Skip to main content

Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

  • Chapter
Foundations of Security Analysis and Design V (FOSAD 2009, FOSAD 2007, FOSAD 2008)

Abstract

As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petersen, S., Carlsen, S.: Wireless Sensor Networks: Introduction to Installation and Integration on an Offshore Oil & Gas Platform. In: Proceedings of the 19th Australian Conference on Software Engineering (ASWEC 2008), Perth, Australia (March 2008)

    Google Scholar 

  2. European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)

  3. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc 2005), pp. 46–57. Urbana-Champaign, USA (2005)

    Google Scholar 

  4. Raymond, D.R., Marchany, R.C., Brownfield, M.I., Midkiff, S.F.: Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology 58(1), 367–380 (2009)

    Article  Google Scholar 

  5. Law, Y.W., Palaniswami, M., Van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-Efficient Link-Layer Jamming Attacks against Wireless Sensor Network MAC Protocols. ACM Transactions on Sensor Networks 5(1), 6:1–6:38 (2009)

    Article  Google Scholar 

  6. Raymond, D.R., Midkiff, S.F.: Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing 7(1), 74–81 (2008)

    Article  Google Scholar 

  7. Pongaliur, K., Abraham, Z., Liu, A.X., Xiao, L., Kempel, L.: Securing Sensor Nodes Against Side Channel Attacks. In: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE 2008), Nanjing, China, December 2008, pp. 353–361 (2008)

    Google Scholar 

  8. Becher, A., Benenson, Z., Dornseif, M.: Tampering with motes: Real-world physical attacks on wireless sensor networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 104–118. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Goodspeed, T.: Wireless Sensor Networks as an Asset and a Liability. In: Proceedings of the SOURCE Conference, Boston, USA (March 2009)

    Google Scholar 

  10. Francillon, A., Castelluccia, C.: Code Injection Attacks on Harvard-Architecture Devices. In: Proceedings of the 15th ACM conference on Computer and communications security (CCS 2008), Alexandria, USA, October 2008, pp. 15–26 (2008)

    Google Scholar 

  11. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proceedings of the IEEE 3rd International Workshop on Information Processing in Sensor Networks (IPSN 2004), Berkeley, USA, April 2004, pp. 259–268 (2004)

    Google Scholar 

  12. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure. Ad-Hoc Networks 1(2-3), 293–315 (2003)

    Article  Google Scholar 

  13. Manzo, M., Roosta, T., Sastry, S.: Time Synchronization Attacks in Sensor Networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), Alexandria, USA, November 2005, pp. 107–116 (2005)

    Google Scholar 

  14. Shnayder, V., Hempstead, M., Chen, B., Allen, G.W., Welsh, M.: Simulating the Power Consumption of Large-Scale Sensor Network Applications. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys 2004), Baltimore, USA, August 2004, pp. 188–200 (2004)

    Google Scholar 

  15. Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-driven Perspective on Wireless Sensor Network Security. In: Proceedings of the 2nd ACM International Workshop on Quality of Service & Security for Wireless and Mobile Networks, Torremolinos, Spain, pp. 1–8 (2006)

    Google Scholar 

  16. Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible Security Synthesis for Wireless Sensor Networks. In: Proceedings of the 3rd international Workshop on Middleware for Sensor Networks, Leuven, Belgium, pp. 19–24 (2008)

    Google Scholar 

  17. Roman, R.: Application-driven Security in Wireless Sensor Networks. Ph.D. Thesis, University of Malaga (June 2008)

    Google Scholar 

  18. Healy, M., Newe, T., Lewis, E.: Wireless Sensor Node Hardware: A Review. In: Proceedings of IEEE SENSORS 2008, Lecce, Italy, October 2008, pp. 621–624 (2008)

    Google Scholar 

  19. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: An Operating System for Sensor Networks. In: On Ambient Intelligence. Springer, Heidelberg (2005)

    Google Scholar 

  20. Dutta, P., Taneja, J., Jeong, J., Jiang, X., Culler, D.: A Building Block Approach to Sensornet Systems. In: Proceedings of the Sixth ACM Conference on Embedded Networked Sensor Systems (SenSys 2008), Raleigh, USA, November 2008, pp. 267–280 (2008)

    Google Scholar 

  21. Seah, W.K.G., Eu, Z.A., Tan, H.-P.: Wireless Sensor Networks Powered by Ambient Energy Harvesting (WSN-HEAP) - Survey and Challenges. In: Proceedings of CTIF Wireless VITAE 2009, Aalborg, Denmark (May 2009)

    Google Scholar 

  22. Penella, M.T., Gasulla, M.: A Review of Commercial Energy Harvesters for Autonomous Sensors. In: Proceedings of IEEE Instrumentation and Measurement Technology Conference Proceedings (IMTC 2007), Warsaw, Poland, May 2007, pp. 1–5 (2007)

    Google Scholar 

  23. Crossbow Technology, Inc. eKo Pro Precision Agriculture, http://www.xbow.com/eko/ (retrieved on June 2009)

  24. Galindo, D., Roman, R., Lopez, J.: A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 120–132. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  25. Camtepe, S.A., Yener, B.: Key Management in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam (2008)

    Google Scholar 

  26. Stajano, F., Cvrcek, D., Lewis, M.: Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 460–478. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  27. Alcaraz, C., Roman, R.: Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 166–178. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  28. ECRYPT Network of Excellence. eSTREAM, the ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/ (retrieved on June 2009)

  29. European Organization for Nuclear Research (CERN). LHC - The Large Hadron Collider, http://lhc.web.cern.ch (retrieved on June 2009)

  30. Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer 37(8), 41–49 (2004)

    Article  Google Scholar 

  31. Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: Research challenges. Ad Hoc Networks Jounal (Elsevier) 3(3), 257–279 (2005)

    Article  Google Scholar 

  32. Heidemann, J., Wei, Y., Wills, J., Syed, A., Yuan, L.: Research Challenges and Applications for Underwater Sensor Networking. In: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006), Las Vegas, USA, April 2006, vol. 1, pp. 228–235 (2006)

    Google Scholar 

  33. Akyildiz, I.F., Stuntebeck, E.P.: Wireless Underground Sensor Networks: Research Challenges. Ad Hoc Networks Journal 4(6), 669–686 (2006)

    Article  Google Scholar 

  34. Vuran, M.C., Akyildiz, I.F.: Cross-layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 226–230 (2008)

    Google Scholar 

  35. Hanson, M.A., Powell, H.C., Barth, A.T., Ringgenberg, K., Calhoun, B.H., Aylor, J.H., Lach, J.: Body Area Sensor Networks: Challenges and Opportunities. IEEE Computer 42(1), 58–65 (2009)

    Article  Google Scholar 

  36. Ullah, S., Higgin, H., Siddiqui, M.A., Kwak, K.S.: A Study of Implanted and Wearable Body Sensor Networks. In: Nguyen, N.T., Jo, G.-S., Howlett, R.J., Jain, L.C. (eds.) KES-AMSTA 2008. LNCS, vol. 4953, pp. 464–473. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  37. Akyildiz, I.F., Melodia, T., Chowdhury, K.R.: Wireless multimedia sensor networks: A survey. IEEE Wireless Communications 14(6), 32–39 (2007)

    Article  Google Scholar 

  38. Di Pietro, R., Mancini, L.V., Spognardi, A., Soriente, C., Tsudik, G.: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: Proceedings of the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), Hong Kong, China, March 2008, pp. 185–194 (2008)

    Google Scholar 

  39. Albano, M., Brogi, A., Popescu, R., Diaz, M., Dianes, J.A.: Towards Secure Middleware for Embedded Peer-to-Peer Systems: Objectives & Requirements. In: Proceedings of the 2nd Workshop on Requirements and Solutions for Pervasive Software Infrastructures (RSPSI 2007), Innsbruck, Austria, September 2007, pp. 1–6 (2007)

    Google Scholar 

  40. Roman, R., Alcaraz, C., Sklavos, N.: On the Hardware Implementation Efficiency of Cryptographic Primitives. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7

    Google Scholar 

  41. Didla, S., Ault, A., Bagchi, S.: Optimizing AES for Embedded Devices and Wireless Sensor Networks. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (TRIDENTCOM 2008), Innsbruck, Austria (March 2008)

    Google Scholar 

  42. Jun Choi, K., Song, J.-I.: Investigation of Feasible Cryptographic Algorithms for Wireless Sensor Network. In: Proceedings of the 8th International Conference on Advanced Communication Technology (ICACT 2006), Phoenix Park, Korea (February 2006)

    Google Scholar 

  43. Mantin, I.: Analysis of the Stream Cipher RC4. Master’s Thesis, Weizmann Institute of Science (2001)

    Google Scholar 

  44. Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: Proceedings of the International Symposium on Industrial Embedded Systems (SIES 2008), Montpellier, France, June 2008, pp. 58–66 (2008)

    Google Scholar 

  45. Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), SPOTS Track, St. Louis, USA, April 2008, pp. 245–256 (2008)

    Google Scholar 

  46. Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-bit MICAz Mote. IEICE Transactions on Info and Systems E91-D(5), 1338–1347 (2008)

    Google Scholar 

  47. Szczechowiak, P., Kargl, A., Scott, M., Collier, M.: On the Application of Pairing based Cryptography to Wireless Sensor Networks. In: Proceedings of the 2nd ACM conference on Wireless Network Security (WiSec 2009), Zurich, Switzerland, March 2009, pp. 1–12 (2009)

    Google Scholar 

  48. Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F., Sichitiu, M.: Analyzing and Modeling Encryption Overhead for Sensor Network Nodes. In: Proceedings of the 2nd ACM International Conference on Wireless Sensor Networks and Applications (WSNA 2003), San Diego, USA, September 2003, pp. 151–159 (2003)

    Google Scholar 

  49. Wang, X.: Recent Progress on SHA-1. Rump Session, Crypto 2005 (2005)

    Google Scholar 

  50. NIST hash function competition, http://www.nist.gov/hash-competition (retrieved on June 2009)

  51. Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), Washington, DC, USA, November 2002, pp. 41–47 (2002)

    Google Scholar 

  52. Du, W., Deng, J., Han, Y.S., Varshney, P., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 8(2), 228–258 (2005)

    Article  Google Scholar 

  53. Camtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)

    Article  Google Scholar 

  54. Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  55. Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), Berlin, Germany, October 2004, pp. 206–215 (2004)

    Google Scholar 

  56. Seshadri, A., Luk, M., Perrig, A.: SAKE: Software attestation for key establishment in sensor networks. In: Nikoletseas, S.E., Chlebus, B.S., Johnson, D.B., Krishnamachari, B. (eds.) DCOSS 2008. LNCS, vol. 5067, pp. 372–385. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  57. Panja, B., Madria, S., Bhargava, B.: Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. In: Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), Taichung, Taiwan (June 2006)

    Google Scholar 

  58. Acs, G., Buttyan, L.: Secure Routing in Wireless Sensor Networks. In: On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7

    Google Scholar 

  59. Routing Over Low power and Lossy networks (ROLL) Working Group. Internet Engineering Task Force (IETF), http://www.ietf.org/html.charters/roll-charter.html (retrieved on June 2009)

  60. Alzaid, H., Foo, E., Nieto, J.G.: Secure Data Aggregation in Wireless Sensor Network: a Survey. In: Proceedings of the Australasian Information Security Conference 2008: Conferences in Research and Practice in Information Technology (CRPIT), Wollongong, NSW, Australia, March 2008, pp. 93–105 (2008)

    Google Scholar 

  61. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.comnet.2009.02.023

  62. Boukerche, A., Turgut, D.: Secure time synchronization protocols for wireless sensor networks. IEEE Wireless Communications 14(5), 64–69 (2007)

    Article  Google Scholar 

  63. Yang, Y., Sun, Y.: Securing Time-synchronization Protocols in Sensor Networks: Attack Detection and Self-healing. In: Proceedings of the IEEE 2008 Global Telecommunications Conference (GLOBECOM 2008), New Orleans, USA, November-December 2008, pp. 1–6 (2008)

    Google Scholar 

  64. Ganeriwal, S., Popper, C., Capkun, S., Srivastava, M.B.: Secure Time Synchronization in Sensor Networks. ACM Transactions on Information and System Security (TISSEC) 11(4) (July 2008)

    Google Scholar 

  65. Giannetsos, T., Krontiris, I., Dimitriou, T., Freiling, F.C.: Intrusion Detection in Wireless Sensor Networks. In: On Security in RFID and Sensor Networks. Auerbach Publications, CRC Press (2009) ISBN: 978-1420068-399

    Google Scholar 

  66. Roman, R., Lopez, J., Gritzalis, S.: Situation Awareness Mechanisms for Wireless Sensor Networks. IEEE Communications Magazine 46(4), 102–107 (2008)

    Article  Google Scholar 

  67. Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-Location Privacy for Networks of Energy-Constrained Sensors. In: Proceedings of the 2004 IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004), Vienna, Austria (May 2004)

    Google Scholar 

  68. Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: Behaviour-based, certificate-based and a combinational approach. International Journal System of Systems Engineering 1(1/2), 128–148 (2008)

    Article  Google Scholar 

  69. Roman, R., Fernandez-Gago, M.C., Lopez, J., Chen, H.-H.: Trust and Reputation Systems for Wireless Sensor Networks. In: On Security and Privacy in Mobile and Wireless Networking. Troubador Publishing Ltd. (2009) ISBN: 978-1905886-906

    Google Scholar 

  70. Na, L., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey. Ad Hoc Networks (Elsevier) (2009) Article in press, http://dx.doi.org/10.1016/j.adhoc.2009.04.009

  71. Yasinsac, A.: Remote Attestation - Identification. On Wireless Sensor Network Security. IOS Press, Amsterdam, ISBN: 978-1-58603-813-7

    Google Scholar 

  72. Sang, L., Arora, A.: Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In: Proceedings of the 27th IEEE Conference on Computer Communications (INFOCOM 2008), Phoenix, USA, April 2008, pp. 2137–2145 (2008)

    Google Scholar 

  73. Danev, B., Capkun, S.: Physical-layer Identification of Wireless Sensor Nodes. Technical Reports 604, ETH Zürich, System Security Group D-INFK (August 2008)

    Google Scholar 

  74. Peerenboom, J.P., Fisher, R.E.: Analyzing Cross-Sector Interdependencies. In: Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS 2007), Hawaii, USA, pp. 112–119 (2007)

    Google Scholar 

  75. ZigBee Alliance, http://www.zigbee.org/ (retrieved on June 2009)

  76. HART Communication, http://www.hartcomm2.org (retrieved on June 2009)

  77. ISA100.11a, Wireless Systems for Industrial Automation: Process Control and Related Applications, http://www.isa.org/isa100 (retrieved on June 2009)

  78. IEEE Standard, 802.15.4-2006. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks (2006) ISBN 0-7381-4997-7

    Google Scholar 

  79. Alcaraz, C., Fernandez, G., Roman, R., Balastegui, A., Lopez, J.: Secure Management of SCADA Networks. New Trends in Network Management, Cepis UPGRADE 9(6), 22–28 (2008)

    Google Scholar 

  80. Modbus-IDA. The Architecture for Distributed Automation, http://www.modbus.org (retrieved on June 2009)

  81. DNP3. DNP Users Group, http://www.dnp.org (retrieved on June 2009)

  82. IEC 60870-5-104, International Electrotechnical Commission, http://www.iec.ch/ (retrieved on June 2009)

  83. PI Profibus - Profinet, http://www.profibus.com (retrieved on June 2009)

  84. Fieldbus Foundation, http://www.fieldbus.org (retrieved on June 2009)

  85. Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. Request for Comments (September 2007)

    Google Scholar 

  86. International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)

    Google Scholar 

  87. Roman, R., Lopez, J.: Integrating Wireless Sensor Networks and the Internet: A Security Analysis. Internet Research 19(2), 246–259 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Lopez, J., Roman, R., Alcaraz, C. (2009). Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. In: Aldini, A., Barthe, G., Gorrieri, R. (eds) Foundations of Security Analysis and Design V. FOSAD FOSAD FOSAD 2009 2007 2008. Lecture Notes in Computer Science, vol 5705. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03829-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03829-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03828-0

  • Online ISBN: 978-3-642-03829-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics