Advertisement

Security in Wireless Sensor Networks: Considerations and Experiments

  • Panu Hämäläinen
  • Mauri Kuorilehto
  • Timo Alho
  • Marko Hännikäinen
  • Timo D. Hämäläinen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4017)

Abstract

Wireless Sensor Networks (WSN) are seen as attractive solutions for various monitoring and controlling applications, a large part of which require protection. Due to the special characteristics of WSNs, e.g. low processing and energy resources and ad hoc networking, developing a reliable security solution becomes a challenging task. In this paper we survey various security aspects of WSNs, consisting of threats, attacks, and proposed solutions. We also present experiments with our own WSN technology (TUTWSN), concentrating on a centralized key distribution and authentication service. Our experiments suggest that a centralized scheme can be a feasible solution in certain WSN configurations.

Keywords

Wireless Sensor Network Authentication Scheme Block Cipher Advance Encryption Standard Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Stankovic, J.A., Abdelzaher, T.F., Lu, C., Sha, L., Hou, J.C.: Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE 91, 1002–1022 (2003)CrossRefGoogle Scholar
  2. 2.
    Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Security for Wireless Sensor Networks. In: [26], pp. 253–275Google Scholar
  3. 3.
    Kohvakka, M., Hännikäinen, M., Hämäläinen, T.D.: Ultra low energy wireless temperature sensor network implementation. In: Proc. 16th IEEE Int. Symp. Personal Indoor and Mobile Radio Comm. (PIMRC 2005), Berlin, Germany (2005)Google Scholar
  4. 4.
    Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice-Hall, USA (1995)Google Scholar
  5. 5.
    Karloff, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier Ad Hoc Networks 1, 293–315 (2003)CrossRefGoogle Scholar
  6. 6.
    Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Comm. 11, 38–43 (2004)Google Scholar
  7. 7.
    Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)CrossRefGoogle Scholar
  8. 8.
    Wood, A., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35, 54–62 (2002)Google Scholar
  9. 9.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proc. 2nd Int. Conf. Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, USA, pp. 162–175 (2004)Google Scholar
  10. 10.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Kluwer Wireless Networks, 521–534 (2002)Google Scholar
  11. 11.
    IEEE: IEEE Std. 802.15.4. (2003)Google Scholar
  12. 12.
    ZigBee Alliance: ZigBee Specification Version 1.0. (2004)Google Scholar
  13. 13.
    NIST: Advanced Encryption Standard (FIPS-197) (2001)Google Scholar
  14. 14.
    Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks. In: [26], pp. 277–303Google Scholar
  15. 15.
    Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. Elsevier Pervasive and Mobile Computing, 425–445 (2005)Google Scholar
  16. 16.
    Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  17. 17.
    Gaubatz, G., Kaps, J.P., Öztürk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proc. Workshop on Pervasive Computing and Comm. Security (PerSec 2005), Kauai Island, HI, USA, pp. 146–150 (2005)Google Scholar
  18. 18.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanism for large-scale distributed sensor networks. In: Proc. 10th ACM Conf. Computer and Comm. Security (CCS 2003), Washington D.C., USA, pp. 62–72 (2003)Google Scholar
  19. 19.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conf. Computer and Comm. Security (CCS 2002), Washington D.C., USA, pp. 41–47 (2002)Google Scholar
  20. 20.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable and Secure Computing 3, 62–77 (2006)CrossRefGoogle Scholar
  21. 21.
    Kohl, J., Neuman, C.: The Kerberos network authentication service (V5). RFC 1510 (1993)Google Scholar
  22. 22.
    Dworkin, M.: Recommendations for Block Cipher Modes of Operation: The CMAC Mode for Authentication (Special Publication 800–38B), NIST (2005)Google Scholar
  23. 23.
    Microchip Technology Inc.: Application note 953: Data Encryption Routines for the PIC18 (2005)Google Scholar
  24. 24.
    Atmel Corporation: 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash – ATmega128 and ATmega128L, Rev. 2467M-AVR-11/04 (2004)Google Scholar
  25. 25.
    Hämäläinen, P., Alho, T., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core (unpublished, 2006)Google Scholar
  26. 26.
    Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.): Wireless Sensor Networks, 1st edn. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Panu Hämäläinen
    • 1
  • Mauri Kuorilehto
    • 1
  • Timo Alho
    • 1
  • Marko Hännikäinen
    • 1
  • Timo D. Hämäläinen
    • 1
  1. 1.Institute of Digital and Computer SystemsTampere University of TechnologyTampereFinland

Personalised recommendations