Skip to main content

Security for Wireless Sensor Networks

  • Chapter
Wireless Sensor Networks

Abstract

This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure supported wireless networks are briefly compared and contrasted to the security concerns of Wireless Sensor Networks. A framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities is defined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

REFERENCES

  1. S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston. A Clustering Approach to Secure Sensor Networks. Technical report, University of Maryland Baltimore County, 2003.

    Google Scholar 

  2. S. Avancha, J. Undercoffer, A. Joshi, and J. Pinkston. Secure Sensor Networks for Perimeter Protection. accepted for publication in Special Issue Computer Networks on Wireless Sensor Networks, 2003.

    Google Scholar 

  3. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Routing Protocol Resilent to Byzantine Failures. In ACM Workshop on Wireless Security (Wise), September 2002.

    Google Scholar 

  4. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure Pebblenets. In Proc. of MobiHOC’ 01, pages 156–163, October 2001.

    Google Scholar 

  5. S. Bhargava and D. P. Agrawal. Security Enhancements in AODV proocol for Wireless Ad hoc Networks. In Vehicular Technology Conference, May 2001.

    Google Scholar 

  6. Stuart Boyer. SACDA: Supervisory Control and Data Acquisition. ISA, Triangle Park, NC, January 1999.

    Google Scholar 

  7. D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and Approaches for Distributed Sensor Network Security (Final). Technical Report 00-010, NAI Labs, 2000.

    Google Scholar 

  8. S. Carter and A. Yasinsac. Secure Position Aided Ad hoc Routing Protocol. In Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), November 2002.

    Google Scholar 

  9. J. R. Douceur. The Sybil Attack. In Proc. IPTPS’ 02, March 2002.

    Google Scholar 

  10. L. Eschenauer and V. Gligor. A Key Management Scheme for Distributed Sensor Networks. In Proc. of ACM CCS 2002, November 2002.

    Google Scholar 

  11. X. Fu, B. Graham, R. Bettati, and W. Zhao. On Countermeasures to Traffic Analysis Attack. In Fourth IEEE SMC Information Assurance Workshop, 2003.

    Google Scholar 

  12. Y. Guan, X. Fu, D. Xuan, P. U. Shenoy, R. Bettati, and W. Zhao. Netcamo: Camouflaging network traffic for QOS-guaranteed critical applications. IEEE Trans. on Systems, Man, and Cybernetics Part a: Systems and Humans, Special Issue on Information Assurance, pages 253–265, July 2001.

    Google Scholar 

  13. R. Housley and W. Arbaugh. Security problems in 802.1 1-based networks. Communications of the ACM, 46(5):31–34, 2003.

    Article  Google Scholar 

  14. Spencer S. Hsu. Sensors may track terror’s fallout. The Washington Post. Page A01, June 2, 2003.

    Google Scholar 

  15. L. Hu and D. Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad hoc Networks, pages 384–391, January 2003.

    Google Scholar 

  16. Y. Hu, D. B. Johnson, and A. Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pages 3–13, June 2002.

    Google Scholar 

  17. Y. Hu, A. Penig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. In MobiCom 2002, September 2002.

    Google Scholar 

  18. Y. Hu, A. Perrig, and D. B. Johnson. Wormhole Detection in Wireless ad hoc Networks. Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.

    Google Scholar 

  19. C. Intanagonwiwat, R. Govindan, and D. Estrin. Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks. In Proc. of MobiCom’ 00, August 2000.

    Google Scholar 

  20. K. Kalpakis, K. Dasgupta, and P. Namjoshi. Efficient Algorithms for Maximum Lifetime Data Gathering and Aggregation in Wireless Sensor Networks. Technical Report TR-CS-02-13, University of Maryland Baltimore County, 2002.

    Google Scholar 

  21. C. Karlof and D. Wagner. Secure Routing in Sensor Networks: Attacks and Countermeasures. In Proc. of First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.

    Google Scholar 

  22. B. Krishnarnachari, D. Estrin, and S. B. Wicker. Modeling Data-Centric Routing in Wireless Sensor Networks. Technical Report CENG 02-14, Dept. of Computer Engineering, USC, 2002.

    Google Scholar 

  23. Y. W. Law, S. Dulman, S. Etalle, and P. Havinga. Assessing Security-Critical Energy-Efficient Sensor Networks. In Proc. of 18th IFIP International Information Security Conference, May 2003.

    Google Scholar 

  24. Robert Lewis. Modelling Distributed Control Systems Using IEC 61499. IEE, UK, February 2001.

    Google Scholar 

  25. S. Lindsey, C. S. Raghavendra, and K. M. Sivalingam. Data Gathering Algorithms in Sensor Networks Using Energy Metrics. IEEE Transactions on Parallel and Distributed Systems, 13(9):924–935, September 2002.

    Article  Google Scholar 

  26. S. R. Madden and M. J. Franklin.Fjording the Stream: An Architecture for Queries over Streaming Sensor Data. In Proc. of 18th International Conference on Data Engineering, February 2002.

    Google Scholar 

  27. S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong. TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In Proc. of Fiflh Symposium on Operating Systems Design and Implementation (USENIX-OSDI’ 02), December 2002.

    Google Scholar 

  28. National Institute of Standards and Technology. FIPS 46-2; Data Encryption Standard, December 1993.

    Google Scholar 

  29. P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad hoc Networks. In Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), January 2002.

    Google Scholar 

  30. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINET), 8(5):521–534, September 2002.

    Article  Google Scholar 

  31. J. Raymond. Traffic Analysis: Protocols, attacks, design issues and open problems. In H. Federrath, itor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10–29,2001.

    Google Scholar 

  32. S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. On Communication Security in Wireless Ad-Hoc Sensor Networks. In Proc. of WETICE, pages 139–144,2002.

    Google Scholar 

  33. Tony Wilson. Cybercrime’s New Foe. The Gold Coast Bulletin (Australia). Page 14, October 25,2002.

    Google Scholar 

  34. Y. Yao and J. E. Gehrke. The Cougar Approach to In-Network Query Processing in Sensor Networks. SIGMOD Record, 31(3):9–18, September 2002.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J. (2004). Security for Wireless Sensor Networks. In: Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds) Wireless Sensor Networks. Springer, Boston, MA. https://doi.org/10.1007/978-1-4020-7884-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-7884-2_12

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-35269-5

  • Online ISBN: 978-1-4020-7884-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics