Abstract
Security for sensor networks is challenging due to the resource-constrained nature of individual nodes, particularly their energy limitations. However, designing merely for energy savings may not result in a suitable security architecture. This paper investigates the inherent tradeoffs involved between energy, memory, and security robustness in distributed sensor networks. As a driver for the investigation, we introduce an energy-scalable key establishment protocol called cluster key grouping, which takes into account resource limitations in sensor nodes. We then define a metric (the security leakage factor) to quantify security robustness in a system. Finally, a framework called the security-memory-energy (SME) curve is presented that is used to evaluate and quantify the multi-metric tradeoffs involved in security design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kansal, A., Srivastava, M.B.: An environmental energy harvesting framework for sensor networks. In: Proc. Int. Symposium on Low power Electronics and Design (ISLPED 2003), August 2003, pp. 481–486 (2003)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. 7th ACM Mobile Computing and Networks (MobiCom 2001), July 2001, pp. 189–199 (2001)
Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure pebblenets. In: Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001, pp. 156–163 (2001)
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conference on Computer and Communications security (CCS 2002), November 2002, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Research in Security and Privacy, May 2003, pp. 197–213 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM Conference on Computer and Communications security (CCS 2003), October 2003, pp. 42–51 (2003)
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L.: Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proc. 9th IEEE International Conference on Network Protocols (ICNP 2001), November 2001, pp. 251–260 (2001)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network, 24–30 (November/December 1999)
Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: Proc. 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2001), October 2001, pp. 156–163 (2001)
Wood, D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer, 54–62 (October 2002)
Stajano, F., Anderson, R.: The resurrecting duckling: security issues for ad-hoc wireless networks. In: Malcolm, J.A., Christianson, B., Crispo, B., Roe, M. (eds.) Security Protocols 1999. LNCS, vol. 1796, Springer, Heidelberg (2000)
Carman, D.W., Kruss, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010 (September 2000)
Hodjat, A., Verbauwhede, I.: The energy cost of secrets in ad-hoc networks. In: Proc. IEEE CAS Workshop on Wireless Communication and Networking (September 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hwang, D.D., Lai, BC.C., Verbauwhede, I. (2004). Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2004. Lecture Notes in Computer Science, vol 3158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28634-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-28634-9_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22543-0
Online ISBN: 978-3-540-28634-9
eBook Packages: Springer Book Archive