Skip to main content

Energy Conserving Security Mechanism for Wireless Sensor Network

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3981))

Abstract

This paper describes Wireless Sensor Network (WSN) security to conserve wasteful energy. Sensor networks are emerging fast and will be the next wave towards new network appliances. Security must be justified and ensured before the large scale deployment of sensors as individual sensors are prone to security compromise. In the sensor field, an adversary can compromise sensor nodes that can be used to generate random false sensing data. As these generated packets propagate through the network towards final data acquisition point, it will result in the energy consumption in a constrained low powered network. As WSN is multi-hop communication in nature, node-to-node authentication using shared secret is important for legitimate data packets to be forwarded. In this paper, we develop a security mechanism to detect energy-consuming useless data flows that propagate through network. Assuming that a sensor node can sense an event and generates multiple Message Authentication Code (MAC) using secret keys and these MACs are appended to the sensed data. The forwarding nodes along the path towards the data acquisition point verify the validity of the sensed data by checking the authenticity of the MACs attached to the original sensed data. Intuitively, early detection of the false data will make the entire network energy conserving which is one of the primary goals in the design of sensor networks. We have quantified the security strength through analysis and simulation.

This work was supported by MIC and ITRC Project.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ye, W., Heidemann, J., Estrin, D.: An Energy-Efficient MAC Protocol for WirelessSensor Networks. In: Proceedings of the IEEE Infocom, USC/Information Sciences Institute, New York, USA, pp. 1567–1576. IEEE, Los Alamitos (2002)

    Google Scholar 

  2. Kulkarni, S.S., Gouda, M.G., Arora, A.: Secret instantiation in ad-hoc networks. Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, 1–15 (2005)

    Google Scholar 

  3. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols 1(2-3), 293–315 (2003)

    Google Scholar 

  4. Di Pietro, R., Mancini, L.V., Jajodia, S.: Providing secrecy in key management protocols for large wireless sensors networks. Journal of AdHoc Networks 1(4), 455–468 (2003)

    Article  Google Scholar 

  5. Wen, V., Perrig, A., Szewczyk, R.: SPINS: Security suite for sensor networks. In: Proc. ACM MobiCom, pp. 189–199 (2001)

    Google Scholar 

  6. Luo, H., Kong, J., Zerfos, P., Lu, S., Zhang, L.: URSA: Ubiquitous and robust access control for mobile ad hoc networks. Proc. IEEE/ACM Trans. Netw. 12(6), 1049–1063 (2004)

    Article  Google Scholar 

  7. Arora, A., Dutta, P., Bapat, S., Kulathumani, V., Zhang, H., Naik, V., Mittal, V., Cao, H., Demirbas, M., Gouda, M., Choi, Y., et al.: A Line in the Sand: A Wireless Sensor Network for Target Detection, Classification, and Tracking. Computer Networks (Elsevier), Special Issue on Military Communications Systems and Technologies 46(5), 605–634 (2004)

    Google Scholar 

  8. Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Hu, Y., Perrig, A., Johnson, D.: Rushing attacks and defense in wireless ad hoc network routing protocols, In: Second ACM Workshop on Wireless Security (WiSe 2003), San Diego, CA, USA (2003)

    Google Scholar 

  10. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy (2003)

    Google Scholar 

  11. Du, W., Deng, J., Han, Y., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM Conference on Computer and Communications Security (CCS), pp. 42–51 (2003)

    Google Scholar 

  12. Zhang, Y., Lee, W.: Intrusion detection in wireless ad hoc networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 275–283 (2000)

    Google Scholar 

  13. Yi, S., Naldurg, P., Kravets, R.: Security-aware ad-hoc routing for wireless networks. In: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 299–302. ACM Press, New York (2001)

    Chapter  Google Scholar 

  14. Crossbow Technology Inc. Available, http://www.xbow.com/

  15. Manjeshwar, A., Agrawal, D.: TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing (2001)

    Google Scholar 

  16. Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hamid, M.A., Rahman, M.M., Hong, C.S. (2006). Energy Conserving Security Mechanism for Wireless Sensor Network. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3981. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751588_90

Download citation

  • DOI: https://doi.org/10.1007/11751588_90

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34072-0

  • Online ISBN: 978-3-540-34074-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics