Skip to main content

Secure Data Management in Reactive Sensor Networks

  • Conference paper
Information Systems Security (ICISS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4332))

Included in the following conference series:

  • 949 Accesses

Abstract

A wireless sensor network (WSN), an ad hoc network of resource constrained sensor nodes, has become an attractive option for monitoring applications. The wide use of sensor networks is due to the cheap hardware and detailed information they provide to the end user. As with every network of every computing device, security is one of the key issue of sensor networks. The resource constrained nature of sensor nodes make the security quite challenging. The sensor networks are prone to many kinds of security attack viz. report fabrication attack, denial of service attack, Sybil attack, traffic analysis attack, node replication attack, physical attack etc. The report fabrication attack is a security attack in which the adversary tries to generate bogus reports by compromising the sensor nodes. This paper proposes a security solution that makes cluster based sensor networks resilient to report fabrication attacks. The proposed solution relies on symmetric key mechanisms, appropriate for random deployment and also handles the node failures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zia, T.A.: An overview of wireless sensor networks and their security issues. In: Google Scholar

    Google Scholar 

  2. Ibriq, J., Mahgoub, I.: Cluster-based routing in wireless sensor networks: Issues and challenges. In: Proceedings of symposium on performance evaluation of computer and telecommunication systems (SPECTS 2004), pp. 759–766 (2004)

    Google Scholar 

  3. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6), 38–43 (2004)

    Article  Google Scholar 

  4. Brennan, S.M., Mielke, A.M., Torney, D.C., Maccabe, A.B.: Radiation detection with distributed sensor networks. IEEE Computer 37(8), 57–59 (2004)

    Google Scholar 

  5. Law, Y.W., Havinga, P.J.M.: How to secure a wireless sensor network. In: Proceedings of the International Conference on Intelligent Sensors, Sensor Networks and Information Processing, pp. 89–95 (2005)

    Google Scholar 

  6. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks security: A survey. International Journal of Computer and Telecommunications Networking 38, 393–422 (2002)

    Google Scholar 

  7. Anastasi, G., Conti, M., Gregori, E., Falchi, A., Passarella, A.: Performance measurements of mote sensor networks. In: Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, Venice, Italy, pp. 174–181 (2004)

    Google Scholar 

  8. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Seventh Annual International Conference on Mobile Computing and Networks (MobiCOM 2001), pp. 189–199 (2001)

    Google Scholar 

  9. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In: IEEE Symposium on Security and Privacy, pp. 259–271. IEEE Computer Society, Los Alamitos (2004)

    Google Scholar 

  10. Singh, M.P., Gore, M.M.: A new energy-efficient clustering protocol for wireless sensor networks. In: Second International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP 2005), Melbourn, Australia, pp. 25–30 (2005)

    Google Scholar 

  11. Dimitriou, T., Krontiris, I.: A localized, distributed protocol for secure information exchange in sensor networks. In: Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium(IPDPS), p. 240.1. IEEE Computer Society Press, Washington (2005)

    Chapter  Google Scholar 

  12. Perrig, A., Stankovic, J.A., Wagner, D.: Security in wireless sensor networks. Communication ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  13. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 62–72. ACM Press, New York (2003)

    Chapter  Google Scholar 

  14. Yang, H., Ye, F., Yuan, Y., Lu, S., Arbaugh, W.A.: Toward resilient security in wireless sensor networks. In: Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, pp. 34–45. ACM Press, New York (2005)

    Chapter  Google Scholar 

  15. Oliveira, L.B., Wang, H.C., Loureiro, A.: LHA-SP: secure protocols for hierarchical wireless sensor networks. In: 9th IFIP/IEEE International Symposium on Integrated Network Management, Department of Computer Science, Federal University of Minas Gerais, Brazil, pp. 31–44 (2005)

    Google Scholar 

  16. Guimarães, G., Souto, E., Sadok, D.F.H., Kelner, J.: Evaluation of security mechanisms in wireless sensor networks. In: ICW/ICHSN/ICMCS/SENET, pp. 428–433. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  17. Levis, P., Lee, N., Welsh, M., Culler, D.: TOSSIM: accurate and scalable simulation of entire tinyOS applications. In: Proceedings of the first international conference on Embedded networked sensor systems (SenSys 2003), pp. 126–137. ACM Press, New York (2003)

    Chapter  Google Scholar 

  18. Chaithanya, L.: Secure data management in reactive sensor network. Master’s thesis, Department of Computer Science and Engineering, Motilal Nehru National Institute of Techology, Allahabad, Uttar Pradesh, India (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chaithanya, L., Singh, M.P., Gore, M.M. (2006). Secure Data Management in Reactive Sensor Networks. In: Bagchi, A., Atluri, V. (eds) Information Systems Security. ICISS 2006. Lecture Notes in Computer Science, vol 4332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11961635_16

Download citation

  • DOI: https://doi.org/10.1007/11961635_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68962-1

  • Online ISBN: 978-3-540-68963-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics