Skip to main content

A Survivable Distributed Sensor Networks Through Stochastic Models

  • Conference paper
Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops (ISPA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4331))

Abstract

The previous security architectures and mechanisms for distributed sensor networks only focus on confidentiality, integrity and authentication. The distributed sensor networks should have the ability to provide essential services in the presence of attacks and failures, and recover full services in a timely manner. In this paper, we present stochastic models for survivable distributed sensor networks. We define states of cluster based sensor networks and analyze the distributed sensor networks using stochastic models in mathematical manner. The evaluation results with the proof of concept scenario show our approach has a feasibility to design survivable distributed sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Avancha, S., Undercoffer, J.L., Joshi, A., Pinkston, J.: Security for Sensor Networks. In: Wireless Sensor Networks, pp. 253–275. Kluwer Academic, Dordrecht (2004)

    Chapter  Google Scholar 

  2. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Int. Conf. on Embedded Networked Sensor System, pp. 162–175. ACM Press, New York (2004)

    Chapter  Google Scholar 

  3. Ellison, B., Fisher, D., Linger, R., Lipson, H., Longstaff, T., Mead, N.: Survivable Net-works Systems: An Emergin Discipline. Technical Report, CMU/SEI-97-TR-013, Software Engineering Institute, Carnegie Mellon University (1997)

    Google Scholar 

  4. Ellison, R.J., Linger, R.C., Longstaff, T., Mead, N.R.: Survivable Network System Analysis: A Case Study. IEEE software 16(4), 70–77 (1999)

    Article  Google Scholar 

  5. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In: Proc. of the 33rd Annual Hawaii Int. Conf. on System Sciences, pp. 3005–3014. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  6. Hu, F., Tillet, J., Ziobro, J., Sharma, N.: Secure Wireless Sensor Networks: Problems and Solutions. J. on Systemics, Cybernetics and Informatics 1(9) (2004)

    Google Scholar 

  7. Jones, K., Wadaa, A., Olariu, S., Wilson, L.: Towards a New Paradigm for Securing Wire-less Sensor Networks. In: New Security Paradigms Workshop, pp. 115–121. ACM Press, New York (2003)

    Google Scholar 

  8. Knight, J.C., Strunk, E.A., Sullivan, K.J.: Towards a Rigorous Definition of Information Security Survivability. In: Proc. of the DARPA Information Survivability Conf. and Exposition, pp. 78–89. IEEE Computer society, Los Alamitos (2003)

    Chapter  Google Scholar 

  9. Law, Y.W., Havinga, P.J.M.: How to Secure a Wireless Sensor Network. In: Proc. of Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing, pp. 89–95. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  10. Liu, Y., Trivedi, K.S.: A General Framework for Network Survivability Quantification. In: Proc. of the 12th GI/ITG Conf. on Measuring, Modelling and Evaluation of Computer and Communication Systems, pp. 369–378 (2004)

    Google Scholar 

  11. Liu, Z., Wang, Y.: A Secure Agent Architecture for Sensor Networks. In: Int. Conf. on Artificial Intelligence (2003)

    Google Scholar 

  12. Park, T., Shin, K.: LiSP: A Lightweight Security Protocol for Wireless Sensor Networks. ACM trans. on Embedded Computing Systems 3(3), 634–660 (2004)

    Article  Google Scholar 

  13. Paul, K., RoyChoudhuri, R.R., Bandyopadhyay, S.: Survivability Analysis of Ad Hoc Wireless Network Architecture. In: Omidyar, C.G. (ed.) MWCN 2000 and NETWORKING-WS 2000. LNCS, vol. 1818, pp. 31–46. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  14. Paul, K., Choudhuri, R.R., Bandyopadhyay, S.: Survivable Ad Hoc Wireless Networks: Some Design Specifications. In: Int. Conf. on Multiaccess, Mobility And Teletraffic for Wireless Communications, pp. 147–158. Kluwer Academic Publishers, Dordrecht (2000)

    Google Scholar 

  15. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proc. of Int. Conf. on Mobile Computing and Networking., pp. 189–199. ACM Press, New York (2001)

    Google Scholar 

  16. Savola, R.: Architecture for Self-Estimation of Security Level in Ad Hoc Network Nodes. In: Proc. of the 3rd Australian Information Security Management Conf., pp. 88–94 (2005)

    Google Scholar 

  17. Schmidt, S., Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 166–177. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Shaikh, R.A., Lee, S., Song, Y., Zhung, Y.: Securing Distributed Wireless Sensor Net-works: Issues and Guidelines. In: Proc. of Int. Conf. on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 226–231. IEEE computer society, Los Alamitos (2006)

    Chapter  Google Scholar 

  19. Snow, A.P., Varshney, U., Malloy, A.D.: Reliability and Survivability of Mobile and Wire-less Networks. IEEE Computer 33(7), 49–55 (2000)

    Google Scholar 

  20. Trivedi, K.S.: Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd edn. John Wiley & Sons, Chichester (2001)

    Google Scholar 

  21. Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless Sensor Network Security: A Survey. In: Xiao, Y. (ed.) Security in Distributed, Grid, and Pervasive Computing, Auerbach Publica-tions, CRC Press (2006)

    Google Scholar 

  22. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distrib-uted sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Comm. Security, pp. 62–72. ACM Press, New York (2003)

    Chapter  Google Scholar 

  23. Zia, T., Zomaya, A.: A Security Framework for Wireless Sensor Networks. In: Sym. Sen-sor Applications, pp. 49–53. IEEE Computer Society, Los Alamitos (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, D.S., Park, J.S. (2006). A Survivable Distributed Sensor Networks Through Stochastic Models. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_20

Download citation

  • DOI: https://doi.org/10.1007/11942634_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49860-5

  • Online ISBN: 978-3-540-49862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics