Abstract
In recent years, thanks to technology advances in low-power wirelessly networked systems and, we have witnessed the emergence of Wireless Sensor Networks (WSNs) and embedded computing technologies in many fields of our life; which range from military to medical applications and from industry to home appliances. Although most of researchers focus on designing protocols that maximizes both the processing capabilities and energy reserves, many of these protocols pay little attention to securing this WSNs. Nowadays, security goal is vital for ensuring the performance and the acceptance of the wireless sensor networks in many recent applications. This goal is still a challenge on account of the constraint resources of these wireless sensor nodes. This chapter givesan overviewof the desired security services required for the WSNs, their threats model and finally the chapter presents in details different pairwise key distribution security techniques for distribution WSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
http://www.itu.int (2014). Accessed 16 Jan 2014
I.-T.R. X.800: Security Architecture for Open Systems Interconnection for CCITT Applications, Geneva (1991)
Ozgur, A., Lévêque, O., Tse, D.: Spatial degrees of freedom of large distributed MIMO systems and wireless ad hoc networks. IEEE J. Sel. Areas Commun. 31(2), 202–214 (2013)
Yassine, M., Ezzati, A.: A review of security attacks and intrusion detection schemes in wireless sensor network. Int. J. Wireless Mob. Netw. 5(6), 79 (2013)
Aashima, S., Sachdeva, R.: Review on security issues and attacks in wireless sensor networks. Int. J. 10(1), 1–24 (2013)
Singh, S.K., Singh, M.P., Singh, D.K: A survey on network security and attack defense mechanism for wireless sensor networks. Int. J. Comput. Trends Technol. 1(1) (2011) (ISSN: 2231–2803)
Gopalakrishnan, S.: A survey of wireless network security. Int. J. Comput. Sci. Mobile Comput. 3(1), 53–68 (2014)
Fouad, M.M.M., El-Bendary, N., Ramadan, R.A., Hassanien, A.E.: Wireless sensor networks: a medical perspective. In: Wireless Sensor Networks: From Theory to Applications Book, CRC Press, USA (ISBN 9781466518100)
Manisha, P., Singh, Y.: Security issues and sybil attack in wireless sensor networks. Int. J. P2P Netw. Trends Technol. 3(1), 7–13 (2013)
El-Bendary, N., Fouad, M.M.M., Ramadan, R.A., Banerjee, S., Hassanien, A.E.: Smart environmental monitoring using wireless sensor networks. In: Wireless Sensor Networks: From Theory to Applications Book, CRC Press, USA (2013) (ISBN 9781466518100)
Yongji, R.: BRS-based robust secure localization algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 46–55 (2013)
Karlof, C., Wagner, D.: Secure routing in sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Netw. J. Spec. Issue Sens. Netw. 1(2–3), 293–315 (2003)
Mohammadi, S., Hossein, J.: A Comparison of Link Layer Attacks on Wireless Sensor Networks. arXiv preprint arxiv.org/abs/1103.5589, (2011)
Zomaya, A.Y.: Algorithms and Protocols for Wireless Sensor Networks. Wiley, New York (2009) (ISBN 978-0-471-79813-2)
Sen, J.: A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1(2), 55–78 (2009)
Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks. In: 1st Conference on IEEE Security and Privacy for Emerging Areas in Communications Networks (SecureComm), pp. 101–112. ACM Press, New York (Sept 2005)
Gabrielli, A., Conti, M., Di Pietro, R., Mancini, L.: Sec-TMP: a secure topology maintenance protocol for event delivery enforcement in WSN. In: Proceedings of 5th Conference on Security and Privacy in Communication Networks (SecureComm 2009), pp. 265–284. Athens, Greece (Sept 2009)
Stajano, F.: Security for Ubiquitous Computing. Wiley, New York (2002)
Matthew, P., Sencun, Z., Vijaykrishnan, N., McDaniel, P., Kandemir, M., Brooks, R.: The sleep deprivation attack in sensor networks: analysis and methods of defense. Int. J. Distrib. Sens. Netw. 2(3), 267–287 (2006)
Meenakshi, T., Gaur, M.S., Laxmi, V., Sharma, P.: Detection and countermeasure of node misbehaviour in clustered wireless sensor network. In: Proceedings of the ISRN Sensor Networks (2013)
Xu, Y., Heidemann, J., Estrin, D.: Geography-informed energy conservation for Ad-hoc routing. In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 70–84. Atlanta (2001)
Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Netw. 8(5), 481–494 (2002)
Xu, Y., Heidemann, J., Estrin, D.: Energy conservation by adaptive clustering for ad-hoc networks. In: Poster Session of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02). Lausanne, Switzerland (June 2002)
Fouad, M.M.M., Dawood, A.R., Mostafa, M.-S.M.: Study of the effects of pairwise key pre-distribution scheme on the performance of a topology control protocol. In: Proceedings of the 2nd International Workshop on Mobility in Wireless Sensor Networks (MobiSensor’2011) that held in conjunction with the 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS ’2011), Barcelona, Spain, (June 2011)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society, pp. 197–213. Washington, DC, (2003)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: Spins: security protocols for sensor networks. In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pp. 189–199. Rome, Italy, (July 2001)
Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, pp. 05–07. Troy, New York, Technical Report (2005)
Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)
Fouad, M.M.M., Mostafa, M.-S.M., Dawood, A.R.: SOPK: Second opportunity pairwise key scheme for topology control protocols. In: Proceedings of IEEE 3rd International Conference on Intelligent Systems, Modelling and Simulation (ISMS), pp. 632–638. (2012)
Anderson, R., Kuhn, M.: Tamper resistance—a cautionary note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1–11. (November 1996)
Kalpana, S., Ghose, M.K., Kumar, D., Singh, R.P.K., Pandey, V.K.: A comparative study of various security approaches used in wireless sensor networks. Int. J. Adv. Sci. Technol. 17, 31–44 (2010)
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology. Lecture Notes in Computer Science, pp. 471–486. Cambridge University Press, Cambridge (1992)
Liu, D., Ning, P.: Security for wireless sensor networks. Advances in Information Security, vol. 28, pp. 63–76. Springer (Dec 2006) (ISBN 0387327231)
Ming, L., Yu, S., Guttman, J.D., Lou, W., Ren K.: Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. (TOSN) 9(2), 18 (2013)
Spencer, J.: The strange logic of random graphs. Algorithms and Combinatorics 22, Springer-Verlag, (2000). ISBN: 3-540-41654-4
Seema, V.: Analysis of a new random key pre-distribution scheme based on random graph theory and kryptograph. In: Mobile Communication and Power Engineering, pp. 349–352. Springer, Berlin (2013)
Eschenauer, L., Gilgor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of 9th ACM Conference on Computer and Communications Security, pp. 41–47 (Nov 2002)
Wu, S.-L., Tseng, Y.-C.: Wireless Ad Hoc Networking. Wireless Networks and Mobile Communications Series, Auerbach Publications, USA (2007)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. Lecture Notes in Computer Science. http://www.cs.iastate.edu/~cs610jw/CS610_LiuNing.ppt (2014). Accessed 15 Jan 2014
Shuang-Hua, Y.: WSN security. In: Wireless Sensor Networks, pp. 187–215. Springer, London (2014)
Zhao, H., Li, Y., Shen, J., Zhang, M., Zheng, R., Wu Q.: A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks (2013)
Liu D., Ning, P.: Location-based Pairwise Key Establishments for Static Sensor Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, (2003)
Yu, Y., Govindan, R., Estrin D.: Geographical and Energy Aware Routing: a Recursive Data Dissemination Protocol for Wireless Sensor Networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department, (2001)
Jang, J., Kwon, T., Song, J.: A time-based key management protocol for wireless sensor networks. Information Security Practice and Experience, pp. 314–328. Springer, Berlin (2007)
Zhu, S., Setia, S., Jajodia, S.: Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2002)
Nait Hamoud, O., Kenaza, T., Nouali-Taboudjmat N.: The cloning attack vulnerability in WSN key management schemes. In: SENSORCOMM 2013, The 7th International Conference on Sensor Technologies and Applications, pp. 151–156. (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Fouad, M.M.M., Hassanien, A.E. (2014). Key Pre-distribution Techniques for WSN Security Services. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-662-43616-5_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43615-8
Online ISBN: 978-3-662-43616-5
eBook Packages: EngineeringEngineering (R0)