Security in Wireless Sensor Networks

  • Kashif Kifayat
  • Madjid Merabti
  • Qi Shi
  • David Llewellyn-Jones

Abstract

Humans are constantly inventing new technologies to fulfil their needs. Wireless sensor networks (WSNs) are a still developing technology consisting of multifunction sensor nodes that are small in size and communicate wirelessly over short distances. Sensor nodes incorporate properties for sensing the environment, data processing and communication with other sensors. The unique properties of WSNs increase flexibility and reduce user involvement in operational tasks such as in battlefields. Wireless sensor networks can perform an important role in many applications, such as patient health monitoring, environmental observation and building intrusion surveillance. In the future WSNs will become an integral part of our lives. However along with unique and different facilities, WSNs present unique and different challenges compared to traditional networks. In particular, wireless sensor nodes are battery operated, often having limited energy and bandwidth available for communications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 26.1.
    M. Saraogi: Security in Wireless Sensor Networks, Department of Computer Science University of Tennessee (2005)Google Scholar
  2. 26.2.
    I.F. Akyildiz, Y.S.W. Su, E. Cayirci: A survey on sensor networks, IEEE Commun. Mag. 40(8), 102–116 (2002)CrossRefGoogle Scholar
  3. 26.3.
    J. Rabaey, J. Ammer, J.L. da Silva Jr., D. Patel: Pico-Radio: Ad-Hoc Wireless Networking of Ubiquitous Low Energy Sensor/Monitor Nodes, IEEE Computer Society Annual Workshop on VLSI (WVLSI) 2000, Orlanda (2000) pp. 9–12Google Scholar
  4. 26.4.
    J.P. Walters, Z. Liang, W. Shi, V. Chaudhary: Wireless Sensor Networks Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, ed. by Y. Xiao (Auerbach Publications, Boca Raton 2007) pp. 367–410Google Scholar
  5. 26.5.
    Xbow. Available at: http://www.xbow.com/wirelesshome.aspx (last accessed 12/07/2007)
  6. 26.6.
    K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: The Performance of Dynamic Group-Based Key Establishment (DGKE) under Node Capture Attacks in Wireless Sensor Networks, 2nd Conference on Advances in Computer Security and Forensics (ACSF) 2007, Liverpool (2007) pp. 12–13Google Scholar
  7. 26.7.
    T. Gao, D. Greenspan, M. Welsh, R.R. Juang, A. Alm: Vital Signs Monitoring and Patient Tracking over a Wireless Network, 27th IEEE EMBS Annual Int. Conference 2005 (2005) pp. 102–105Google Scholar
  8. 26.8.
    A. Cerpa, D. Estrin: ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies, IEEE Trans. Mob. Comput. 3(3), 272–285 (2004)CrossRefGoogle Scholar
  9. 26.9.
    H. Song, S. Zhu, G. Cao: SVATS: A Sensor-network-based Vehicle Anti-Theft System, IEEE INFOCOM 2008 (2008) pp. 2128–2136Google Scholar
  10. 26.10.
    K. Piotrowski, P. Langendoerfer, S. Peter: How Public Key Cryptography Influences Wireless Sensor Node Lifetime, 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2006 (2006) pp. 169–176Google Scholar
  11. 26.11.
    A. Cerpa, J. Elson, M. Hamilton, J. Zhao: Habitat Monitoring: Application Driver for Wireless Communications Technology, ACM SIGCOMM 2001, Costa Rica (2001) pp. 20–41Google Scholar
  12. 26.12.
    B. Halweil: Study finds modern farming is costly, World Watch 14, 910 (2001)Google Scholar
  13. 26.13.
    K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Modelling Node Capture Attacks in Wireless Sensor Networks Using Simulation, 23rd Annual UK Performance Engineering Workshop 2007, Edge Hill University (2007) pp. 9–10Google Scholar
  14. 26.14.
    T. He, S. Krishnamurthy, J.A. Stankovic, T. Abdelzaher, R.S.L. Luo, T. Yan, L. Gu, G. Zhou, J. Hui, B. Krogh: VigilNet: An integrated sensor network system for energy-efficient surveillance, ACM Trans. Sens. Netw. 2(1), 1–38 (2006)CrossRefGoogle Scholar
  15. 26.15.
    J. Stankovic: Wireless Sensor Networks. In: Handbook of Real-Time and Embedded Systems, ed. by I. Lee, J.Y.-T. Leung, S.H. Son (CRC Press, Boca Raton 2007)Google Scholar
  16. 26.16.
    VigilNet. Available at: http://www.cs.virginia.edu/wsn/vigilnet/ (last accessed 31/12/2006)
  17. 26.17.
    E. Biagioni, K. Bridges: The application of remote sensor technology to assist the recovery of rare and endangered species, Int. J. High Perform. Comput. Appl. 16(3), 315–324 (2002)CrossRefGoogle Scholar
  18. 26.18.
    ALERT. Available at: http://www.alertsystems.org (last accessed 01/01/2007)
  19. 26.19.
    G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, M. Welsh: Fidelity and Yield in a Volcano Monitoring Sensor Network, 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI) 2006, Seattle (2006) pp. 381–396Google Scholar
  20. 26.20.
    G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Welsh: Deploying a wireless sensor network on an active volcano, IEEE Internet Comput. 10(2), 18–25 (2006)CrossRefGoogle Scholar
  21. 26.21.
    Volcano monitoring. Available at: http://www.eecs.harvard.edu/ mdw/proj/volcano/ (last accessed 10/1/2007)
  22. 26.22.
    P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, D. Rubenstein: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, 10th Int. Conference on Architectural Support for Programming Languages and Operating Systems 2002, San Jose (2002) pp. 96–107Google Scholar
  23. 26.23.
    ZebraNet. Available at: http://www.princeton.edu/ mrm/zebranet.html (last accessed 3/11/2006)
  24. 26.24.
    C. Hartung, S. Holbrook, R. Han, C. Seielstad: FireWxNet: A Multi-Tiered Portable Wireless System for Monitoring Weather Conditions in Wildland Fire Environments, 4th Int. Conference on Mobile Systems, Applications and Services (MobiSys), 2006 (2006) pp. 28–41Google Scholar
  25. 26.25.
    S. Patel, K. Lorincz, R. Hughes, N. Huggins, J.H. Growdon, M. Welsh, P. Bonato: Analysis of Feature Space for Monitoring Persons with Parkinson’s Disease with Application to a Wireless Wearable Sensor System, 29th IEEE EMBS Annual Int. Conference 2007, Lyon (2007) pp. 6290–6293Google Scholar
  26. 26.26.
    T. Gao, T. Massey, L. Selavo, M. Welsh, M. Sarrafzadeh: Participatory User Centered Design Techniques for a Large Scale Ad-Hoc Health Information System, 1st Int. Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet) 2007, San Juan (2007) pp. 43–48Google Scholar
  27. 26.27.
    T. Gao, D. Greenspan, M. Welsh: Improving Patient Monitoring and Tracking in Emergency Response, Int. Conference on Information Communication Technologies in Health 2005 (2005)Google Scholar
  28. 26.28.
    D. Malan, T.R.F. Fulford-Jones, M. Welsh, S. Moulton: CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care, MobiSys Workshop on Applications of Mobile Embedded Systems (WAMES) 2004, Boston (2004) pp. 12–14Google Scholar
  29. 26.29.
    N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron: Monitoring behaviour in home using a smart fall sensor, IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology 2000 (2000) pp. 607–610Google Scholar
  30. 26.30.
    E. Jovanov, A. Milenkovic, C. Otto, P.C. de Groen: A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation, J. Neuro Eng. Rehabil. 2(6), 18–29 (2005)Google Scholar
  31. 26.31.
    J. Welch, F. Guilak, S.D. Baker: A Wireless ECG Smart Sensor for Broad Application in Life Threatening Event Detection, 26th Annual Int. Conference of the IEEE Engineering in Medicine and Biology Society 2004, San Francisco (2004) pp. 3447–3449Google Scholar
  32. 26.32.
    A. Milenkovic, C. Otto, E. Jovanov: Wireless sensor networks for personal health monitoring: issues and an implementation, Comput. Commun. 29(13/14), 2521–2533 (2006)CrossRefGoogle Scholar
  33. 26.33.
