Abstract
As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Petersen, S., Carlsen, S.: Wireless Sensor Networks: Introduction to Installation and Integration on an Offshore Oil & Gas Platform. In: Proceedings of the 19th Australian Conference on Software Engineering (ASWEC 2008), Perth, Australia (March 2008)
European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46–57. Urbana-Champaign, USA (2005)
Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)
Law, Y.W., Palaniswami, M., Van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks 5(1), 6:1–6:38 (2009)
Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing 7(1), 74–81 (2008)
Pongaliur, K., Abraham, Z., Liu, A.X., Xiao, L., Kempel, L.: Securing Sensor Nodes Against Side Channel Attacks. In: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE 2008), Nanjing, China, December 2008, pp. 353–361 (2008)
Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006)
Goodspeed, T.: Wireless Sensor Networks as an Asset and a Liability. In: Proceedings of the SOURCE Conference, Boston, USA (March 2009)
Francillon, A., Castelluccia, C.: Code Injection Attacks on Harvard-Architecture Devices. In: Proceedings of the 15th ACM conference on Computer and communications security (CCS 2008), Alexandria, USA, October 2008, pp. 15–26 (2008)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the IEEE 3rd International Workshop on Information Processing in Sensor Networks (IPSN 2004), Berkeley, USA, April 2004, pp. 259–268 (2004)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure. Ad-Hoc Networks 1(2-3), 293–315 (2003)
Manzo, M., Roosta, T., Sastry, S.: Time Synchronization Attacks in Sensor Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, USA, November 2005, pp. 107–116 (2005)
Shnayder, V., Hempstead, M., Chen, B., Allen, G.W., Welsh, M.: Simulating the Power Consumption of Large-Scale Sensor Network Applications. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, USA, August 2004, pp. 188–200 (2004)
Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-driven Perspective on Wireless Sensor Network Security. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, Torremolinos, Spain, pp. 1–8 (2006)
Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible Security Synthesis for Wireless Sensor Networks. In: Proceedings of the 3rd international Workshop on Middleware for Sensor Networks, Leuven, Belgium, pp. 19–24 (2008)
Roman, R.: Application-driven Security in Wireless Sensor Networks. Ph.D. Thesis, University of Malaga (June 2008)
Healy, M., Newe, T., Lewis, E.: Wireless Sensor Node Hardware: A Review. In: Proceedings of IEEE SENSORS 2008, Lecce, Italy, October 2008, pp. 621–624 (2008)
Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: An Operating System for Sensor Networks. In: On Ambient Intelligence. Springer, Heidelberg (2005)
Dutta, P., Taneja, J., Jeong, J., Jiang, X., Culler, D.: A Building Block Approach to Sensornet Systems. In: Proceedings of the Sixth ACM Conference on Embedded Networked Sensor Systems (SenSys 2008), Raleigh, USA, November 2008, pp. 267–280 (2008)
Seah, W.K.G., Eu, Z.A., Tan, H.-P.: Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) - Survey and Challenges. In: Proceedings of CTIF Wireless VITAE 2009, Aalborg, Denmark (May 2009)
Penella, M.T., Gasulla, M.: A Review of Commercial Energy Harvesters for Autonomous Sensors. In: Proceedings of IEEE Instrumentation and Measurement Technology Conference Proceedings (IMTC 2007), Warsaw, Poland, May 2007, pp. 1–5 (2007)
Crossbow Technology, Inc. eKo Pro Precision Agriculture, http://www.xbow.com/eko/ (retrieved on June 2009)
Galindo, D., Roman, R., Lopez, J.: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 120–132. Springer, Heidelberg (2008)
Camtepe, S.A., Yener, B.: Key Management in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam (2008)
Stajano, F., Cvrcek, D., Lewis, M.: Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 460–478. Springer, Heidelberg (2008)
Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 166–178. Springer, Heidelberg (2006)
ECRYPT Network of Excellence. eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/ (retrieved on June 2009)
European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)
Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41–49 (2004)
Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks Jounal (Elsevier) 3(3), 257–279 (2005)
Heidemann, J., Wei, Y., Wills, J., Syed, A., Yuan, L.: Research Challenges and Applications for Underwater Sensor Networking. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, USA, April 2006, vol. 1, pp. 228–235 (2006)
Akyildiz, I.F., Stuntebeck, E.P.: Wireless Underground Sensor Networks: Research Challenges. Ad Hoc Networks Journal 4(6), 669–686 (2006)
Vuran, M.C., Akyildiz, I.F.: Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 226–230 (2008)
Hanson, M.A., Powell, H.C., Barth, A.T., Ringgenberg, K., Calhoun, B.H., Aylor, J.H., Lach, J.: Body Area Sensor Networks: Challenges and Opportunities. IEEE Computer 42(1), 58–65 (2009)
Ullah, S., Higgin, H., Siddiqui, M.A., Kwak, K.S.: A Study of Implanted and Wearable Body Sensor Networks. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS, vol. 4953, pp. 464–473. Springer, Heidelberg (2008)
Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: Wireless multimedia sensor networks: A survey. IEEE Wireless Communications 14(6), 32–39 (2007)
Di Pietro, R., Mancini, L.V., Spognardi, A., Soriente, C., Tsudik, G.: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Hong Kong, China, March 2008, pp. 185–194 (2008)
Albano, M., Brogi, A., Popescu, R., Diaz, M., Dianes, J.A.: Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements. In: Proceedings of the 2nd Workshop on Requirements and Solutions for Pervasive Software Infrastructures (RSPSI 2007), Innsbruck, Austria, September 2007, pp. 1–6 (2007)
Roman, R., Alcaraz, C., Sklavos, N.: On the Hardware Implementation Efficiency of Cryptographic Primitives. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
Didla, S., Ault, A., Bagchi, S.: Optimizing AES for Embedded Devices and Wireless Sensor Networks. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008), Innsbruck, Austria (March 2008)
Jun Choi, K., Song, J.-I.: Investigation of Feasible Cryptographic Algorithms for Wireless Sensor Network. In: Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT 2006), Phoenix Park, Korea (February 2006)
Mantin, I.: Analysis of the Stream Cipher RC4. Master’s Thesis, Weizmann Institute of Science (2001)
Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: Proceedings of the International Symposium on Industrial Embedded Systems (SIES 2008), Montpellier, France, June 2008, pp. 58–66 (2008)
Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, St. Louis, USA, April 2008, pp. 245–256 (2008)
Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote. IEICE Transactions on Info and Systems E91-D(5), 1338–1347 (2008)
Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing based Cryptography to Wireless Sensor Networks. In: Proceedings of the 2nd ACM conference on Wireless Network Security (WiSec 2009), Zurich, Switzerland, March 2009, pp. 1–12 (2009)
Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and Modeling Encryption Overhead for Sensor Network Nodes. In: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA 2003), San Diego, USA, September 2003, pp. 151–159 (2003)
Wang, X.: Recent Progress on SHA-1. Rump Session, Crypto 2005 (2005)
NIST hash function competition, http://www.nist.gov/hash-competition (retrieved on June 2009)
Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), Washington, DC, USA, November 2002, pp. 41–47 (2002)
Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 8(2), 228–258 (2005)
Camtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)
Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Berlin, Germany, October 2004, pp. 206–215 (2004)
Seshadri, A., Luk, M., Perrig, A.: SAKE: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 372–385. Springer, Heidelberg (2008)
Panja, B., Madria, S., Bhargava, B.: Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), Taichung, Taiwan (June 2006)
Acs, G., Buttyan, L.: Secure Routing in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
Routing Over Low power and Lossy networks (ROLL) Working Group. Internet Engineering Task Force (IETF), http://www.ietf.org/html.charters/roll-charter.html (retrieved on June 2009)
Alzaid, H., Foo, E., Nieto, J.G.: Secure Data Aggregation in Wireless Sensor Network: a Survey. In: Proceedings of the Australasian Information Security Conference 2008: Conferences in Research and Practice in Information Technology (CRPIT), Wollongong, NSW, Australia, March 2008, pp. 93–105 (2008)
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.comnet.2009.02.023
Boukerche, A., Turgut, D.: Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14(5), 64–69 (2007)
Yang, Y., Sun, Y.: Securing Time-synchronization Protocols in Sensor Networks: Attack Detection and Self-healing. In: Proceedings of the IEEE 2008 Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008, pp. 1–6 (2008)
Ganeriwal, S., Popper, C., Capkun, S., Srivastava, M.B.: Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 11(4) (July 2008)
Giannetsos, T., Krontiris, I., Dimitriou, T., Freiling, F.C.: Intrusion Detection in Wireless Sensor Networks. In: On Security in RFID and Sensor Networks. Auerbach Publications, CRC Press (2009) ISBN: 978-1420068-399
Roman, R., Lopez, J., Gritzalis, S.: Situation Awareness Mechanisms for Wireless Sensor Networks. IEEE Communications Magazine 46(4), 102–107 (2008)
Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-Location Privacy for Networks of Energy-Constrained Sensors. In: Proceedings of the 2004 IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004), Vienna, Austria (May 2004)
Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: Behaviour-based, certificate-based and a combinational approach. International Journal System of Systems Engineering 1(1/2), 128–148 (2008)
Roman, R., Fernandez-Gago, M.C., Lopez, J., Chen, H.-H.: Trust and Reputation Systems for Wireless Sensor Networks. In: On Security and Privacy in Mobile and Wireless Networking. Troubador Publishing Ltd. (2009) ISBN: 978-1905886-906
Na, L., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey. Ad Hoc Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.adhoc.2009.04.009
Yasinsac, A.: Remote Attestation - Identification. On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7
Sang, L., Arora, A.: Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 2137–2145 (2008)
Danev, B., Capkun, S.: Physical-layer Identification of Wireless Sensor Nodes. Technical Reports 604, ETH Zürich, System Security Group D-INFK (August 2008)
Peerenboom, J.P., Fisher, R.E.: Analyzing Cross-Sector Interdependencies. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), Hawaii, USA, pp. 112–119 (2007)
ZigBee Alliance, http://www.zigbee.org/ (retrieved on June 2009)
HART Communication, http://www.hartcomm2.org (retrieved on June 2009)
ISA100.11a, Wireless Systems for Industrial Automation: Process Control and Related Applications, http://www.isa.org/isa100 (retrieved on June 2009)
IEEE Standard, 802.15.4-2006. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks (2006) ISBN 0-7381-4997-7
Alcaraz, C., Fernandez, G., Roman, R., Balastegui, A., Lopez, J.: Secure Management of SCADA Networks. New Trends in Network Management, Cepis UPGRADE 9(6), 22–28 (2008)
Modbus-IDA. The Architecture for Distributed Automation, http://www.modbus.org (retrieved on June 2009)
DNP3. DNP Users Group, http://www.dnp.org (retrieved on June 2009)
IEC 60870-5-104, International Electrotechnical Commission, http://www.iec.ch/ (retrieved on June 2009)
PI Profibus - Profinet, http://www.profibus.com (retrieved on June 2009)
Fieldbus Foundation, http://www.fieldbus.org (retrieved on June 2009)
Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. Request for Comments (September 2007)
International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)
Roman, R., Lopez, J.: Integrating Wireless Sensor Networks and the Internet: A Security Analysis. Internet Research 19(2), 246–259 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Lopez, J., Roman, R., Alcaraz, C. (2009). Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. In: Aldini, A., Barthe, G., Gorrieri, R. (eds) Foundations of Security Analysis and Design V. FOSAD FOSAD FOSAD 2009 2007 2008. Lecture Notes in Computer Science, vol 5705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03829-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-03829-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03828-0
Online ISBN: 978-3-642-03829-7
eBook Packages: Computer ScienceComputer Science (R0)