Abstract
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure supported wireless networks are briefly compared and contrasted to the security concerns of Wireless Sensor Networks. A framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities is defined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
REFERENCES
S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston. A Clustering Approach to Secure Sensor Networks. Technical report, University of Maryland Baltimore County, 2003.
S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston. Secure Sensor Networks for Perimeter Protection. accepted for publication in Special Issue Computer Networks on Wireless Sensor Networks, 2003.
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Routing Protocol Resilent to Byzantine Failures. In ACM Workshop on Wireless Security (Wise), September 2002.
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure Pebblenets. In Proc. of MobiHOC’ 01, pages 156–163, October 2001.
S. Bhargava and D. P. Agrawal. Security Enhancements in AODV proocol for Wireless Ad hoc Networks. In Vehicular Technology Conference, May 2001.
Stuart Boyer. SACDA: Supervisory Control and Data Acquisition. ISA, Triangle Park, NC, January 1999.
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and Approaches for Distributed Sensor Network Security (Final). Technical Report 00-010, NAI Labs, 2000.
S. Carter and A. Yasinsac. Secure Position Aided Ad hoc Routing Protocol. In Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), November 2002.
J. R. Douceur. The Sybil Attack. In Proc. IPTPS’ 02, March 2002.
L. Eschenauer and V. Gligor. A Key Management Scheme for Distributed Sensor Networks. In Proc. of ACM CCS 2002, November 2002.
X. Fu, B. Graham, R. Bettati, and W. Zhao. On Countermeasures to Traffic Analysis Attack. In Fourth IEEE SMC Information Assurance Workshop, 2003.
Y. Guan, X. Fu, D. Xuan, P. U. Shenoy, R. Bettati, and W. Zhao. Netcamo: Camouflaging network traffic for QOS-guaranteed critical applications. IEEE Trans. on Systems, Man, and Cybernetics Part a: Systems and Humans, Special Issue on Information Assurance, pages 253–265, July 2001.
R. Housley and W. Arbaugh. Security problems in 802.1 1-based networks. Communications of the ACM, 46(5):31–34, 2003.
Spencer S. Hsu. Sensors may track terror’s fallout. The Washington Post. Page A01, June 2, 2003.
L. Hu and D. Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad hoc Networks, pages 384–391, January 2003.
Y. Hu, D. B. Johnson, and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pages 3–13, June 2002.
Y. Hu, A. Penig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In MobiCom 2002, September 2002.
Y. Hu, A. Perrig, and D. B. Johnson. Wormhole Detection in Wireless ad hoc Networks. Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proc. of MobiCom’ 00, August 2000.
K. Kalpakis, K. Dasgupta, and P. Namjoshi. Efficient Algorithms for Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks. Technical Report TR-CS-02-13, University of Maryland Baltimore County, 2002.
C. Karlof and D. Wagner. Secure Routing in Sensor Networks: Attacks and Countermeasures. In Proc. of First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
B. Krishnarnachari, D. Estrin, and S. B. Wicker. Modeling Data-Centric Routing in Wireless Sensor Networks. Technical Report CENG 02-14, Dept. of Computer Engineering, USC, 2002.
Y. W. Law, S. Dulman, S. Etalle, and P. Havinga. Assessing Security-Critical Energy-Efficient Sensor Networks. In Proc. of 18th IFIP International Information Security Conference, May 2003.
Robert Lewis. Modelling Distributed Control Systems Using IEC 61499. IEE, UK, February 2001.
S. Lindsey, C. S. Raghavendra, and K. M. Sivalingam. Data Gathering Algorithms in Sensor Networks Using Energy Metrics. IEEE Transactions on Parallel and Distributed Systems, 13(9):924–935, September 2002.
S. R. Madden and M. J. Franklin.Fjording the Stream: An Architecture for Queries over Streaming Sensor Data. In Proc. of 18th International Conference on Data Engineering, February 2002.
S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In Proc. of Fiflh Symposium on Operating Systems Design and Implementation (USENIX-OSDI’ 02), December 2002.
National Institute of Standards and Technology. FIPS 46-2; Data Encryption Standard, December 1993.
P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad hoc Networks. In Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINET), 8(5):521–534, September 2002.
J. Raymond. Traffic Analysis: Protocols, attacks, design issues and open problems. In H. Federrath, itor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10–29,2001.
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. On Communication Security in Wireless Ad-Hoc Sensor Networks. In Proc. of WETICE, pages 139–144,2002.
Tony Wilson. Cybercrime’s New Foe. The Gold Coast Bulletin (Australia). Page 14, October 25,2002.
Y. Yao and J. E. Gehrke. The Cougar Approach to In-Network Query Processing in Sensor Networks. SIGMOD Record, 31(3):9–18, September 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J. (2004). Security for Wireless Sensor Networks. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds) Wireless Sensor Networks. Springer, Boston, MA. https://doi.org/10.1007/978-1-4020-7884-2_12
Download citation
DOI: https://doi.org/10.1007/978-1-4020-7884-2_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-35269-5
Online ISBN: 978-1-4020-7884-2
eBook Packages: Springer Book Archive