Abstract
Wireless Sensor Networks (WSN) are seen as attractive solutions for various monitoring and controlling applications, a large part of which require protection. Due to the special characteristics of WSNs, e.g. low processing and energy resources and ad hoc networking, developing a reliable security solution becomes a challenging task. In this paper we survey various security aspects of WSNs, consisting of threats, attacks, and proposed solutions. We also present experiments with our own WSN technology (TUTWSN), concentrating on a centralized key distribution and authentication service. Our experiments suggest that a centralized scheme can be a feasible solution in certain WSN configurations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stankovic, J.A., Abdelzaher, T.F., Lu, C., Sha, L., Hou, J.C.: Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE 91, 1002–1022 (2003)
Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Security for Wireless Sensor Networks. In: [26], pp. 253–275
Kohvakka, M., Hännikäinen, M., Hämäläinen, T.D.: Ultra low energy wireless temperature sensor network implementation. In: Proc. 16th IEEE Int. Symp. Personal Indoor and Mobile Radio Comm. (PIMRC 2005), Berlin, Germany (2005)
Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice-Hall, USA (1995)
Karloff, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier Ad Hoc Networks 1, 293–315 (2003)
Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Comm. 11, 38–43 (2004)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)
Wood, A., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35, 54–62 (2002)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proc. 2nd Int. Conf. Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, USA, pp. 162–175 (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Kluwer Wireless Networks, 521–534 (2002)
IEEE: IEEE Std. 802.15.4. (2003)
ZigBee Alliance: ZigBee Specification Version 1.0. (2004)
NIST: Advanced Encryption Standard (FIPS-197) (2001)
Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks. In: [26], pp. 277–303
Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. Elsevier Pervasive and Mobile Computing, 425–445 (2005)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Gaubatz, G., Kaps, J.P., Öztürk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proc. Workshop on Pervasive Computing and Comm. Security (PerSec 2005), Kauai Island, HI, USA, pp. 146–150 (2005)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanism for large-scale distributed sensor networks. In: Proc. 10th ACM Conf. Computer and Comm. Security (CCS 2003), Washington D.C., USA, pp. 62–72 (2003)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conf. Computer and Comm. Security (CCS 2002), Washington D.C., USA, pp. 41–47 (2002)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable and Secure Computing 3, 62–77 (2006)
Kohl, J., Neuman, C.: The Kerberos network authentication service (V5). RFC 1510 (1993)
Dworkin, M.: Recommendations for Block Cipher Modes of Operation: The CMAC Mode for Authentication (Special Publication 800–38B), NIST (2005)
Microchip Technology Inc.: Application note 953: Data Encryption Routines for the PIC18 (2005)
Atmel Corporation: 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash – ATmega128 and ATmega128L, Rev. 2467M-AVR-11/04 (2004)
Hämäläinen, P., Alho, T., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core (unpublished, 2006)
Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.): Wireless Sensor Networks, 1st edn. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hämäläinen, P., Kuorilehto, M., Alho, T., Hännikäinen, M., Hämäläinen, T.D. (2006). Security in Wireless Sensor Networks: Considerations and Experiments. In: Vassiliadis, S., Wong, S., Hämäläinen, T.D. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2006. Lecture Notes in Computer Science, vol 4017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11796435_18
Download citation
DOI: https://doi.org/10.1007/11796435_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36410-8
Online ISBN: 978-3-540-36411-5
eBook Packages: Computer ScienceComputer Science (R0)