Advertisement

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

  • Javier Lopez
  • Rodrigo Roman
  • Cristina Alcaraz
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5705)

Abstract

As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Intrusion Detection System Security Threat 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Petersen, S., Carlsen, S.: Wireless Sensor Networks: Introduction to Installation and Integration on an Offshore Oil & Gas Platform. In: Proceedings of the 19th Australian Conference on Software Engineering (ASWEC 2008), Perth, Australia (March 2008)Google Scholar
  2. 2.
    European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
  3. 3.
    Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46–57. Urbana-Champaign, USA (2005)Google Scholar
  4. 4.
    Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)CrossRefGoogle Scholar
  5. 5.
    Law, Y.W., Palaniswami, M., Van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks 5(1), 6:1–6:38 (2009)CrossRefGoogle Scholar
  6. 6.
    Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing 7(1), 74–81 (2008)CrossRefGoogle Scholar
  7. 7.
    Pongaliur, K., Abraham, Z., Liu, A.X., Xiao, L., Kempel, L.: Securing Sensor Nodes Against Side Channel Attacks. In: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE 2008), Nanjing, China, December 2008, pp. 353–361 (2008)Google Scholar
  8. 8.
    Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  9. 9.
    Goodspeed, T.: Wireless Sensor Networks as an Asset and a Liability. In: Proceedings of the SOURCE Conference, Boston, USA (March 2009)Google Scholar
  10. 10.
    Francillon, A., Castelluccia, C.: Code Injection Attacks on Harvard-Architecture Devices. In: Proceedings of the 15th ACM conference on Computer and communications security (CCS 2008), Alexandria, USA, October 2008, pp. 15–26 (2008)Google Scholar
  11. 11.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the IEEE 3rd International Workshop on Information Processing in Sensor Networks (IPSN 2004), Berkeley, USA, April 2004, pp. 259–268 (2004)Google Scholar
  12. 12.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure. Ad-Hoc Networks 1(2-3), 293–315 (2003)CrossRefGoogle Scholar
  13. 13.
    Manzo, M., Roosta, T., Sastry, S.: Time Synchronization Attacks in Sensor Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, USA, November 2005, pp. 107–116 (2005)Google Scholar
  14. 14.
    Shnayder, V., Hempstead, M., Chen, B., Allen, G.W., Welsh, M.: Simulating the Power Consumption of Large-Scale Sensor Network Applications. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, USA, August 2004, pp. 188–200 (2004)Google Scholar
  15. 15.
    Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-driven Perspective on Wireless Sensor Network Security. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, Torremolinos, Spain, pp. 1–8 (2006)Google Scholar
  16. 16.
    Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible Security Synthesis for Wireless Sensor Networks. In: Proceedings of the 3rd international Workshop on Middleware for Sensor Networks, Leuven, Belgium, pp. 19–24 (2008)Google Scholar
  17. 17.
    Roman, R.: Application-driven Security in Wireless Sensor Networks. Ph.D. Thesis, University of Malaga (June 2008)Google Scholar
  18. 18.
    Healy, M., Newe, T., Lewis, E.: Wireless Sensor Node Hardware: A Review. In: Proceedings of IEEE SENSORS 2008, Lecce, Italy, October 2008, pp. 621–624 (2008)Google Scholar
  19. 19.
    Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: An Operating System for Sensor Networks. In: On Ambient Intelligence. Springer, Heidelberg (2005)Google Scholar
  20. 20.
    Dutta, P., Taneja, J., Jeong, J., Jiang, X., Culler, D.: A Building Block Approach to Sensornet Systems. In: Proceedings of the Sixth ACM Conference on Embedded Networked Sensor Systems (SenSys 2008), Raleigh, USA, November 2008, pp. 267–280 (2008)Google Scholar
  21. 21.
    Seah, W.K.G., Eu, Z.A., Tan, H.-P.: Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) - Survey and Challenges. In: Proceedings of CTIF Wireless VITAE 2009, Aalborg, Denmark (May 2009)Google Scholar
  22. 22.
    Penella, M.T., Gasulla, M.: A Review of Commercial Energy Harvesters for Autonomous Sensors. In: Proceedings of IEEE Instrumentation and Measurement Technology Conference Proceedings (IMTC 2007), Warsaw, Poland, May 2007, pp. 1–5 (2007)Google Scholar
  23. 23.
    Crossbow Technology, Inc. eKo Pro Precision Agriculture, http://www.xbow.com/eko/ (retrieved on June 2009)
  24. 24.
    Galindo, D., Roman, R., Lopez, J.: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 120–132. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  25. 25.
    Camtepe, S.A., Yener, B.: Key Management in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam (2008)Google Scholar
  26. 26.
    Stajano, F., Cvrcek, D., Lewis, M.: Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 460–478. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  27. 27.
    Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 166–178. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  28. 28.
    ECRYPT Network of Excellence. eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/ (retrieved on June 2009)
  29. 29.
    European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
  30. 30.
    Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41–49 (2004)CrossRefGoogle Scholar
  31. 31.
    Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks Jounal (Elsevier) 3(3), 257–279 (2005)CrossRefGoogle Scholar
  32. 32.
    Heidemann, J., Wei, Y., Wills, J., Syed, A., Yuan, L.: Research Challenges and Applications for Underwater Sensor Networking. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, USA, April 2006, vol. 1, pp. 228–235 (2006)Google Scholar
  33. 33.
    Akyildiz, I.F., Stuntebeck, E.P.: Wireless Underground Sensor Networks: Research Challenges. Ad Hoc Networks Journal 4(6), 669–686 (2006)CrossRefGoogle Scholar
  34. 34.
    Vuran, M.C., Akyildiz, I.F.: Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 226–230 (2008)Google Scholar
  35. 35.
    Hanson, M.A., Powell, H.C., Barth, A.T., Ringgenberg, K., Calhoun, B.H., Aylor, J.H., Lach, J.: Body Area Sensor Networks: Challenges and Opportunities. IEEE Computer 42(1), 58–65 (2009)CrossRefGoogle Scholar
  36. 36.
    Ullah, S., Higgin, H., Siddiqui, M.A., Kwak, K.S.: A Study of Implanted and Wearable Body Sensor Networks. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS, vol. 4953, pp. 464–473. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  37. 37.
    Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: Wireless multimedia sensor networks: A survey. IEEE Wireless Communications 14(6), 32–39 (2007)CrossRefGoogle Scholar
  38. 38.
    Di Pietro, R., Mancini, L.V., Spognardi, A., Soriente, C., Tsudik, G.: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Hong Kong, China, March 2008, pp. 185–194 (2008)Google Scholar
  39. 39.
    Albano, M., Brogi, A., Popescu, R., Diaz, M., Dianes, J.A.: Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements. In: Proceedings of the 2nd Workshop on Requirements and Solutions for Pervasive Software Infrastructures (RSPSI 2007), Innsbruck, Austria, September 2007, pp. 1–6 (2007)Google Scholar
  40. 40.
    Roman, R., Alcaraz, C., Sklavos, N.: On the Hardware Implementation Efficiency of Cryptographic Primitives. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7Google Scholar
  41. 41.
    Didla, S., Ault, A., Bagchi, S.: Optimizing AES for Embedded Devices and Wireless Sensor Networks. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008), Innsbruck, Austria (March 2008)Google Scholar
  42. 42.
    Jun Choi, K., Song, J.-I.: Investigation of Feasible Cryptographic Algorithms for Wireless Sensor Network. In: Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT 2006), Phoenix Park, Korea (February 2006)Google Scholar
  43. 43.
    Mantin, I.: Analysis of the Stream Cipher RC4. Master’s Thesis, Weizmann Institute of Science (2001)Google Scholar
  44. 44.
    Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: Proceedings of the International Symposium on Industrial Embedded Systems (SIES 2008), Montpellier, France, June 2008, pp. 58–66 (2008)Google Scholar
  45. 45.
    Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, St. Louis, USA, April 2008, pp. 245–256 (2008)Google Scholar
  46. 46.
    Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote. IEICE Transactions on Info and Systems E91-D(5), 1338–1347 (2008)Google Scholar
  47. 47.
    Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing based Cryptography to Wireless Sensor Networks. In: Proceedings of the 2nd ACM conference on Wireless Network Security (WiSec 2009), Zurich, Switzerland, March 2009, pp. 1–12 (2009)Google Scholar
  48. 48.
    Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and Modeling Encryption Overhead for Sensor Network Nodes. In: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA 2003), San Diego, USA, September 2003, pp. 151–159 (2003)Google Scholar
  49. 49.
    Wang, X.: Recent Progress on SHA-1. Rump Session, Crypto 2005 (2005)Google Scholar
  50. 50.
    NIST hash function competition, http://www.nist.gov/hash-competition (retrieved on June 2009)
  51. 51.
    Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), Washington, DC, USA, November 2002, pp. 41–47 (2002)Google Scholar
  52. 52.
    Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 8(2), 228–258 (2005)CrossRefGoogle Scholar
  53. 53.
    Camtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)CrossRefGoogle Scholar
  54. 54.
    Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)CrossRefGoogle Scholar
  55. 55.
    Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Berlin, Germany, October 2004, pp. 206–215 (2004)Google Scholar
  56. 56.
    Seshadri, A., Luk, M., Perrig, A.: SAKE: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 372–385. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  57. 57.
    Panja, B., Madria, S., Bhargava, B.: Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), Taichung, Taiwan (June 2006)Google Scholar
  58. 58.
    Acs, G., Buttyan, L.: Secure Routing in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7Google Scholar
  59. 59.
    Routing Over Low power and Lossy networks (ROLL) Working Group. Internet Engineering Task Force (IETF), http://www.ietf.org/html.charters/roll-charter.html (retrieved on June 2009)
  60. 60.
    Alzaid, H., Foo, E., Nieto, J.G.: Secure Data Aggregation in Wireless Sensor Network: a Survey. In: Proceedings of the Australasian Information Security Conference 2008: Conferences in Research and Practice in Information Technology (CRPIT), Wollongong, NSW, Australia, March 2008, pp. 93–105 (2008)Google Scholar
  61. 61.
    Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.comnet.2009.02.023
  62. 62.
    Boukerche, A., Turgut, D.: Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14(5), 64–69 (2007)CrossRefGoogle Scholar
  63. 63.
    Yang, Y., Sun, Y.: Securing Time-synchronization Protocols in Sensor Networks: Attack Detection and Self-healing. In: Proceedings of the IEEE 2008 Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008, pp. 1–6 (2008)Google Scholar
  64. 64.
    Ganeriwal, S., Popper, C., Capkun, S., Srivastava, M.B.: Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 11(4) (July 2008)Google Scholar
  65. 65.
    Giannetsos, T., Krontiris, I., Dimitriou, T., Freiling, F.C.: Intrusion Detection in Wireless Sensor Networks. In: On Security in RFID and Sensor Networks. Auerbach Publications, CRC Press (2009) ISBN: 978-1420068-399Google Scholar
  66. 66.
    Roman, R., Lopez, J., Gritzalis, S.: Situation Awareness Mechanisms for Wireless Sensor Networks. IEEE Communications Magazine 46(4), 102–107 (2008)CrossRefGoogle Scholar
  67. 67.
    Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-Location Privacy for Networks of Energy-Constrained Sensors. In: Proceedings of the 2004 IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004), Vienna, Austria (May 2004)Google Scholar
  68. 68.
    Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: Behaviour-based, certificate-based and a combinational approach. International Journal System of Systems Engineering 1(1/2), 128–148 (2008)CrossRefGoogle Scholar
  69. 69.
    Roman, R., Fernandez-Gago, M.C., Lopez, J., Chen, H.-H.: Trust and Reputation Systems for Wireless Sensor Networks. In: On Security and Privacy in Mobile and Wireless Networking. Troubador Publishing Ltd. (2009) ISBN: 978-1905886-906Google Scholar
  70. 70.
    Na, L., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey. Ad Hoc Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.adhoc.2009.04.009
  71. 71.
    Yasinsac, A.: Remote Attestation - Identification. On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7Google Scholar
  72. 72.
    Sang, L., Arora, A.: Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 2137–2145 (2008)Google Scholar
  73. 73.
    Danev, B., Capkun, S.: Physical-layer Identification of Wireless Sensor Nodes. Technical Reports 604, ETH Zürich, System Security Group D-INFK (August 2008)Google Scholar
  74. 74.
    Peerenboom, J.P., Fisher, R.E.: Analyzing Cross-Sector Interdependencies. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), Hawaii, USA, pp. 112–119 (2007)Google Scholar
  75. 75.
    ZigBee Alliance, http://www.zigbee.org/ (retrieved on June 2009)
  76. 76.
    HART Communication, http://www.hartcomm2.org (retrieved on June 2009)
  77. 77.
    ISA100.11a, Wireless Systems for Industrial Automation: Process Control and Related Applications, http://www.isa.org/isa100 (retrieved on June 2009)
  78. 78.
    IEEE Standard, 802.15.4-2006. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks (2006) ISBN 0-7381-4997-7Google Scholar
  79. 79.
    Alcaraz, C., Fernandez, G., Roman, R., Balastegui, A., Lopez, J.: Secure Management of SCADA Networks. New Trends in Network Management, Cepis UPGRADE 9(6), 22–28 (2008)Google Scholar
  80. 80.
    Modbus-IDA. The Architecture for Distributed Automation, http://www.modbus.org (retrieved on June 2009)
  81. 81.
    DNP3. DNP Users Group, http://www.dnp.org (retrieved on June 2009)
  82. 82.
    IEC 60870-5-104, International Electrotechnical Commission, http://www.iec.ch/ (retrieved on June 2009)
  83. 83.
    PI Profibus - Profinet, http://www.profibus.com (retrieved on June 2009)
  84. 84.
    Fieldbus Foundation, http://www.fieldbus.org (retrieved on June 2009)
  85. 85.
    Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. Request for Comments (September 2007)Google Scholar
  86. 86.
    International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)Google Scholar
  87. 87.
    Roman, R., Lopez, J.: Integrating Wireless Sensor Networks and the Internet: A Security Analysis. Internet Research 19(2), 246–259 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Javier Lopez
    • 1
  • Rodrigo Roman
    • 1
  • Cristina Alcaraz
    • 1
  1. 1.Computer Science DepartmentUniversity of MalagaSpain

Personalised recommendations