Designing Secure Protocols for Wireless Sensor Networks

  • A. Selcuk Uluagac
  • Christopher P. Lee
  • Raheem A. Beyah
  • John A. Copeland
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5258)


Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to aid in the design of secure WSN protocols. Therefore, building upon both the established and the new concepts, envisioned applications, and the experience garnered from the WSNs research, we first review the desired security services (i.e., confidentiality, authentication, integrity, access control, availability, and nonrepudiation) from WSNs perspective. Then, we question which services would be necessary for resource-constrained WSNs and when it would be most reasonable to implement them for a WSN application.


Wireless Sensor Networks Security in Wireless Sensor Networks Security Services for Wireless Sensor Networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks (Elsevier) Journal 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Xbow, Crossbow technology (2008),
  3. 3.
    Akyildiz, I.F., Vuran, M.C., Akan, O.B.: A cross layer protocol for wireless sensor networks. In: Proc. CISS 2006, Princeton, NJ (March 2006)Google Scholar
  4. 4.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Englewood Cliffs (2003)Google Scholar
  5. 5.
    Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks. In: The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam (December 2006)Google Scholar
  6. 6.
    Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6), 38–43 (2004)CrossRefGoogle Scholar
  7. 7.
    ITU. X. 800, Security architecture for open systems interconnection for ccitt applications (1991)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS 2002, pp. 41–47 (2002)Google Scholar
  9. 9.
    Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw. 2(1), 65–93 (2006)CrossRefGoogle Scholar
  10. 10.
    Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine 44(4), 122–130 (2006)CrossRefGoogle Scholar
  11. 11.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireles Networks 8(5), 521–534 (2002)CrossRefzbMATHGoogle Scholar
  12. 12.
    Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: ACM SenSys 2004 (November 2004)Google Scholar
  13. 13.
    Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Elsevier’s AdHoc Networks Journal 5(1), 3–13 (2007)CrossRefGoogle Scholar
  14. 14.
    Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)CrossRefGoogle Scholar
  15. 15.
    Pietro, R.D., Mancini, L., Mei, A., Panconesi, A., Radhakrishnan, J.: How to design connected sensor networks that are provably secure. Securecomm, 89–100 (2006)Google Scholar
  16. 16.
    Hou, H., Corbett, C., Li, Y., Beyah, R.: Dynamic energy-based encoding and filtering in sensor networks. In: Proc. of the IEEE MILCOM (October 2007)Google Scholar
  17. 17.
    Vu, C., Beyah, R., Li, Y.: A composite event detection in wireless sensor networks. In: Proc. of the IEEE IPCCC (April 2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • A. Selcuk Uluagac
    • 1
  • Christopher P. Lee
    • 1
  • Raheem A. Beyah
    • 2
  • John A. Copeland
    • 1
  1. 1.Communications Systems Center, School of Electrical and Computer EngineeringGeorgia Institute of Tehnology, AtlantaGeorgiaUSA
  2. 2.Communications Assurance and Performance GroupGeorgia State UniversityGeorgiaUSA

Personalised recommendations