On the Security of Wireless Sensor Networks
2005, Computational Science and Its Applications – ICCSA 2005
https://doi.org/10.1007/11424857_75Abstract
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-resistant packages. As a result, security must be an important factor to have in mind when designing the infrastructure and protocols of sensor networks. In this paper we survey the "state-of-the-art" security issues in sensor networks and highlight the open areas of research.
References (35)
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. Wireless sensor net- works: a survey. Computer Networks, 38(4), March 2002.
- Crossbow Technology, Inc. MICA2 and MICAz, Wireless Measurement Systems. http://www.xbow.com.
- IEEE Standard, 802.15.4-2003. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. May 2003, ISBN 0-7381- 3677-5.
- C. Karlof, N. Sastry, D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of 2nd International Conference on Em- bedded Networked Sensor Systems (SensSys'04), November 2004.
- N. Sastry, D. Wagner. Security considerations for IEEE 802.15.4 networks. In Proceedings of 2004 ACM Workshop on Wireless security (Wise'04), October 2004.
- N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of 2004 Workshop on Cryp- tographic Hardware and Embedded Systems (CHES'04), August 2004.
- D. J. Malan, M. Welsh, M. D. Smith. A public-key infrastructure for key distribu- tion in TinyOS based on elliptic curve cryptography. In Proceedings of 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (Secon'04), October 2004.
- L. Eschenauer, V. D. Gligor. A key-management scheme for distributed sensor net- works. In Proceedings of 9th ACM Conference on Computer and Communications Security (CCS'02), November 2002.
- H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor net- works. In Proceedings of 2003 IEEE Symposium on Security and Privacy (S&P'03), May 2003.
- W. Du, J. Deng, Y. S. Han, P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM conference on Computer and communications Security (CCS'03), October 2003.
- J. Lee, D. R. Stinson. Deterministic key predistribution schemes for distributed sensor networks. In Proceedings of 11th Annual Workshop on Selected Areas in Cryptography (SAC'04), August 2004.
- R. Wei, J. Wu. Product construction of key distribution schemes for sensor net- works. In Proceedings of 11th Annual Workshop on Selected Areas in Cryptography (SAC'04), August 2004.
- B. Yener, S. A. Camtepe. Combinatorial design of key distribution mechanisms for wireless sensor networks. In Proceedings of 9th European Symposium on Research in Computer Security (ESORICS'04), September 2004.
- W. Du, J. Deng, Y. S. Han, S. Chen, P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04, March 2004.
- A. Perrig, R. Szewczyk, V. Wen, D. Cullar, J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of 7th International Conference on Mobile Computing and Networking (MOBICOM'01), July 2001.
- R. Anderson, H. Chan, A. Perrig. Key infection: smart trust for smart dust. In Pro- ceedings of 12th IEEE International Conference on Network Protocols (ICNP'04), October 2004.
- J. Zachari. A decentralized approach to secure group membership testing in dis- tributed sensor networks. In Proceedings of 2003 Military Communications Con- ference (MILCOM 2003), October 2003.
- Y. W. Law, R. Corin, S. Etalle, P. H. Hartel. A formally verified decentralized key management architecture for wireless sensor networks. In Proceedings of 2003 Personal Wireless Communications (PWC'03), IFIP WG 6.8 -Mobile and Wireless Communications. September 2003.
- J. N. Al-Karaki, A. E. Kamal. Routing techniques in wireless sensor networks: a survey. To appear in IEEE Wireless Communications.
- C. Karlof, D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
- J. Newsome, E. Shi, D. Song, A Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of 3rd IEEE International Workshop on Information Processing in Sensor Networks (IPSN'04), April 2004.
- R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, P. Havinga. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceed- ings of 32nd International Conference on Parallel Processing Workshops (ICPP'03), October 2003.
- J. Deng, R. Han, S. Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of 2nd IEEE International Workshop on Information Processing in Sensor Networks (IPSN'03), April 2003.
- Q. Fang, J. Gao, L. J. Guibas. Locating and bypassing routing holes in sensor networks. In Proceedings of IEEE INFOCOM'04, March 2004.
- D. Wagner. Resilient aggregation in sensor networks. In Proceedings of 2nd ACM workshop on Security of Ad Hoc and Sensor Networks (SANS'04), October 2004.
- B. Przydatek, D. Song, A. Perrig. SIA: Secure information aggregation in sensor networks. In Proceedings of 1st International Conference on Embedded Networked Sensor Systems (SenSys'03), November 2003.
- W. Du, J. Deng, Y. S. Han, P. K. Varshney. A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of GLOBECOM'03, December 2003.
- F. Ye, H. Luo, S. Lu, L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM'04, March 2004.
- Y. Zhang, W. Lee. Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Wireless Networks Journal, 9(5):545-556, September 2003.
- C. Hsin, M. Liu. A Distributed monitoring mechanism for wireless sensor networks. In Proceedings of 2002 ACM Workshop on Wireless Security (WiSe'02), September 2002.
- S. S. Doumit, D. P. Agrawal. Self-organized criticaly & stochastic learning based intrusion detection system for wireless sensor networks. In Proceedings of 2003 Military Communications Conference (MILCOM'03), October 2003.
- A. Seshandri, A. Perrig, L. Van Doorn, P. Khosla. SWATT: software-based attes- tation for embedded devices. In Proceedings of 2004 IEEE Symposium on Security and Privacy (S&P'04), May 2004.
- C. Ozturk, Y. Zhang, W. Trappe, M. Ott. Source-location privacy for networks of energy-constrained sensors. In Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS'04), May 2004.
- H. Qi, Y. Xu, X. Wang. Mobile-agent-based collaborative signal and information processing in sensor networks. Proceedings of the IEEE, 91(8)1172-1183, August 2003.
- A. Perrig, J. Stankovic, D. Wagner. Security in wireless sensor networks. Commu- nications of the ACM, 47(6)53-57, June 2004.