Providing Holistic Security in Sensor Networks

  • S. Olariu
  • A. Wadaa
  • L. Wilson
  • Q. Xu
  • M. Eltoweissy
  • K. Jones
Conference paper
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 169)


We propose a new paradigm for the secure operation of wireless sensor networks. The network model assumed in this paper consists of tiny, energy -constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous and unaware of their location. Our main contribution is a scalable and energy -efficient solution where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.

Key words

wireless sensor networks energy-efficient protocols holistic security 


  1. 1.
    I. F. Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, Wireless sensor networks: A survey, Computer Networks, 38(4), 2002, 393–422.CrossRefGoogle Scholar
  2. 2.
    R. Anderson and M. Kuhn, Tamper resistance — a cautionary note, Proc. 2 nd Usenix Workshop on Electronic Commerce, Berkely, CA, 1996, 1–11.Google Scholar
  3. 3.
    P. Bahl, W. Russell, Y.-M. Wang, A. Balachandran, G. M. Voelker, and A. Miu, PAWNs: satisfying the need for ubiquitous secure connectivity and location services, IEEE Wireless Communications, 9(1), 2002, 40–48.CrossRefGoogle Scholar
  4. 4.
    D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, 2000.Google Scholar
  5. 5.
    Cross Bow Technologies, Google Scholar
  6. 6.
    A. Ephremides, J. Wieselthier and D. Baker, A design concept for reliable mobile radio networks with frequency hopping signaling, Proceedings of the IEEE, 75(1), 1987, 56–73.CrossRefGoogle Scholar
  7. 7.
    J.-P. Hubaux, L. Buttyan, and S. Capkun, The quest for security in mobile ad-hoc networks, Proc. MobiHoc, Long Beach, October 2001, 146–155.Google Scholar
  8. 8.
    J. M. Kahn, R. H. Katz and K. S. J. Pister, Mobile networking for Smart Dust, Proc. MOBICOM'99, Seattle, WA, August 1999.Google Scholar
  9. 9.
    S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad-hoc networks, Proc. MOBICOM, Boston, MA, August 2000.Google Scholar
  10. 10.
    A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, SPINS: Security protocols for sensor networks, Proc. MOBICOM, Rome, Italy, August 2001, 189–199.Google Scholar
  11. 11.
    A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer, 30(2), 1997, 61–68.Google Scholar
  12. 12.
    P. Saffo, Sensors, the next wave of innovation, Communications of the ACM, 40(2), 1997, 93–97.CrossRefGoogle Scholar
  13. 13.
    TinySec Google Scholar
  14. 14.
    A. Wadaa, S. Olariu, L. Wilson, K. Jones, and Q. Xu, On training wireless sensor networks, MONET, February 2005, to appear.Google Scholar
  15. 15.
    B. Warneke, M. Last, B. Leibowitz, and K. Pister, SmartDust: communicating with a cubic-millimeter computer, IEEE Computer, 34(1), 2001, 44–51.Google Scholar
  16. 16.
    A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, IEEE Computer, 35(4), 2002, 54–62.Google Scholar
  17. 17.
    Y. Zhang and W. Lee, Intrusion detection in ad-hoc networks, Proc. MOBICOM, Boston, MA, August 2000.Google Scholar
  18. 18.
    V. V. Zhirnov and D. J. C. Herr, New frontiers: self-assembly and nano-electronics, IEEE Computer, 34(1), 2001, 34–43.Google Scholar
  19. 19.
    L. Zhou and Z.J. Haas, Securing ad-hoc networks, IEEE Network, 13(6), 1999, 24–30.CrossRefGoogle Scholar

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • S. Olariu
    • 1
  • A. Wadaa
    • 1
  • L. Wilson
    • 1
  • Q. Xu
    • 1
  • M. Eltoweissy
    • 2
  • K. Jones
    • 3
  1. 1.Department of Computer ScienceOld Dominion UniversityNorfolkUSA
  2. 2.Department of Computer ScienceVirginia TechFalls ChurchUSA
  3. 3.NASA Langley Research CenterHamptonUSA

Personalised recommendations