An Adaptive Security Architecture for Location Privacy Sensitive Sensor Network Applications

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8162)


Security and location privacy in wireless sensor networks has drawn a lot of attention in recent years. Yet, the existing solutions are not likely to bring an optimal security/cost trade-off for real networks. They target a single attacker model and static application scenario requirements. However, both the attacker model and the requirements may evolve during the network lifetime. We propose an adaptive security architecture that allows for a dynamic adjustment of a security/cost trade-off. It consists of five security levels, each targeting a different attacker model. The security levels deploy both existing and novel security and privacy mechanisms. We also introduce a novel lightweight scheme for the dynamic security level interchange. The proposed architecture targets a particular application scenario where both traditional security and location privacy are concerned.


Sensor Network Wireless Sensor Network Source Node Network Lifetime Security Level 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: IFIP/IEEE International Symposium on Integrated Network Management, IM 2009, pp. 315–318 (June 2009)Google Scholar
  2. 2.
    Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing for wireless sensor networks. Computer Communications 29(2), 216–230 (2006)CrossRefGoogle Scholar
  3. 3.
    Jiang, X., Liang, C.-J.M., Chen, K., Zhang, B., Hsu, J., Liu, J., Cao, B., Zhao, F.: Design and evaluation of a wireless magnetic-based proximity detection platform for indoor applications. In: Proceedings of the 11th International Conference on Information Processing in Sensor Networks, IPSN 2012, pp. 221–232. ACM, New York (2012)CrossRefGoogle Scholar
  4. 4.
    Jinwala, D., Patel, D., Dasgupta, K.: FlexiSec: a configurable link layer security architecture for wireless sensor networks. Journal of Information Assurance and Security 4, 582–603 (2009)Google Scholar
  5. 5.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location privacy in sensor network routing. In: ICDCS 2005, pp. 599–608. IEEE Computer Society, Washington, DC (2005)Google Scholar
  6. 6.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys 2004, pp. 162–175. ACM, Baltimore (2004)CrossRefGoogle Scholar
  7. 7.
    Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, pp. 142–163. IOS Press (2008)Google Scholar
  8. 8.
    Kůr, J., Matyáš, V., Stetsko, A., Švenda, P.: Attack detection vs. Privacy – how to find the link or how to hide it? In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols XIX. LNCS, vol. 7114, pp. 189–199. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Luk, M., Mezzour, G., Perrig, A., Gligor, V.: Minisec: A secure sensor network communication architecture. In: 6th International Symposium on Information Processing in Sensor Networks, IPSN 2007, pp. 479–488 (April 2007)Google Scholar
  11. 11.
    Luk, M., Perrig, A., Whillock, B.: Seven cardinal properties of sensor network broadcast authentication. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2006, pp. 147–156. ACM, New York (2006)CrossRefGoogle Scholar
  12. 12.
    Mehta, K., Liu, D., Wright, M.: Location privacy in sensor networks against a global eavesdropper. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 314–323 (October 2007)Google Scholar
  13. 13.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Networks 8(5), 521–534 (2002)zbMATHCrossRefGoogle Scholar
  14. 14.
    Rios, R., Lopez, J.: Exploiting context-awareness to enhance source-location privacy in wireless sensor networks. The Computer Journal 54(10), 1603–1615 (2011)CrossRefGoogle Scholar
  15. 15.
    Ruiz, L.B., Nogueira, J.M.S., Loureiro, A.A.F.: MANNA: a management architecture for wireless sensor networks. IEEE Communications Magazine 41(2), 116–125 (2003)CrossRefGoogle Scholar
  16. 16.
    Xue, Q., Ganz, A.: Runtime security composition for sensor networks (SecureSense). In: 2003 IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol. 5, pp. 2976–2980 (October 2003)Google Scholar
  17. 17.
    Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2006)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Masaryk UniversityBrnoCzech Republic

Personalised recommendations