication. These networks are formed using tiny inexpensive sensor nodes which have the attributes of low processing power and short radio ranges. They steer themselves to numerous applications and at the same instance, encounter stark energy constraints and face scarce memory resources. The discerning personas of sensor networks also have a direct influence on the hardware design of these nodes. Innumerable hardware platforms like Crossbow, Intel, and IvMote have been fabricated to examine the ideas of the research community and to implement applications in all arenas of science and technology. With so many applications designed in this area, security issues are of paramount importance. In this article, security architectures on the two layers of the network stack—link layer and network layer have been surveyed. The paper surveys the various security requirements for designing a wireless sensor network discussing the architecture of the protocols in comparison with the security primitives of IEEE 802.15.4 standard for wireless sensor network (Shon and Choi in Towards the implementation of reliable data transmission for 802.15.4-based wireless sensor. Ubiquitous intelligence and computing, 5061. Lecture notes in computer science, 363–372, 2008). The paper examines TinySec (Karlof et al. in TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on embedded networked sensor systems, 2004) a standard protocol used in TinyOS; the operating system deployed in sensor networks; and C-Sec (Moh’d et al. in C-Sec: energy efficient link layer encryption protocol for wireless sensor networks. In: Proceedings in consumer communications and networking conference (CCNC), 2012) at the link layer and MiniSec (Luk et al. in iniSec: a secure sensor network communication architecture. In: Proceedings of the 6th international conference on information processing in sensor networks (IPSN ‘07), New York, 2007) and MoteSec-Aware (Tsou et al. in IEEE Trans Wirel Commun 12(6):2817–2829, 2013) at the network layer. The survey focusses on the vulnerabilities dealt by each protocol, their challenges with respect to energy consumption, scalability and availability. It also highlights the challenges that the protocols have not been able to handle because of resource restrictions. It also projects some future research directions in the area of security.

Keywords

Wireless sensor network Security requirements Security protocols 

References

  1. 1.
    Shon T, Choi H (2008) Towards the implementation of reliable data transmission for 802.15.4-based wireless sensor networks. In: Sandnes FE, Zhang Y, Rong C, Yang LT, Ma J (eds) Ubiquitous Intelligence and Computing. UIC 2008. Lecture Notes in Computer Science, vol 5061. Springer, Berlin, HeidelbergGoogle Scholar
  2. 2.
    Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on embedded networked sensor systemsGoogle Scholar
  3. 3.
    Moh’d A, Aslam N, Robertson , Phillips W (2012) C-Sec: energy efficient link layer encryption protocol for wireless sensor networks. In: Proceedings in consumer communications and networking conference (CCNC)Google Scholar
  4. 4.
    Luk M, Mezzour G, Perrig A, Gligor V (2007) MiniSec: a secure sensor network communication architecture. In: Proceedings of the 6th international conference on information processing in sensor networks (IPSN ‘07), New YorkGoogle Scholar
  5. 5.
    Tsou Y-T, Lu C-S, Kuo S-Y (2013) MoteSec-aware: a practical secure mechanism for wireless sensor networks. IEEE Trans Wirel Commun 12(6):2817–2829CrossRefGoogle Scholar
  6. 6.
    Zhou Y, Fang Y, Zhang Y (2008) Securing wireless sensor networks: a survey. IEEE Commun Surv Tutor 10(3):6–28 (third quarter 2008) CrossRefGoogle Scholar
  7. 7.
    Ramesh PS, Emily F, Priya M, Santhi B (2012) Review on security protocols in wireless sensor networks. J Theor Appl Inf Techno 38(1):1–4Google Scholar
  8. 8.
    Cayirci E, Rong C (2008) Security in wireless ad hoc and sensor networks. WileyGoogle Scholar
  9. 9.
    Hac A (2003) Wireless sensor network designs. John Wiley, New YorkCrossRefGoogle Scholar
  10. 10.
    Walters JP, Liang Z, Shi W, Chaudhary V (2007) Wireless sensor network security: a survey. In: Xiao T (ed) Security in distributed, grid, mobile, and pervasive computing. Auerbach Publications, Boca RatonGoogle Scholar
  11. 11.
    Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRefGoogle Scholar
  12. 12.
    Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE (2002) SPINS: security for sensor networks. Wirel Netw 8(5):521–534CrossRefMATHGoogle Scholar
  13. 13.
    Chen X, Makki K, Yen K, Pissinou N (2009) Sensor network security: a survey. IEEE Commun Surv Tutor 11(2):52–73CrossRefGoogle Scholar
  14. 14.
    Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks [Online]. Available: http://digitalcommons.unl.edu/csearticles/84. Accessed 4 Aug 2016
  15. 15.
    Zhu S, Setia S, Jajodia S (2006) LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans Sens Netw 2(4):500–528CrossRefGoogle Scholar
  16. 16.
    Qian Y, Lu K, Tipper D (2007) A design for secure and survivable wireless sensor networks. IEEE Wirel Commun 14(5):30–37CrossRefGoogle Scholar
  17. 17.
    Hill J, Szewczyk R, Woo A, Hollar S, Culler D, Pister K (2000) System architecture directions for networked sensors. ACM SIGOPS Oper Syst Rev 34(5):93–104CrossRefGoogle Scholar
  18. 18.
    Kavitha T, Sridharan D (2010) Security vulnerabilities in wireless sensor networks: a survey. J Inf Assur Secur 5(1):31–44Google Scholar
  19. 19.
    Zia T, Zomaya A (2006) Security issues in wireless sensor networks. In: International conference on systems and networks communications IEEEGoogle Scholar
  20. 20.
    Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security. ACMGoogle Scholar
  21. 21.
    Bhatnagar R, Shankar U (2012) The proposal of hybrid intrusion detection for defence of sync flood attack in wireless sensor network. Int J Comput Sci Eng Surv 3(2):31–38CrossRefGoogle Scholar
  22. 22.
    Yan KQ, Wang SC, Liu CW (2009) A hybrid intrusion detection system of cluster-based wireless sensor networks. In: Proceedings of the international multiconference of engineers and computer scientists (IMECS’09), Hong KongGoogle Scholar
  23. 23.
    Salinas M, Gallegos G, Dduchen SG (2009) Message authentication for wireless sensor networks. In: Proceedings of the international conference on computational and information science 2009. World Scientific and Engineering Academy and SocietyGoogle Scholar
  24. 24.
    Das ML (2009) Two-factor user authentication in wireless sensor networks. IEEE Trans Wirel Commun 8(3):1086–1090CrossRefGoogle Scholar
  25. 25.
    Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654MathSciNetCrossRefMATHGoogle Scholar
  26. 26.
    Koc CK (1994) High-speed RSA implementation. Technical report, RSA Laboratories TR201Google Scholar
  27. 27.
    Wei XY (2005) Key management and link-layer security of wireless sensor networks: energy-efficient attack and defense. PhD thesis, CTIT Ph.D.-thesis Series 05-75, Univ. of TwenteGoogle Scholar
  28. 28.
    Baronti P, Pillai P, Chook VWC, Chessa S, Gotta A, Hu YF (2007) Wireless sensor networks: a survey on the state of the art and the 802.15. 4 and ZigBee standards. Comp Commun 30(7):1655–1695CrossRefGoogle Scholar
  29. 29.
    Saxena M (2007) Security in wireless sensor networks-a layer based classification. Department of Computer Science, Purdue University CERIAS Tech Report 2007-04, PurdueGoogle Scholar
  30. 30.
    Raymond DR, Midkiff SF (2008) Denial-of-service in wireless sensor networks: attacks and defenses. IEEE Pervasive Comput 7(1):74–81CrossRefGoogle Scholar
  31. 31.
    Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315CrossRefGoogle Scholar
  32. 32.
    Pathan A-SK, Lee H-W, Hong CS (2006) Security in wireless sensor networks: issues and challenges. In: Advanced communication technology, 2006. ICACT 2006Google Scholar
  33. 33.
    Boyle D, Newe T (2008) Securing wireless sensor networks: security architectures. J Netw 3(1):65–77Google Scholar
  34. 34.
    IEEE Std. 802.15.4-2003 (2003) New York, IEEE Press: Institute of Electrical and Electronics EngineersGoogle Scholar
  35. 35.
    Lin H (2014) A practical approach to provide security in IEEE 802.15. 4 wireless sensor network. Appl Mech Mater 568:503–507CrossRefGoogle Scholar
  36. 36.
    Roberta D, Dini G, Tiloca M (2011) On experimentally evaluating the impact of security on IEEE 802.15. 4 networks. In: International conference on distributed computing in sensor systems and workshops (DCOSS)Google Scholar
  37. 37.
    Sastry N, Wagner D (2004) Security considerations for IEEE 802.15. 4 networks. In: Proceedings of the 3rd ACM workshop on wireless securityGoogle Scholar
  38. 38.
    Bellovin SM (1996) Problem areas for the IP security protocols. In: Proceedings of the sixth usenix UNIX security symposiumGoogle Scholar
  39. 39.
    Computer Emergency Response Team (CERT) (2001) Weak crc allows last block of idea-encrypted ssh packet to be changed without notice. VU#315308. https://www.kb.cert.org/vuls/id/315308. Accessed 27 July 2017
  40. 40.
    Computer Emergency Response Team (CERT) (2001) Weak crc allows rc4 encrypted ssh1 packets to be modified without notice, January 2001. VU 25309. https://www.kb.cert.org/vuls/id/25309. Accessed 27 July 2017
  41. 41.
    Daidone R, Dini G, Tiloca M (2011) On experimentally evaluating the impact of security on IEEE 802.15. 4 networks. In: International conference on distributed computing in sensor systems and workshops (DCOSS) IEEEGoogle Scholar
  42. 42.
    Oszywa W, Gliwa R (2011) Combining message encryption and authentication. Ann UMCS Inform Cryptogr Data Prot 11(2):61–79Google Scholar
  43. 43.
    Peng J, Fan Y, Jiang F, Zhang X, Lin KC (2009) Communication scheme in trusted sensor network. In: International conference on ultra modern telecommunications & workshops, St. PetersburgGoogle Scholar
  44. 44.
    Yu CM, Lu CS, Kuo SY (2010) Noninteractive pairwise key establishment for sensor networks. IEEE Trans Inf Forensics Secur 5(3):556–569CrossRefGoogle Scholar
  45. 45.
    Yu CM, Lu CS, Kuo SY (2009) A constrained function based message authentication scheme for sensor networks. In: IEEE wireless communications and networking conference. Budapest, 2009Google Scholar

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2018

Authors and Affiliations

  1. 1.Lal Bahadur Shastri Institute of ManagementDelhiIndia
  2. 2.School of Computer and Systems SciencesJawahar Lal UniversityDelhiIndia

Personalised recommendations