Advertisement

Autonomic Communication Security in Sensor Networks

  • Tassos Dimitriou
  • Ioannis Krontiris
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3854)

Abstract

The fact that sensor networks are deployed in wide dynamically changing environment and usually left unattended, calls for nomadic, diverse and autonomic behavior. The nature of security threats in such networks as well as the nature of the network itself raise additional security challenges, so new mechanisms and architectures must be designed to protect them. In an autonomic communication context these mechanisms must be based on self-healing, self-configuration and self-optimization in order to enforce high-level security policies. In this work we discuss the research challenges posed by sensor network security as they apply to the autonomic communication setting.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Security Threat Autonomic Communication 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Chong, C.-Y., Kumar, S.P.: Sensor Networks: Evolution, Opportunities, and Challenges. Proc. of the IEEE 91(8), 1247–1256 (2003)CrossRefGoogle Scholar
  2. 2.
    Tubaishat, M., Madria, S.: Sensor networks: an overview. IEEE Potentials 22(2), 20–23 (2003)CrossRefGoogle Scholar
  3. 3.
    Rajaravivarma, V., Yang, Y., Yang, T.: An overview of Wireless Sensor Network and applications. In: Proc. of the 35th IEEE Southeastern Symposium on System Theory, pp. 432–436 (2003)Google Scholar
  4. 4.
    Hu, F., Sharma, N.K.: Secure Wireless Sensor Networks: Problems and Solutions. In: Proc. of International Conference on Computer, Communication and Control Technologies (CCCT 2003) (2003)Google Scholar
  5. 5.
    Shi, A., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications 11(6), 38–43 (2004)CrossRefGoogle Scholar
  6. 6.
    Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATHGoogle Scholar
  7. 7.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)MathSciNetCrossRefMATHGoogle Scholar
  8. 8.
    Carman, D., Kruus, P., Matt, B.: Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs (2000)Google Scholar
  9. 9.
    Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. In: Proc. of the 9th International Conference ASPLOS-IX, pp. 93–104 (2000)Google Scholar
  10. 10.
    Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proc. of the 6th Annual Inter. Conference on Mobile Computing and Networking (MobiCOM 2000) (2000)Google Scholar
  11. 11.
    Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems. Tech. Report CU-CS-990-05, Univ. of Colorado (2005)Google Scholar
  12. 12.
    Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure pebblenets. In: Proc. of the ACM Inter. Symposium on Mobile Ad Hoc Networking and Computing (2001)Google Scholar
  13. 13.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communications Security, Washington DC, USA, pp. 41–47 (2002)Google Scholar
  14. 14.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. of the IEEE Symp. Security Privacy, Berkeley, CA (2003)Google Scholar
  15. 15.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security, Washington DC, USA, pp. 42–51 (2003)Google Scholar
  16. 16.
    Dimitriou, T., Krontiris, I.: A Localized, Distributed Protocol for Secure Information Exchange in Sensor Networks. In: Proc. of the 5th IEEE Intern. Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN) (2005)Google Scholar
  17. 17.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC, pp. 62–72 (2003)Google Scholar
  18. 18.
    Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)CrossRefGoogle Scholar
  19. 19.
    Jones, A.K., Sielken, R.S.: Computer system intrusion detection: a survey. Technical Report, Computer Science Department, University of Virginia (2000)Google Scholar
  20. 20.
    Pickholtz, R.L., Schilling, D.L., Milstein, L.B.: Theory of spread-spectrum communications - A tutorial. IEEE Transactions on Communications 30, 855–884 (1982)CrossRefGoogle Scholar
  21. 21.
    Krontiris, I., Dimitriou, T.: GRAViTy, Geographic Routing Around Voids (in preparation)Google Scholar
  22. 22.
    Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 125–136. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  23. 23.
    Deng, J., Han, R., Mishra, S.: Intrusion Tolerance and Anti-Traffic Analysis Strategies for Wireless Sensor Networks. In: Proc. of the IEEE International Conference on Dependable Systems and Networks (DSN), pp. 594–603 (2004)Google Scholar
  24. 24.
    Seshadri, A., Perrig, A., Doorn, L., Khosla, P.: SWATT: SoftWare-based ATTestation for Embedded Devices. In: Proc. of the IEEE Symposium on Security and Privacy, pp. 272–282 (2004)Google Scholar
  25. 25.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proc. of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (2003)Google Scholar
  26. 26.
    Ganesan, D., Govindan, R., Shenker, S., Estrin, D.: Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review 5(4), 11–25 (2001)CrossRefGoogle Scholar
  27. 27.
    Deng, J., Han, R., Mishra, S.: INSENS: Intrusion-tolerant routing in wireless Sensor NetworkS. Report CU CS-939-02, CS Dept., University of Colorado (2002)Google Scholar
  28. 28.
    He, Y., Raghavendra, C.S., Berson, S., Braden, B.: A Programmable Routing Framework for Autonomic Sensor Networks. In: Proc. of the 5th Annual International Workshop on Active Middleware Services (AMS 2003) (2003)Google Scholar
  29. 29.
    Legendre, F., de Amorim, M.D., Fdida, S.: Some Requirements for Autonomic Routing in Self-organizing Networks. In: Smirnov, M. (ed.) WAC 2004. LNCS, vol. 3457, pp. 13–24. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  30. 30.
    Santivanez, C., Stavrakakis, I.: Towards Adaptable Ad Hoc Networks: The routing Experience. In: Smirnov, M. (ed.) WAC 2004. LNCS, vol. 3457, pp. 229–244. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  31. 31.
    Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proc. of the ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003), Fairfax, VA (2003)Google Scholar
  32. 32.
    Lazos, L., Poovendran, R.: Energy-Aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information. In: Proc. of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003) (2003)Google Scholar
  33. 33.
    Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. In: Proc. of the ACM Workshop on Wireless Security (2003)Google Scholar
  34. 34.
    Lazos, L., Poovendran, R.: SeRLoc: secure range-independent localization for wireless sensor networks. In: Proc. of the ACM Workshop on Wireless Security, Philadelphia, PA (2004)Google Scholar
  35. 35.
    Capkun, S., Hubaux, J.P.: Secure Positioning of Wireless Devices with Appplication to Sensor Networks. In: Proc. of IEEE INFOCOM (to appear, 2005)Google Scholar
  36. 36.
    Du, W., Fang, L., Ning, P.: LAD: Localization Anomaly Detection for Wireless Sensor Networks. In: Proc. of the 5th IEEE Inter. Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN 2005) (2005)Google Scholar
  37. 37.
    Davide, F.: Strategic direction towards Autonomic Communication. Telecom Italia Learning Services (2004)Google Scholar
  38. 38.
    Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proc. of Workshop on Security and Assurance in Ad hoc Networks, Orlando, FL (2003)Google Scholar
  39. 39.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of the First International Conference on Embedded Networked Sensor Systems (SenSys), pp. 255–265 (2003)Google Scholar
  40. 40.
    Dimitriou, T., Foteinakis, D.: Secure In-Network Processing in Sensor Networks. In: Proc. of the 1st Workshop on Broadband Advanced Sensor Networks (IEEE BASENETS), San Francisco (2004)Google Scholar
  41. 41.
    Malan, D., Welsh, M., Smith, M.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: Proc. of the 1st IEEE Inter. Conference on Sensor and Ad Hoc Communications and Networks (2004)Google Scholar
  42. 42.
    Blass, E.-O., Zitterbart, M.: Towards Acceptable Public-Key Encryption in Sensor Networks. In: Proc. of the 2nd International Workshop on Ubiquitous Computing (to appear, 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tassos Dimitriou
    • 1
  • Ioannis Krontiris
    • 1
  1. 1.Athens Information TechnologyGreece

Personalised recommendations