Advertisement

A Survivable Distributed Sensor Networks Through Stochastic Models

  • Dong Seong Kim
  • Jong Sou Park
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4331)

Abstract

The previous security architectures and mechanisms for distributed sensor networks only focus on confidentiality, integrity and authentication. The distributed sensor networks should have the ability to provide essential services in the presence of attacks and failures, and recover full services in a timely manner. In this paper, we present stochastic models for survivable distributed sensor networks. We define states of cluster based sensor networks and analyze the distributed sensor networks using stochastic models in mathematical manner. The evaluation results with the proof of concept scenario show our approach has a feasibility to design survivable distributed sensor networks.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Intrusion Detection System Malicious Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Avancha, S., Undercoffer, J.L., Joshi, A., Pinkston, J.: Security for Sensor Networks. In: Wireless Sensor Networks, pp. 253–275. Kluwer Academic, Dordrecht (2004)CrossRefGoogle Scholar
  2. 2.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Int. Conf. on Embedded Networked Sensor System, pp. 162–175. ACM Press, New York (2004)CrossRefGoogle Scholar
  3. 3.
    Ellison, B., Fisher, D., Linger, R., Lipson, H., Longstaff, T., Mead, N.: Survivable Net-works Systems: An Emergin Discipline. Technical Report, CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University (1997)Google Scholar
  4. 4.
    Ellison, R.J., Linger, R.C., Longstaff, T., Mead, N.R.: Survivable Network System Analysis: A Case Study. IEEE software 16(4), 70–77 (1999)CrossRefGoogle Scholar
  5. 5.
    Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In: Proc. of the 33rd Annual Hawaii Int. Conf. on System Sciences, pp. 3005–3014. IEEE Computer Society Press, Los Alamitos (2000)Google Scholar
  6. 6.
    Hu, F., Tillet, J., Ziobro, J., Sharma, N.: Secure Wireless Sensor Networks: Problems and Solutions. J. on Systemics, Cybernetics and Informatics 1(9) (2004)Google Scholar
  7. 7.
    Jones, K., Wadaa, A., Olariu, S., Wilson, L.: Towards a New Paradigm for Securing Wire-less Sensor Networks. In: New Security Paradigms Workshop, pp. 115–121. ACM Press, New York (2003)Google Scholar
  8. 8.
    Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a Rigorous Definition of Information Security Survivability. In: Proc. of the DARPA Information Survivability Conf. and Exposition, pp. 78–89. IEEE Computer society, Los Alamitos (2003)CrossRefGoogle Scholar
  9. 9.
    Law, Y.W., Havinga, P.J.M.: How to Secure a Wireless Sensor Network. In: Proc. of Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing, pp. 89–95. IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  10. 10.
    Liu, Y., Trivedi, K.S.: A General Framework for Network Survivability Quantification. In: Proc. of the 12th GI/ITG Conf. on Measuring, Modelling and Evaluation of Computer and Communication Systems, pp. 369–378 (2004)Google Scholar
  11. 11.
    Liu, Z., Wang, Y.: A Secure Agent Architecture for Sensor Networks. In: Int. Conf. on Artificial Intelligence (2003)Google Scholar
  12. 12.
    Park, T., Shin, K.: LiSP: A Lightweight Security Protocol for Wireless Sensor Networks. ACM trans. on Embedded Computing Systems 3(3), 634–660 (2004)CrossRefGoogle Scholar
  13. 13.
    Paul, K., RoyChoudhuri, R.R., Bandyopadhyay, S.: Survivability Analysis of Ad Hoc Wireless Network Architecture. In: Omidyar, C.G. (ed.) MWCN 2000 and NETWORKING-WS 2000. LNCS, vol. 1818, pp. 31–46. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    Paul, K., Choudhuri, R.R., Bandyopadhyay, S.: Survivable Ad Hoc Wireless Networks: Some Design Specifications. In: Int. Conf. on Multiaccess, Mobility And Teletraffic for Wireless Communications, pp. 147–158. Kluwer Academic Publishers, Dordrecht (2000)Google Scholar
  15. 15.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proc. of Int. Conf. on Mobile Computing and Networking., pp. 189–199. ACM Press, New York (2001)Google Scholar
  16. 16.
    Savola, R.: Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. In: Proc. of the 3rd Australian Information Security Management Conf., pp. 88–94 (2005)Google Scholar
  17. 17.
    Schmidt, S., Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 166–177. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  18. 18.
    Shaikh, R.A., Lee, S., Song, Y., Zhung, Y.: Securing Distributed Wireless Sensor Net-works: Issues and Guidelines. In: Proc. of Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 226–231. IEEE computer society, Los Alamitos (2006)CrossRefGoogle Scholar
  19. 19.
    Snow, A.P., Varshney, U., Malloy, A.D.: Reliability and Survivability of Mobile and Wire-less Networks. IEEE Computer 33(7), 49–55 (2000)Google Scholar
  20. 20.
    Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd edn. John Wiley & Sons, Chichester (2001)Google Scholar
  21. 21.
    Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publica-tions, CRC Press (2006)Google Scholar
  22. 22.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distrib-uted sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Comm. Security, pp. 62–72. ACM Press, New York (2003)CrossRefGoogle Scholar
  23. 23.
    Zia, T., Zomaya, A.: A Security Framework for Wireless Sensor Networks. In: Sym. Sen-sor Applications, pp. 49–53. IEEE Computer Society, Los Alamitos (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dong Seong Kim
    • 1
  • Jong Sou Park
    • 1
  1. 1.Network Security Lab.Hankuk Aviation UniversitySeoulKorea

Personalised recommendations