    A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, J. Stankovic: ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring, Department of Computer Science, University of Virginia (2006)Google Scholar
  34. 26.34.
    G. Virone, T. Doan, A. Wood, J.A. Stankovic: Dynamic Privacy in Assisted Living and Home Health Care, Joint Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability 2007 (2007)Google Scholar
  35. 26.35.
    AlarmNet. Available at: http://www.cs.virginia.edu/wsn/medical/ (last accessed 10/1/2007)
  36. 26.36.
    H. Callaway: Wireless Sensor Networks: Architectures and Protocols, 0849318238, 9780849318238 (CRC Press, Boca Raton 2003)Google Scholar
  37. 26.37.
    M. Demirbas: Scalable design of fault-tolerance for wireless sensor networks, Ph.D. Thesis (Ohio State University, Columbus, OH 2004)Google Scholar
  38. 26.38.
    F. Koushanfar, M. Potkonjak, A. Sangiovanni-Vincentelli: Fault-Tolerance in Sensor Networks. In: Handbook of Sensor Networks, Vol. 36, ed. by I. Mahgoub, M. Ilyas (CRC Press, Boca Raton 2004)Google Scholar
  39. 26.39.
    E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan: Physical layer driven protocol and algorithm design for energy-efficient Wireless Sensor Networks, ACM MobiCom 2001, Rome (2001) pp. 272–286Google Scholar
  40. 26.40.
    J.N. Al-Karaki, A.E. Kamal: Routing techniques in wireless sensor networks: A survey, IEEE Wirel. Commun. 11(6), 6–28 (2004)CrossRefGoogle Scholar
  41. 26.41.
    F. Ye, H. Luo, J. Cheng, S. Lu, L. Zhang: A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks, ACM/IEEE MOBICOM 2002 (2002) pp. 148–159Google Scholar
  42. 26.42.
    K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Security in Mobile Wireless Sensor Networks, 8th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet) 2007, Liverpool (2007) pp. 28–29Google Scholar
  43. 26.43.
    N. Bulusu, D. Estrin, L. Girod, J. Heidemann: Scalable coordination for Wireless Sensor Networks: self- configuring localization systems, in International Symposium on Communication Theory and Applications 2001, Ambleside (2001)Google Scholar
  44. 26.44.
    G.J. Pottie, W.J. Kaiser: Wireless integrated network sensors, Commun. ACM 43(5), 551–558 (2000)CrossRefGoogle Scholar
  45. 26.45.
    J.M. Kahn, R.H. Katz, K.S.J. Pister: Next Century Challenges: Mobile Networking For Smart Dust, ACM MobiCom 1999, Washington (1999) pp. 271–278Google Scholar
  46. 26.46.
    A. Rowe, R. Mangharam, R. Rajkumar: RT-Link: A global time-synchronized link protocol for sensor networks, Elsevier Ad hoc Netw. 6(8), 1201–1220 (2008)CrossRefGoogle Scholar
  47. 26.47.
    E. Farrugia, R. Simon: An efficient and secure protocol for sensor network time synchronization, J. Syst. Softw. 79(2), 147–162 (2006)CrossRefGoogle Scholar
  48. 26.48.
    S. Wu, K.S. Candan: Demand-scalable geographic multicasting in wireless sensor networks, Comput. Commun. 33(14–15), 2931–2953 (2007)CrossRefGoogle Scholar
  49. 26.49.
    Y. Wang, J. Gao, J.S.B. Mitchell: Boundary Recognition in Sensor Networks by Topological Methods, 12th Annual Int. Conference on Mobile Computing and Networking (MobiCom) 2006 (2006) pp. 122–133Google Scholar
  50. 26.50.
    E. Shi, A. Perrig: Designing secure sensor networks, Wirel. Commun. Mag. 11(6), 38–43 (2004)CrossRefGoogle Scholar
  51. 26.51.
    D. W. Carman, P.S. Krus, B.J. Matt: Constraints and Approaches for Distributed Sensor Network Security, Technical Report 00-010, NAI Labs, Network Associates, Inc, Glenwood, MD, Iss., 2000.Google Scholar
  52. 26.52.
    A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler: Spins: Security protocols for sensor networks, Wirel. Netw. 8(5), 521–534 (2002)MATHCrossRefGoogle Scholar
  53. 26.53.
    D. Liu, P. Ning, S. Zhu, S. Jajodia: Practical Broadcast Authentication in Sensor Networks, 2nd Annual Int. Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous) 2005 (2005) pp. 118–129Google Scholar
  54. 26.54.
    D. Liu, P. Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks, 10th Annual Network and Distributed System Security Symposium 2003 (2003) pp. 263–276Google Scholar
  55. 26.55.
    D. Liu, P. Ning: Multilevel μTesla: broadcast authentication for distributed sensor networks, Trans. Embed. Comput. Syst. 3(4), 800–836 (2004)CrossRefGoogle Scholar
  56. 26.56.
    N. Engelbrecht, W.T. Penzhorn: Secure Authentication Protocols Used for Low Power Wireless Sensor Networks, IEEE International Symposiumon 2005 (2005) pp. 1777–1782Google Scholar
  57. 26.57.
    Z. Benenson, N. Gedicke, O. Raivio: Realizing Robust User Authentication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks (REALWSN) 2005 (2005) pp. 20–21Google Scholar
  58. 26.58.
    P. Nicopolitidis, M.S. Obaidat, G.I. Papadimitriou, A.S. Pomportsis: Wireless Networks, Vol. 2 (Wiley, West Sussex, UK 2003)Google Scholar
  59. 26.59.
    FunctionX. Computer Networks. Available at: http://www.functionx.com/networking/Lesson01.htm (last accessed 9/8/2005)
  60. 26.60.
    Y. Xu, J. Heidemann, D. Estrin: Geography-informed Energy Conservation for Ad Hoc Routing, Mobicom 2001 (2001) pp. 70–84Google Scholar
  61. 26.61.
    T. Karygiannis, L. Owens: Wireless Network Security: 802.11, Bluetooth, and Handheld Devices, NIST (2002)Google Scholar
  62. 26.62.
    M. Langheinrich: A Privacy Awareness System for Ubiquitous Computing Environments, 4th Int. Conference on Ubiquitous Computing 2002 (2002)Google Scholar
  63. 26.63.
    E. Snekkenes: Concepts for Personal Location Privacy Policies, 3rd ACM Conference on Electronic Commerce 2001 (ACM Press, New York, USA 2001) pp. 48–57Google Scholar
  64. 26.64.
    S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, J. Tang: Framework for Security And Privacy In Automotive Telematics, 2nd ACM Int. Workshop on Mobile Commerce 2002 (2002) pp. 25–32Google Scholar
  65. 26.65.
    L. Sweeney: Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-based Syst. 10(5), 571–588 (2002)MATHCrossRefMathSciNetGoogle Scholar
  66. 26.66.
    M. Gruteser, G. Schelle, A. Jain, R. Han, D. Grunwald: Privacy-Aware Location Sensor Networks, 9th Conference on Hot Topics in Operating Systems 2003 (2003) pp. 28–28Google Scholar
  67. 26.67.
    C. Karlof, D. Wagner: Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s Ad Hoc Net. J. 1(1), 293–315 (2003)CrossRefGoogle Scholar
  68. 26.68.
    I. Ahmed: Efficient key management for wireless sensor networks, M.Sc. Thesis (Hope University, Liverpool, 2006)Google Scholar
  69. 26.69.
    W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan: Energy Efficient Communication Protocol for Wireless Microsensor Networks, Hawaiian Int. Conference On Systems Science 2000 (2000)Google Scholar
  70. 26.70.
    M. Saxena: Security in Wireless Sensor Networks – A Layer based Classification, CERIAS Technical Report (2007)Google Scholar
  71. 26.71.
    H. Alzaid, E. Foo, J.M.G. Nieto: Secure data aggregation in wireless sensor network: A survey, Proc. 6th Australasian conference on Information security 2008, Wollongong (2008) pp. 93–105Google Scholar
  72. 26.72.
    C.Y. Wen, W.A. Sethares: Adaptive Decentralized Re-Clustering For Wireless Sensor Networks, SMC 2006, Taipei (2006) pp. 2709–2716Google Scholar
  73. 26.73.
