Security in Sensor Networks

Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to detect, monitor, and track physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants, at different locations [1]. A sensor, similar to that in Fig. 19.1, is a small device that produces a measurable response to a change in a physical condition. Sensor nodes can be independently used to measure a physical quantity and to convert it into a signal that can be read by an observer or by an instrument [1]. The network may consist of just a few or thousands of tiny, mostly immobile, usually, randomly deployed nodes, covering a small or large geographical area. In many cases, sensor networks do not require predetermined positioning when they are randomly deployed, making them viable for inaccessible terrains where they can quickly self-organize and form a network on the fly.

Keywords

Transportation Production Line 

References

  1. 1.
  2. 2.
    Seapahn, M., Koushanfar, F., Potkonjak, M., and Srivastava, M. B. Coverage Problems in Wireless Ad-hoc Sensor Networks. http://www.ece.rice.edu/~fk1/papers/Infocom_coverage_01.pdf.
  3. 3.
    David, C., Estrin, D., and Mani, S. M. “Overview of Sensor Networks.” Computer. August 2004, pp 41–50. http://www.archrock.com/downloads/resources/IEEE-overview-2004.pdf.
  4. 4.
    Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, A. “A Survey on Sensor Networks,” IEEE Communications Magazine, August 2002, pp 102–114.Google Scholar
  5. 5.
    Jay, W. Smart Sensor Networks of the Future. DA Systems. http://archives.sensorsmag.com/articles/0397/net_mar/main.shtml.
  6. 6.
    Ortiz, J., Moon, D., and Baker, C. R. Location Service for Point-to-Point Routing in Wireless Sensor Networks. http://www.cs.berkeley.edu/~jortiz/papers/cs268_ortiz_moon_baker.pdf.
  7. 7.
    Sure, A., Iyengar, S. S., and Cho E. “Ecoinformatics Using Wireless sensor Networks: An Overview.” Ecological Informatics. 2006 1, 287–293.CrossRefGoogle Scholar
  8. 8.
    Subramanian, N. V. K. Survey on Energy-Aware Routing and Routing Protocols for Sensor Networks. http://archives.cs.iastate.edu/documents/disk0/00/00/05/19/00000519-00/energy_sr.pdf.
  9. 9.
    Krishnamachari, B., Estrin, D., and Wicker, S. The Impact of Data Aggregation in Wireless Sensor Networks. http://lecs.cs.ucla.edu/Publications/papers/krishnamacharib_aggregation.pdf.
  10. 10.
    Pradip De, Yonghe Liu, and Sajal K. Das. “Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory,” Proceedings of the 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06). http://delivery.acm.org/10.1145/1140000/1139411/25930237.pdf?key1=1139411&key2=1877208021&coll=ACM&dl=ACM&CFID=63535215&CFTOKEN=62146412.
  11. 11.
    Stankovic, J. A. Research Challenges for Wireless Sensor Networks. http://doi.acm.org/ 10.1145/1121776.1121780.
  12. 12.
    Anand, M., Ives, Z., and Lee, I. “Quantifying Eavesdropping Vulnerability in Sensor Networks”, ACM International Conference Proceeding Series; Vol. 96. Proceedings of the 2nd international workshop on Data management for sensor networks. http://delivery.acm.org/10.1145/1090000/1080887/p3-anand.pdf?key1=1080887&key2=9635208021&coll=ACM&dl=ACM&CFID=63535215&CFTOKEN=62146412.
  13. 13.
    Hu, Y. C., Perrig, A., and Johnson, D. B. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. http://www.monarch.cs.rice.edu/monarch-papers/wise03.pdf.
  14. 14.
    Perrig, A. Secure Routing in Sensor Networks. http://www.cylab.cmu.edu/default.aspx?id=1985.
  15. 15.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D. SPINS: Security Protocols for Sensor Networks. http://www.ece.cmu.edu/~adrian/projects/mc2001/mc2001.pdf.
  16. 16.
    Perrig, A., Stankovic, J., and Wagner, D. “Security in Wireless Sensor Networks.” Communication of the ACM, 2004 47(6) 53–57.CrossRefGoogle Scholar
  17. 17.
    Eschenauer, L. and Gligor, V.D. “A Key-management Scheme for Distributed Sensor Networks.” In ACM Conference on Computer and Communications Security, 2002.Google Scholar
  18. 18.
    Sabbah, E., Majeed, A., Kyoung-Don, K., Liu, K., and Abu-Ghazaleh, N. “An Application-Driven Perspective on Wireless Sensor Network Security,” Q2SWinet’06, October 2, 2006.Google Scholar
  19. 19.
    Zhu, S., Setia, S., and Jajodia, S. “LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks”. In the 10th ACM Conference on Computer and Communication Security (CCS ’03), 2003.Google Scholar
  20. 20.
    Karlof, C., Sastry, N., and Wagner, D. “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”. In ACM SenSys, 2004.Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of Tennessee-ChattanoogaChattanoogaUSA

Personalised recommendations