Security in Mobile Wireless Sensor Networks: Attacks and Defenses

  • Amrita GhosalEmail author
  • Subir Halder
Part of the Studies in Computational Intelligence book series (SCI, volume 604)


In recent years wireless sensor networks (WSNs) are fast emerging as an important domain for both commercial and personal use. The advancement in robotics has enabled exploring another domain in WSNs i.e., mobile WSNs (MWSNs). A MWSN consists of a collection of nodes that can move on their own and interact with the physical environment. Several applications demand the need for mobility in nodes which, in general are static. Due to the nature of deployment of the nodes coupled with their resource constraints, providing security to such MWSNs have gained a prime importance. Also, they can be deployed in physically inaccessible environment as well as critical areas, and therefore the need to make them secure is very important. Mobility of nodes in MWSNs makes them more vulnerable to attacks by adversaries. Many works have been conducted in recent past where various promising solutions have been provided for detecting the attack, diagnosing the adversary nodes, and nullifying their capabilities for further damage in MWSNs. To start with, this chapter presents the need for MWSNs followed by security objectives, key issues and inherent challenges faced by these networks. Existing works dealing with basic security features and the different attacks faced by MWSNs are discussed. Finally, we give an insight into the possible directions for future work in securing MWSNs.


Sensor Node Mobile Node Network Lifetime Intrusion Detection System Malicious Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Sara, G.S., Sridharan, D.: Routing in mobile wireless sensor network: a survey. Telecommun. Syst. 57(1), 51–79 (2014)CrossRefGoogle Scholar
  2. 2.
    Anastasi, G., Conti, M., Francesco, M.D., Passarella, A.: Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw. 7(3), 537–568 (2009)CrossRefGoogle Scholar
  3. 3.
    Chellappan, S., Bai, X., Ma, B., Xuan, D., Xu, C.: Mobility limited flip-based sensor networks deployment. IEEE Trans. Parallel Distrib. Syst. 18(2), 199–211 (2007)Google Scholar
  4. 4.
    Yang, Y., Fonoage, M.I., Cardei, M.: Improving network lifetime with mobile wireless sensor networks. Comput. Commun. 33(4), 409–419 (2010)CrossRefGoogle Scholar
  5. 5.
    Dantu, K., Rahimi, M.H., Shah, H., Babel, S., Dhariwal, A., Sukhatme, G.S.: Robomote: enabling mobility in sensor networks. In: Proceedings of 4th International Symposium on Information Processing in Sensor Networks (IPSN), article no. 55 (2005)Google Scholar
  6. 6.
    Lee, U., Magistretti, E.O. Zhou, B.O., Gerla, M., Bellavista, P., Corradi, A.: Efficient data harvesting in mobile sensor platforms. In: Proceedings of 4th PerCom Workshops, pp. 352–356 (2006)Google Scholar
  7. 7.
    Munir, S.A., Ren, B., Jiao, W., Wang, B., Xie, D., Ma, J.: Mobile wireless sensor network: architecture and enabling technologies for ubiquitous computing. In: Proceedings of 21st AINA Workshops, vol. 2, pp. 113–120 (2007)Google Scholar
  8. 8.
    Ekici, E., Gu, Y., Bozdag, D.: Mobility-based communication in wireless sensor networks. IEEE Commun. Mag. 44(7), 56–62 (2006)CrossRefGoogle Scholar
  9. 9.
    Tilak, S., Kolar, V., Ghazaleh, N.B.A., Kang, K.D.: Dynamic localization control for mobile sensor networks. In: Proceedings of 24th IEEE International Performance, Computing and Communications Conference (IPCCC), pp. 587–592 (2005)Google Scholar
  10. 10.
    Kweon, K., Ghim, H., Hong, J., Yoon, H.: Grid-based energy efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks. In: Proceedings of 4th International Conference on Wireless Pervasive Computing, pp. 185–189 (2009)Google Scholar
  11. 11.
    Yu, F., Park, S., Lee, E., Kim, S.H.: Elastic routing: a novel geographic routing for mobile sinks in wireless sensor networks. IET Commun. 4(6), 716–727 (2010)CrossRefGoogle Scholar
  12. 12.
    Mir, Z.H., Ko, Y.B.: A quadtree-based hierarchical data dissemination for mobile sensor networks. Telecommun. Syst. 36(1–3), 117–128 (2007)CrossRefGoogle Scholar
  13. 13.
    Cao, G., Kesidis, G., Porta, T.L., Yao, B., Phoha, S.: Purposeful Mobility in Tactical Sensor Networks. Sensor Network Operations. Wiley-IEEE Press (2006)Google Scholar
  14. 14.
    Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)CrossRefGoogle Scholar
  15. 15.
    Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 10(3), 6–28 (2008)CrossRefGoogle Scholar
  16. 16.
    Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2), 52–73 (2009)CrossRefGoogle Scholar
  17. 17.
    Zin, S.M., Anuar, N.B., Kiah, M.L.M., Pathan, A.S.K.: Routing protocol design for secure wsn: review and open research issues. J. Netw. Comput. Appl. 41, 517–530 (2014)CrossRefGoogle Scholar
  18. 18.
    Xu, J., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)CrossRefGoogle Scholar
  19. 19.
    Park, J.H.: An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J. Supercomputing 62(1), 105–117 (2012)CrossRefGoogle Scholar
  20. 20.
    Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: Proceedings of 15th IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2014)Google Scholar
  21. 21.
    Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. ACM Sigplan Not. 37(10), 96–107 (2002)CrossRefGoogle Scholar
  22. 22.
    Friedman, J., Lee, D.C., Tsigkogiannis, I., Wong, S., Chao, D., Levin, D., Kaisera, W.J. Srivastava, M.B.: Ragobot: a new platform for wireless mobile sensor networks. In: Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS), LNCS-3560, p. 412 (2005)Google Scholar
  23. 23.
    Shah, C.R., Roy, S., Jain, S., Brunette, W.: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Netw. 1(2), 215–233 (2003)CrossRefGoogle Scholar
  24. 24.
    Wang, G., Cao, G., Porta, T., Zhang, W.: Sensor relocation in mobile sensor networks. In: Proceedings of 24th IEEE INFOCOM, vol. 4, pp. 2302–2312 (2005)Google Scholar
  25. 25.
    Amundson, I., Koutsoukos, X., Sallai, J.: Mobile sensor localization and navigation using RF doppler shifts. In: Proceedings of 1st International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT), pp. 97–102 (2008)Google Scholar
  26. 26.
    Fang, L., Antsaklis, P.J., Montestruque, L., Mcmickell, M.B., Lemmon, M., Sun, Y., Fang, H., Koutroulis, I., Haenggi, M., Xie, M., Xie, X.: Design of a wireless assisted pedestrian dead reckoning system-the navmote experience. IEEE Trans. Instrum. Measur. 54(6), 2342–2358 (2005)CrossRefGoogle Scholar
  27. 27.
    Chen, C., Ma, J., Yu, K.: Designing energy efficient wireless sensor networks with mobile sinks. In: Proceedings of Workshop on World-Sensor-Web (WSW) at ACM SenSys, pp. 1–6 (2006)Google Scholar
  28. 28.
    Wang, Q., Hempstead, M., Yang, W.: A realistic power consumption model for wireless sensor network devices. In: Proceedings of 3rd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), vol. 1, pp. 286–295 (2006)Google Scholar
  29. 29.
    Natalizio, E., Loscri, V.: Controlled mobility in mobile sensor networks: advantages, issues and challenges. Telecommun. Syst. 52(4), 2411–2418 (2013)CrossRefGoogle Scholar
  30. 30.
    Kansal, A., Somasundara, A.A., Jea, D.D., Srivastava, M.B., Estrin, D.: Intelligent fluid infrastructure for embedded networks. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 111–124 (2004)Google Scholar
  31. 31.
    Amundson, I., Koutsoukos, X.D.: A survey on localization for mobile wireless sensor networks. In: Proceedings of 2nd International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT), pp. 235–254 (2009)Google Scholar
  32. 32.
    Sakarindr, P., Ansari, N.: Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wirel. Commun. 14(5), 8–20 (2007)CrossRefGoogle Scholar
  33. 33.
    Conti, M., Pietro, R.D., Mancini, L.V., Mei, A.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of 1st ACM Conference on Wireless Network Security (WiSec), pp. 214–219 (2008)Google Scholar
  34. 34.
    Ren, Y., Oleshchuk, V., Li, F.Y., Sulistyo, S.: SCARKER: a sensor capture resistance and key refreshing scheme for mobile WSNs. In: Proceedings of 36th IEEE International Conference on Local Computer Networks (LCN), pp. 271–274 (2011)Google Scholar
  35. 35.
    Mostarda, L., Navarra, A.: Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. Int. J. Distrib. Sens. Netw. 4(2), 83–109 (2008)CrossRefGoogle Scholar
  36. 36.
    Zheng, X., Huang, C.T., Matthews, M.: In: Chinese remainder theorem based group key management. In: Proceedings of 45th ACM Annual Southeast Regional Conference (ACM-SE), pp. 266–271 (2007)Google Scholar
  37. 37.
    Sun Microsystems, Inc., Sun SPOT.
  38. 38.
    Ho, J.W., Wright, M., Das, S.K.: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: Proceedings of 28th IEEE INFOCOM, pp. 1773–1781 (2009)Google Scholar
  39. 39.
    Ho, J.W., Wright, M., Das, S.K.: Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Mob. Comput. 10(6), 767–782 (2011)CrossRefGoogle Scholar
  40. 40.
    Conti, M., Pietro, R.D., Spognardi, A.: Clone wars: distributed detection of clone attacks in mobile wsns. J. Comput. Syst. Sci. 80(3), 654–669 (2014)CrossRefzbMATHGoogle Scholar
  41. 41.
    Zhu, W.T., Zhou, J., Deng, R.H., Bao, F.: Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Netw. 5(5), 496–507 (2012)CrossRefGoogle Scholar
  42. 42.
    Yu, C.M., Lu, C.S., Kuo, S.Y.: Efficient and distributed detection of node replication attacks in mobile sensor networks. In: Proceedings of 70th International Vehicular Technology Conference Fall (VTC 2009-Fall), pp. 1–5 (2009)Google Scholar
  43. 43.
    Lou, Y., Zhang, Y., Liu, S.: Single hop detection of node clone attacks in mobile wireless sensor networks. In: Proceedings of International Workshop on Information and Electronics Engineering, PE-29, pp. 2798–2803 (2012)Google Scholar
  44. 44.
    Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks. In: Proceedings of 5th International Confernational on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 597–599 (2008)Google Scholar
  45. 45.
    Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)CrossRefGoogle Scholar
  46. 46.
    Schmidt, S., Krahn, H., Fischer, S., Wätjen, D.: A security architecture for mobile wireless sensor networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS), LNCS-3313, pp. 166–177 (2005)Google Scholar
  47. 47.
    Blundo, C., Santis, A.D., Herzberg, A., Kutton, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proceedings of 12th International Cryptology Conference (CRYPTO), LNCS-740, pp. 471–486 (1993)Google Scholar
  48. 48.
    Blom, R.: An optimal class of symmetric key generation systems. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT), LNCS-209, pp. 335–338 (1985)Google Scholar
  49. 49.
    Dworkin, M.: NIST Special Publication 800–38A: Recommendation for Block Cipher Modes of Operation. (2001)
  50. 50.
    Anderson, R., Biham, E., Knudsen, L.: Serpent: A proposal for the advanced encryption standard. NIST AES Proposal 174 (1998)Google Scholar
  51. 51.
    Bairaktaris, K., Chatzigiannakis, I., Liagkou, V., Spirakis, P.G.: Adaptive probabilistic secure routing in mobile wireless sensor networks. In: Proceedings of 16th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 208–212 (2008)Google Scholar
  52. 52.
    Fotouhi, H., Zuniga, M., Alves, M., Koubaa, A., Marron, P.: Smart-HOP: a reliable handoff mechanism for mobile wireless sensor networks. In: Proceedings of 9th European Conference on Wireless Sensor Networks (EWSN), LNCS 7158, pp. 131–146 (2012)Google Scholar
  53. 53.
    Stavrou, E., Pitsillides, A., Hadjichristofi, G., Hadjicostis, C.: Security in future mobile sensor networks issues and challenges. In: Proceedings of International Conference on Security and Cryptography (SECRYPT), pp. 1–9 (2010)Google Scholar
  54. 54.
    Luo, J., Hubaux, J.P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: Proceedings of 24th IEEE INFOCOM, pp. 1735–1746 (2005)Google Scholar
  55. 55.
    Wang, F., Liu, J.: Networked wireless sensor data collection: issues, challenges, and approaches. IEEE Commun. Surv. Tutorials 13(4), 673–687 (2011)CrossRefGoogle Scholar
  56. 56.
    Marron, P.J., Minder, D., Karnouskos, S.: The Emerging Domain of Cooperating Objects: Definitions and Concepts. Springer Publishing, New York (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringDr. B. C. Roy Engineering CollegeDurgapurIndia

Personalised recommendations