    S. Vasudevan, B. DeCleene, N. Immerman, J.F. Kurose, D.F. Towsley: Leader Election Algorithms for Wireless Ad Hoc Networks, DISCEX 2003 (2003) pp. 261–272Google Scholar
  74. 26.74.
    IDs. Available at: http://searchsecurity.techtarget.com (last accessed 10/12/2006)
  75. 26.75.
    F. Freiling, I. Krontiris, T. Dimitriou: Towards Intrusion Detection in Wireless Sensor Networks, 13th European Wireless Conference 2007, Paris (2007)Google Scholar
  76. 26.76.
    C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann: Impact of Network Density on Data Aggregation in Wireless Sensor Networks, 22nd Int. Conference on Distributed Computing Systems, Vienna, Austria, 2002 (2002) pp. 457–458Google Scholar
  77. 26.77.
    S. Madden, M.J. Franklin, J.M. Hellerstein, W. Hong: TAG: A tiny aggregation service for ad-hoc sensor networks, SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)CrossRefGoogle Scholar
  78. 26.78.
    Y. Yao, J. Gehrke: The COUGAR approach to in-network query processing in sensor networks, SIGMOD Rec. 31(3), 9–18 (2002)CrossRefGoogle Scholar
  79. 26.79.
    H. Chan, A. Perrig, D. Song: Secure Hierarchical In-Network Aggregation in Sensor Networks, 13th ACM Conference on Computer and communications Security 2006, Alexandria (2006) pp. 278–287Google Scholar
  80. 26.80.
    A. Deshpande, S. Nath, P.B. Gibbons, S. Seshan: Cache-and-Query for Wide Area Sensor Databases, Int. Conference on Management of Data SIGMOD 2003, San Diego (2003) pp. 503–514Google Scholar
  81. 26.81.
    C. Castelluccia, E. Mykletun, G. Tsudik: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, 2nd Annual Int. Conference on Mobile and Ubiquitous Systems 2005 (2005) pp. 109–117Google Scholar
  82. 26.82.
    K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Applying Secure Data Aggregation Techniques for a Structure and Density Independent Group Based Key Management Protocol, 3rd IEEE Int. Symposium on Information Assurance and Security (IAS) 2007, Manchester (2007) pp. 44–49Google Scholar
  83. 26.83.
    L. Hu, D. Evans: Secure Aggregation for Wireless Networks, Workshop on Security and Assurance in Ad hoc Networks 2003 (2003) pp. 384–391Google Scholar
  84. 26.84.
    P. Jadia, A. Mathuria: Efficient Secure Aggregation In Sensor Networks, 11th Int. Conference on High Performance Computing 2004 (2004)Google Scholar
  85. 26.85.
    B. Przydatek, D. Song, A. Perrig: SIA: Secure Information Aggregation In Sensor Networks, 1st Int. Conference on Embedded Networked Sensor Systems 2003 (2003) pp. 255–265Google Scholar
  86. 26.86.
    Y. Yang, X. Wang, S. Zhu, G. Cao: SDAP: A secure hop-by-hop data aggregation protocol for sensor networks, ACM Trans. Inf. Syst. Secur. 11(4), 1–43 (2008)CrossRefGoogle Scholar
  87. 26.87.
    J. Girao, M. Schneider, D. Westhoff: CDA: Concealed Data Aggregation in Wireless Sensor Networks, ACM Workshop on Wireless Security 2004 (2004)Google Scholar
  88. 26.88.
    H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli: Energy-efficient secure pattern based data aggregation for wireless sensor networks, Comput. Commun. 29, 446–455 (2006)CrossRefGoogle Scholar
  89. 26.89.
    B. Krebs: A Short History of Computer Viruses and Attacks. Available at: http://www.washingtonpost.com/ac2/wp-dyn/A50636-2002Jun26 (last accessed 12/10/2007)
  90. 26.90.
    The History of Computer Viruses. Available at: http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-viruses.shtml (last accessed 12/10/2007)
  91. 26.91.
    P. Innella: A Brief History of Network Security and the Need for Host Based Intrusion Detection. Available at: http://www.tdisecurity.com/resources/ (last accessed 01/10/2007)
  92. 26.92.
    T. Roosta, S. Shieh, S. Sastry: Taxonomy of Security Attacks in Sensor Networks, 1st IEEE Int. Conference on System Integration and Reliability Improvements 2006, Hanoi (2006) pp. 13–15Google Scholar
  93. 26.93.
    A. Becher, Z. Benenson, M. Dornseif: Tampering with Motes: Real-world Physical Attacks on Wireless Sensor Networks, Int. Conference on Security in Pervasive Computing (SPC) 2006 (2006) pp. 104–118Google Scholar
  94. 26.94.
    L. Eschenauer, V. Gligor: A Key Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security 2002 (2002) pp. 41–47Google Scholar
  95. 26.95.
    A. Hac: Wireless Sensor Networks Design (Wiley, UK 2003)CrossRefGoogle Scholar
  96. 26.96.
    D. Liu, P. Ning, W. Du: Group-Based Key Pre-Distribution in Wireless Sensor Networks, ACM Workshop on Wireless Security (WiSe) 2005 (2005) pp. 11–20Google Scholar
  97. 26.97.
    H. Chan, A. Perrig, D. Song: Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Research in Security and Privacy 2003 (2003) pp. 197–213Google Scholar
  98. 26.98.
    H. Chan, A. Perrig: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, INFOCOM 2005 (2005) pp. 524–535Google Scholar
  99. 26.99.
    M. Eltoweissy, A. Wadaa, S. Olariu, L. Wilson: Group key management scheme for large-scale sensor networks, Elsevier Ad Hoc Netw. 3(5), 668–688 (2004)Google Scholar
  100. 26.100.
    W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE INFOCOM 2004 (2004)Google Scholar
  101. 26.101.
    D. Huang, M. Mehta, D. Medhi, L. Harn: Location-Aware Key Management Scheme for Wireless Sensor Networks, 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2004 (2004) pp. 29–42Google Scholar
  102. 26.102.
    L. Zhou, J. Ni, C.V. Ravishankar: Efficient Key Establishment for Group-Based Wireless Sensor Deployments, WiSe 2005 (2005) pp. 1–10Google Scholar
  103. 26.103.
    K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Application independent dynamic group-based key establishment for large-scale wireless sensor networks, China Commun. 4(1), 14–27 (2007)Google Scholar
  104. 26.104.
    C.C. Tiu: A new frequency-based side channel attack for embedded systems, M.Sc. Thesis (University of Waterloo, Waterloo, ON, Canada, 2005)Google Scholar
  105. 26.105.
    P. Kocher, J. Jaffe, B. Jun: Differential Power Analysis. In: Advances in Cryptography – CRYPTO’99, Lecture Notes in Computer Science, Vol. 1666, ed. by M. Wiener (Springer, Berlin Heidelberg 1999) pp. 388–397Google Scholar
  106. 26.106.
    D. Agrawal, B. Archambeault, J. R. Rao, P. Rohatgi: The EM Side-Channel (s): Attacks and Assessment Methodologies, IBM (2002)Google Scholar
  107. 26.107.
    K. Okeya, T. Iwata: Side channel attacks on message authentication codes, IPSJ Digit. Cour. 2, 478–488 (2006)CrossRefGoogle Scholar
  108. 26.108.
    C. Karlof, N. Sastry, D. Wagner: Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks, 2nd ACM Conference on Embedded Networked Sensor Systems 2004 (2004) pp. 162–175Google Scholar
  109. 26.109.
    A. Perrig, D. Wagner, J. Stankovic: Security in wireless sensor networks, Commun. ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  110. 26.110.
    M. Krishnan: Intrusion Detection in Wireless Sensor Networks, Department of EECS, University of California at Berkeley (2006)Google Scholar
  111. 26.111.
    R. Muraleedharan, L.A. Osadciw: Cross Layer Protocols in Wireless Sensor Networks (Poster), IEEE Infocomm Student Workshop 2006 (2006)Google Scholar
  112. 26.112.
    A.D. Wood, J.A. Stankovic: Denial of service in sensor networks, IEEE Comput. 35(10), 54–62 (2002)Google Scholar
  113. 26.113.
    A.D. Wood, J.A. Stankovic: A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks. In: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, ed. by M. Ilyas, I. Mahgoub (CRC Press, Boca Raton, FL, USA 2005)Google Scholar
  114. 26.114.
    J. Regehr, N. Cooprider, W. Archer, E. Eide: Memory Safety and Untrusted Extensions for Tinyos, School of Computing, University of Utah (2006)Google Scholar
  115. 26.115.
    N. Cooprider, W. Archer, E. Eide, D. Gay, J. Regehr: Efficient Memory Safety for TinyOS, 5th ACM Conference on Embedded Networked Sensor Systems (SenSys) 2007, Sydney (2007) pp. 205–218Google Scholar
  116. 26.116.
    J. Hill, P. Bounadonna, D. Culler: Active Message Communication for Tiny Network Sensors, UC Berkeley, Berkeley (2001)Google Scholar
  117. 26.117.
    M. Shaneck, K. Mahadevan, V. Kher, Y. Kim: Remote Software-Based Attestation for Wireless Sensors, 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks 2005 (2005) pp. 27–41Google Scholar
  118. 26.118.
    A. Perrig, J. Newsome, E. Shi, D. Song: The Sybil Attack in Sensor Networks: Analysis and Defences, 3rd Int. Symposium on Information Processing in Sensor Networks 2004 (ACM Press, New York, USA 2004) pp. 259–268Google Scholar
  119. 26.119.
    D. Raffo: Security Schemes for the OLSR Protocol for Ad Hoc Networks, University of Paris (2005), Chap. 3Google Scholar
  120. 26.120.
    Y.-C. Hu, A. Perrig, D.B. Johnson: Adriane: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Annual ACM Int. Conference on Mobile Computing and Networking (MobiCom) 2002 (2002)Google Scholar
  121. 26.121.
    Y.-C. Hu, A. Perrig, D.B. Johnson: Packet Leashes: A Defence Against Wormhole Attacks in Wireless Ad Hoc Networks, 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 2003, San Francisco (2003) pp. 1976–1986Google Scholar
  122. 26.122.
    B. Yu, B. Xiao: Detecting Selective Forwarding Attacks in Wireless Sensor Networks, 20th Int. Parallel and Distributed Processing Symposium IPDPS 2006, Greece (2006) pp. 1–8Google Scholar
  123. 26.123.
    A.A. Pirzada, C. McDonald: Circumventing Sinkholes and Wormholes in Wireless Sensor Networks, Int. Workshop on Wireless Ad-hoc Networks 2005 (2005)Google Scholar
  124. 26.124.
    S. Datema: A case study of wireless sensor network attacks, M.Sc. Thesis (Delft University, Delft, The Netherlands 2005)Google Scholar
  125. 26.125.
    J. Deng, R. Han, S. Mishra: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks, First IEEE/Cerate Net Conference on Security and Privacy in Communication Networks (SecureComm) 2005, Athens (2005) pp. 113–124Google Scholar
  126. 26.126.
    K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Group-based secure communication for large scale wireless sensor networks, J. Inf. Assur. Secur. 2(2), 139–147 (2007)Google Scholar
  127. 26.127.
    H. Yang, H.Y. Luo, F. Ye, S.W. Lu, L. Zhang: Security in mobile ad hoc networks: challenges and solutions, IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRefGoogle Scholar
  128. 26.128.
    H. Fu, S. Kawamura, M. Zhang, L. Zhang: Replication attack on random key pre-distribution schemes for wireless sensor networks, Comput. Commun. 31(4), 842–857 (2008)CrossRefGoogle Scholar
  129. 26.129.
    H. Fu, S. Kawamura, M. Zhang, L. Zhang: Replication Attack on Random Key Pre-Distribution Schemes for Wireless Sensor Networks, IEEE Workshop on Information Assurance and Security 2005, US Military Academy, West Point (2005) pp. 134–141Google Scholar
  130. 26.130.
    D. Liu, P. Ning: Establishing Pairwise Keys in Distributed Sensor Networks, 10th ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 52–61Google Scholar
  131. 26.131.
    W. Du, J. Deng, Y. Han, P. Varshney: A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, 10th ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 42–51Google Scholar
  132. 26.132.
    W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, A. Khalili: A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)CrossRefGoogle Scholar
  133. 26.133.
    B. Parno, A. Perrig, V. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks, IEEE Symposium on Security and Privacy 2005, Oakland (2005) pp. 49–63Google Scholar
  134. 26.134.
    Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway: A survey of key management schemes in wireless sensor Networks, Comput. Commun. 30(11–12), 2314–2341 (2007)CrossRefGoogle Scholar
  135. 26.135.
    P. Ning, R. Li, D. Liu: Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)CrossRefGoogle Scholar
  136. 26.136.
    F. Anjum: Location dependent key management using random key predistribution in sensor networks, WiSe 2006, 21–30 (2006)CrossRefGoogle Scholar
  137. 26.137.
    X. Du, Y. Xiao, M. Guizani, H.H. Chen: An effective key management scheme for heterogeneous sensor networks, Elsevier Ad Hoc Netw. 5(1), 24–34 (2007)CrossRefGoogle Scholar
  138. 26.138.
    B.C. Lai, S. Kim, I. Verbauwhede: Scalable Session Key Construction Protocol For Wireless Sensor Networks, IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES) 2002 (2002)Google Scholar
  139. 26.139.
    RSA. Available at: http://www.rsasecurity.com/rsalabs/ (last accessed 2/2/2006)
  140. 26.140.
    R.D. Pietro, L.V. Mancini, S. Jajodia: Providing secrecy in key management protocols for large wireless sensors networks, Ad Hoc Netw. 1(4), 455–468 (2003)CrossRefGoogle Scholar
  141. 26.141.
    S. Zhu, S. Setia, S. Jajodia: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 62–72Google Scholar
  142. 26.142.
    G. Jolly, M.C. Kuscu, P. Kokate, M. Younis: A Low-Energy Key Management Protocol for Wireless Sensor Networks, IEEE Symposium on Computers and Communications (ISCC) 2003, Kemer – Antalya (2003) pp. 335–340Google Scholar
  143. 26.143.
    M. Bohge, W. Trappe: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks, 2nd ACM workshop on Wireless security (WiSe) 2003 (2003) pp. 79–87Google Scholar
  144. 26.144.
    M.F. Younis, K. Ghumman, M. Eltoweissy: Location-aware combinatorial key management scheme for clustered sensor networks, IEEE Trans. Parallel Distrib. Syst. 17(8), 865–882 (2006)CrossRefGoogle Scholar
  145. 26.145.
    X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2007)CrossRefGoogle Scholar
  146. 26.146.
    S. Hussain, F. Kausar, A. Masood: An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks, ACM Int. Conference on Wireless communications and Mobile Computing (IWCMC) 2007 (2007) pp. 388–392Google Scholar
  147. 26.147.
    P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta: Establishing Pair-Wise Keys In Heterogeneous Sensor Networks, IEEE INFOCOM 2006 (2006) pp. 1–12Google Scholar
  148. 26.148.
    C.S. Raghavendra, K.M. Sivalingam, T. Znati: Wireless Sensor Networks (Springer, New York, USA 2004) CrossRefGoogle Scholar
  149. 26.149.
    Homomorphic Encryption. Available at: http://en.wikipedia.org/wiki/Homomorphic_encryption (last accessed 01/03/2007)
  150. 26.150.
    B. Schneier: Secret and Lies, Digital Security in a Networked World (Wiley, UK 2000)Google Scholar
  151. 26.151.
    N. Wang, S. Fang: A hierarchical key management scheme for secure group communications in mobile ad hoc networks, J. Syst. Softw. 80(10), 1667–1677 (2007)CrossRefMathSciNetGoogle Scholar
  152. 26.152.
    B. Wu, J. Wu, E.B. Fernandez, M. Ilyas, S. Magliveras: Secure and efficient key management in mobile ad hoc networks, J. Netw. Comput. Appl. 30(3), 937–954 (2007)CrossRefGoogle Scholar
  153. 26.153.
    J. Cho, I. Chen, D. Wang: Performance optimization of region-based group key management in mobile ad hoc networks, Perform. Evaluation 65(5), 319–344 (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Kashif Kifayat
    • 1
  • Madjid Merabti
    • 1
  • Qi Shi
    • 1
  • David Llewellyn-Jones
    • 1
  1. 1.School of Computing and Mathematical SciencesLiverpool John Moores UniversityLiverpoolUK

Personalised recommendations