Academia.eduAcademia.edu

Outline

On the Security of Wireless Sensor Networks

2005, Computational Science and Its Applications – ICCSA 2005

https://doi.org/10.1007/11424857_75

Abstract

Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-resistant packages. As a result, security must be an important factor to have in mind when designing the infrastructure and protocols of sensor networks. In this paper we survey the "state-of-the-art" security issues in sensor networks and highlight the open areas of research.

References (35)

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci. Wireless sensor net- works: a survey. Computer Networks, 38(4), March 2002.
  2. Crossbow Technology, Inc. MICA2 and MICAz, Wireless Measurement Systems. http://www.xbow.com.
  3. IEEE Standard, 802.15.4-2003. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. May 2003, ISBN 0-7381- 3677-5.
  4. C. Karlof, N. Sastry, D. Wagner. TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of 2nd International Conference on Em- bedded Networked Sensor Systems (SensSys'04), November 2004.
  5. N. Sastry, D. Wagner. Security considerations for IEEE 802.15.4 networks. In Proceedings of 2004 ACM Workshop on Wireless security (Wise'04), October 2004.
  6. N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proceedings of 2004 Workshop on Cryp- tographic Hardware and Embedded Systems (CHES'04), August 2004.
  7. D. J. Malan, M. Welsh, M. D. Smith. A public-key infrastructure for key distribu- tion in TinyOS based on elliptic curve cryptography. In Proceedings of 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (Secon'04), October 2004.
  8. L. Eschenauer, V. D. Gligor. A key-management scheme for distributed sensor net- works. In Proceedings of 9th ACM Conference on Computer and Communications Security (CCS'02), November 2002.
  9. H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor net- works. In Proceedings of 2003 IEEE Symposium on Security and Privacy (S&P'03), May 2003.
  10. W. Du, J. Deng, Y. S. Han, P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM conference on Computer and communications Security (CCS'03), October 2003.
  11. J. Lee, D. R. Stinson. Deterministic key predistribution schemes for distributed sensor networks. In Proceedings of 11th Annual Workshop on Selected Areas in Cryptography (SAC'04), August 2004.
  12. R. Wei, J. Wu. Product construction of key distribution schemes for sensor net- works. In Proceedings of 11th Annual Workshop on Selected Areas in Cryptography (SAC'04), August 2004.
  13. B. Yener, S. A. Camtepe. Combinatorial design of key distribution mechanisms for wireless sensor networks. In Proceedings of 9th European Symposium on Research in Computer Security (ESORICS'04), September 2004.
  14. W. Du, J. Deng, Y. S. Han, S. Chen, P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04, March 2004.
  15. A. Perrig, R. Szewczyk, V. Wen, D. Cullar, J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of 7th International Conference on Mobile Computing and Networking (MOBICOM'01), July 2001.
  16. R. Anderson, H. Chan, A. Perrig. Key infection: smart trust for smart dust. In Pro- ceedings of 12th IEEE International Conference on Network Protocols (ICNP'04), October 2004.
  17. J. Zachari. A decentralized approach to secure group membership testing in dis- tributed sensor networks. In Proceedings of 2003 Military Communications Con- ference (MILCOM 2003), October 2003.
  18. Y. W. Law, R. Corin, S. Etalle, P. H. Hartel. A formally verified decentralized key management architecture for wireless sensor networks. In Proceedings of 2003 Personal Wireless Communications (PWC'03), IFIP WG 6.8 -Mobile and Wireless Communications. September 2003.
  19. J. N. Al-Karaki, A. E. Kamal. Routing techniques in wireless sensor networks: a survey. To appear in IEEE Wireless Communications.
  20. C. Karlof, D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
  21. J. Newsome, E. Shi, D. Song, A Perrig. The sybil attack in sensor networks: analysis & defenses. In Proceedings of 3rd IEEE International Workshop on Information Processing in Sensor Networks (IPSN'04), April 2004.
  22. R. Di Pietro, L. V. Mancini, Y. W. Law, S. Etalle, P. Havinga. LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceed- ings of 32nd International Conference on Parallel Processing Workshops (ICPP'03), October 2003.
  23. J. Deng, R. Han, S. Mishra. A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In Proceedings of 2nd IEEE International Workshop on Information Processing in Sensor Networks (IPSN'03), April 2003.
  24. Q. Fang, J. Gao, L. J. Guibas. Locating and bypassing routing holes in sensor networks. In Proceedings of IEEE INFOCOM'04, March 2004.
  25. D. Wagner. Resilient aggregation in sensor networks. In Proceedings of 2nd ACM workshop on Security of Ad Hoc and Sensor Networks (SANS'04), October 2004.
  26. B. Przydatek, D. Song, A. Perrig. SIA: Secure information aggregation in sensor networks. In Proceedings of 1st International Conference on Embedded Networked Sensor Systems (SenSys'03), November 2003.
  27. W. Du, J. Deng, Y. S. Han, P. K. Varshney. A witness-based approach for data fusion assurance in wireless sensor networks. In Proceedings of GLOBECOM'03, December 2003.
  28. F. Ye, H. Luo, S. Lu, L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM'04, March 2004.
  29. Y. Zhang, W. Lee. Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Wireless Networks Journal, 9(5):545-556, September 2003.
  30. C. Hsin, M. Liu. A Distributed monitoring mechanism for wireless sensor networks. In Proceedings of 2002 ACM Workshop on Wireless Security (WiSe'02), September 2002.
  31. S. S. Doumit, D. P. Agrawal. Self-organized criticaly & stochastic learning based intrusion detection system for wireless sensor networks. In Proceedings of 2003 Military Communications Conference (MILCOM'03), October 2003.
  32. A. Seshandri, A. Perrig, L. Van Doorn, P. Khosla. SWATT: software-based attes- tation for embedded devices. In Proceedings of 2004 IEEE Symposium on Security and Privacy (S&P'04), May 2004.
  33. C. Ozturk, Y. Zhang, W. Trappe, M. Ott. Source-location privacy for networks of energy-constrained sensors. In Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS'04), May 2004.
  34. H. Qi, Y. Xu, X. Wang. Mobile-agent-based collaborative signal and information processing in sensor networks. Proceedings of the IEEE, 91(8)1172-1183, August 2003.
  35. A. Perrig, J. Stankovic, D. Wagner. Security in wireless sensor networks. Commu- nications of the ACM, 47(6)53-57, June 2004.