Skip to main content

Security in Wireless Sensor Networks: Considerations and Experiments

  • Conference paper
Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4017))

Included in the following conference series:

Abstract

Wireless Sensor Networks (WSN) are seen as attractive solutions for various monitoring and controlling applications, a large part of which require protection. Due to the special characteristics of WSNs, e.g. low processing and energy resources and ad hoc networking, developing a reliable security solution becomes a challenging task. In this paper we survey various security aspects of WSNs, consisting of threats, attacks, and proposed solutions. We also present experiments with our own WSN technology (TUTWSN), concentrating on a centralized key distribution and authentication service. Our experiments suggest that a centralized scheme can be a feasible solution in certain WSN configurations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Stankovic, J.A., Abdelzaher, T.F., Lu, C., Sha, L., Hou, J.C.: Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE 91, 1002–1022 (2003)

    Article  Google Scholar 

  2. Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Security for Wireless Sensor Networks. In: [26], pp. 253–275

    Google Scholar 

  3. Kohvakka, M., Hännikäinen, M., Hämäläinen, T.D.: Ultra low energy wireless temperature sensor network implementation. In: Proc. 16th IEEE Int. Symp. Personal Indoor and Mobile Radio Comm. (PIMRC 2005), Berlin, Germany (2005)

    Google Scholar 

  4. Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice-Hall, USA (1995)

    Google Scholar 

  5. Karloff, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier Ad Hoc Networks 1, 293–315 (2003)

    Article  Google Scholar 

  6. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Comm. 11, 38–43 (2004)

    Google Scholar 

  7. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47, 53–57 (2004)

    Article  Google Scholar 

  8. Wood, A., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35, 54–62 (2002)

    Google Scholar 

  9. Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Proc. 2nd Int. Conf. Embedded Networked Sensor Systems (SenSys 2004), Baltimore, MD, USA, pp. 162–175 (2004)

    Google Scholar 

  10. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: Security protocols for sensor networks. Kluwer Wireless Networks, 521–534 (2002)

    Google Scholar 

  11. IEEE: IEEE Std. 802.15.4. (2003)

    Google Scholar 

  12. ZigBee Alliance: ZigBee Specification Version 1.0. (2004)

    Google Scholar 

  13. NIST: Advanced Encryption Standard (FIPS-197) (2001)

    Google Scholar 

  14. Chan, H., Perrig, A., Song, D.: Key Distribution Techniques for Sensor Networks. In: [26], pp. 277–303

    Google Scholar 

  15. Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Shantz, S.C.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. Elsevier Pervasive and Mobile Computing, 425–445 (2005)

    Google Scholar 

  16. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Gaubatz, G., Kaps, J.P., Öztürk, E., Sunar, B.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: Proc. Workshop on Pervasive Computing and Comm. Security (PerSec 2005), Kauai Island, HI, USA, pp. 146–150 (2005)

    Google Scholar 

  18. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanism for large-scale distributed sensor networks. In: Proc. 10th ACM Conf. Computer and Comm. Security (CCS 2003), Washington D.C., USA, pp. 62–72 (2003)

    Google Scholar 

  19. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conf. Computer and Comm. Security (CCS 2002), Washington D.C., USA, pp. 41–47 (2002)

    Google Scholar 

  20. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable and Secure Computing 3, 62–77 (2006)

    Article  Google Scholar 

  21. Kohl, J., Neuman, C.: The Kerberos network authentication service (V5). RFC 1510 (1993)

    Google Scholar 

  22. Dworkin, M.: Recommendations for Block Cipher Modes of Operation: The CMAC Mode for Authentication (Special Publication 800–38B), NIST (2005)

    Google Scholar 

  23. Microchip Technology Inc.: Application note 953: Data Encryption Routines for the PIC18 (2005)

    Google Scholar 

  24. Atmel Corporation: 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash – ATmega128 and ATmega128L, Rev. 2467M-AVR-11/04 (2004)

    Google Scholar 

  25. Hämäläinen, P., Alho, T., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core (unpublished, 2006)

    Google Scholar 

  26. Raghavendra, C.S., Sivalingam, K.M., Znati, T. (eds.): Wireless Sensor Networks, 1st edn. Springer, Heidelberg (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hämäläinen, P., Kuorilehto, M., Alho, T., Hännikäinen, M., Hämäläinen, T.D. (2006). Security in Wireless Sensor Networks: Considerations and Experiments. In: Vassiliadis, S., Wong, S., Hämäläinen, T.D. (eds) Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2006. Lecture Notes in Computer Science, vol 4017. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11796435_18

Download citation

  • DOI: https://doi.org/10.1007/11796435_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36410-8

  • Online ISBN: 978-3-540-36411-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics