Skip to main content

Security in Sensor Networks

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 192k Accesses

Abstract

The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to detect, monitor, and track physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants, at different locations [1]. A sensor, similar to that in Fig. 19.1, is a small device that produces a measurable response to a change in a physical condition. Sensor nodes can be independently used to measure a physical quantity and to convert it into a signal that can be read by an observer or by an instrument [1]. The network may consist of just a few or thousands of tiny, mostly immobile, usually, randomly deployed nodes, covering a small or large geographic area. In many cases, sensor networks do not require predetermined positioning when they are randomly deployed making them viable for inaccessible terrains where they can quickly self-organize and form a network on the fly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wikipedia. http://en.wikipedia.org/wiki/Sensor

  2. Seapahn M, Koushanfar F, Potkonjak M, Srivastava MB. Coverage problems in wireless Ad-hoc sensor networks. http://web.cs.ucla.edu/~miodrag/papers/Meguerdichian_Infocom_01.pdf

  3. David C, Estrin D, Mani SM (2004) Overview of sensor networks. Computer 37:41–50

    Google Scholar 

  4. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci A (2002) A survey on sensor networks. IEEE Commun Mag 40:102–114

    Article  Google Scholar 

  5. Jay W. Smart sensor networks of the future. DA Systems. http://archives.sensorsmag.com/articles/0397/net_mar/main.shtml

  6. Ortiz J, Moon D, Baker CR. Location service for point-to-point routing in wireless sensor networks. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.87.710&rep=rep1&type=pdf

  7. Sure A, Iyengar SS, Cho E (2006) Ecoinformatics using wireless sensor networks: an overview. Ecolo Inform 1:287–293

    Article  Google Scholar 

  8. Subramanian NVK. Survey on energy-aware routing and routing protocols for sensor networks. http://www.csee.umbc.edu/~younis/Publications/JAdHoc/SensNetRouting.pdf

  9. Krishnamachari B, Estrin D, Wicker S. The impact of data aggregation in wireless sensor networks. ACM Digital Library. http://dl.acm.org/citation.cfm?id=708078

  10. De P, Liu Y, Das SK (2006) Modeling node compromise spread in wireless sensor networks using epidemic theory. In: Proceedings of the 2006 international symposium on a world of wireless, mobile and multimedia networks (WoWMoM’06)

    Google Scholar 

  11. Stankovic JA. Research challenges for wireless sensor networks. http://doi.acm.org/10.1145/1121776.1121780

  12. Anand M, Ives Z, Lee I (2005) Quantifying eavesdropping vulnerability in sensor networks, ACM international conference proceeding series. In: Proceedings of the 2nd international workshop on data management for sensor networks, vol 96

    Google Scholar 

  13. Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless Ad Hoc network routing protocols. ACM Digital Library. http://dl.acm.org/citation.cfm?id=941317

  14. Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. http://www.csee.umbc.edu/courses/graduate/CMSC691A/Spring04/papers/sensor-route.pdf

  15. Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2002) SPINS: security protocols for sensor networks. http://www.netsec.ethz.ch/publications/papers/mc2001.pdf

  16. Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

    Article  Google Scholar 

  17. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: ACM conference on computer and communications security. ACM, New York

    Google Scholar 

  18. Sabbah E, Majeed A, Kyoung-Don K, Liu K, Abu-Ghazaleh N (2006) An application-driven perspective on wireless sensor network security. Q2SWinet’06, October 2, 2006

    Google Scholar 

  19. Zhu S, Setia S, Jajodia S (2003) LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: The 10th ACM conference on computer and communication security (CCS ’03), 2003

    Google Scholar 

  20. Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: ACM SenSys, 2004

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Kizza, J.M. (2017). Security in Sensor Networks. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-55606-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-55606-2_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-55605-5

  • Online ISBN: 978-3-319-55606-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics