Skip to main content

Energy-Memory-Security Tradeoffs in Distributed Sensor Networks

  • Conference paper
Book cover Ad-Hoc, Mobile, and Wireless Networks (ADHOC-NOW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3158))

Included in the following conference series:

Abstract

Security for sensor networks is challenging due to the resource-constrained nature of individual nodes, particularly their energy limitations. However, designing merely for energy savings may not result in a suitable security architecture. This paper investigates the inherent tradeoffs involved between energy, memory, and security robustness in distributed sensor networks. As a driver for the investigation, we introduce an energy-scalable key establishment protocol called cluster key grouping, which takes into account resource limitations in sensor nodes. We then define a metric (the security leakage factor) to quantify security robustness in a system. Finally, a framework called the security-memory-energy (SME) curve is presented that is used to evaluate and quantify the multi-metric tradeoffs involved in security design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kansal, A., Srivastava, M.B.: An environmental energy harvesting framework for sensor networks. In: Proc. Int. Symposium on Low power Electronics and Design (ISLPED 2003), August 2003, pp. 481–486 (2003)

    Google Scholar 

  2. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. 7th ACM Mobile Computing and Networks (MobiCom 2001), July 2001, pp. 189–199 (2001)

    Google Scholar 

  3. Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure pebblenets. In: Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001, pp. 156–163 (2001)

    Google Scholar 

  4. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conference on Computer and Communications security (CCS 2002), November 2002, pp. 41–47 (2002)

    Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Research in Security and Privacy, May 2003, pp. 197–213 (2003)

    Google Scholar 

  6. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM Conference on Computer and Communications security (CCS 2003), October 2003, pp. 42–51 (2003)

    Google Scholar 

  7. Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proc. 9th IEEE International Conference on Network Protocols (ICNP 2001), November 2001, pp. 251–260 (2001)

    Google Scholar 

  8. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network, 24–30 (November/December 1999)

    Google Scholar 

  9. Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001, pp. 156–163 (2001)

    Google Scholar 

  10. Wood, D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer, 54–62 (October 2002)

    Google Scholar 

  11. Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)

    Google Scholar 

  12. Carman, D.W., Kruss, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010 (September 2000)

    Google Scholar 

  13. Hodjat, A., Verbauwhede, I.: The energy cost of secrets in ad-hoc networks. In: Proc. IEEE CAS Workshop on Wireless Communication and Networking (September 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hwang, D.D., Lai, BC.C., Verbauwhede, I. (2004). Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2004. Lecture Notes in Computer Science, vol 3158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28634-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28634-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22543-0

  • Online ISBN: 978-3-540-28634-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics