Skip to main content

Security in Wireless Sensor Networks

  • Chapter

Abstract

Humans are constantly inventing new technologies to fulfil their needs. Wireless sensor networks (WSNs) are a still developing technology consisting of multifunction sensor nodes that are small in size and communicate wirelessly over short distances. Sensor nodes incorporate properties for sensing the environment, data processing and communication with other sensors. The unique properties of WSNs increase flexibility and reduce user involvement in operational tasks such as in battlefields. Wireless sensor networks can perform an important role in many applications, such as patient health monitoring, environmental observation and building intrusion surveillance. In the future WSNs will become an integral part of our lives. However along with unique and different facilities, WSNs present unique and different challenges compared to traditional networks. In particular, wireless sensor nodes are battery operated, often having limited energy and bandwidth available for communications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   449.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   599.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Saraogi: Security in Wireless Sensor Networks, Department of Computer Science University of Tennessee (2005)

    Google Scholar 

  2. I.F. Akyildiz, Y.S.W. Su, E. Cayirci: A survey on sensor networks, IEEE Commun. Mag. 40(8), 102–116 (2002)

    Article  Google Scholar 

  3. J. Rabaey, J. Ammer, J.L. da Silva Jr., D. Patel: Pico-Radio: Ad-Hoc Wireless Networking of Ubiquitous Low Energy Sensor/Monitor Nodes, IEEE Computer Society Annual Workshop on VLSI (WVLSI) 2000, Orlanda (2000) pp. 9–12

    Google Scholar 

  4. J.P. Walters, Z. Liang, W. Shi, V. Chaudhary: Wireless Sensor Networks Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, ed. by Y. Xiao (Auerbach Publications, Boca Raton 2007) pp. 367–410

    Google Scholar 

  5. Xbow. Available at: http://www.xbow.com/wirelesshome.aspx (last accessed 12/07/2007)

  6. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: The Performance of Dynamic Group-Based Key Establishment (DGKE) under Node Capture Attacks in Wireless Sensor Networks, 2nd Conference on Advances in Computer Security and Forensics (ACSF) 2007, Liverpool (2007) pp. 12–13

    Google Scholar 

  7. T. Gao, D. Greenspan, M. Welsh, R.R. Juang, A. Alm: Vital Signs Monitoring and Patient Tracking over a Wireless Network, 27th IEEE EMBS Annual Int. Conference 2005 (2005) pp. 102–105

    Google Scholar 

  8. A. Cerpa, D. Estrin: ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies, IEEE Trans. Mob. Comput. 3(3), 272–285 (2004)

    Article  Google Scholar 

  9. H. Song, S. Zhu, G. Cao: SVATS: A Sensor-network-based Vehicle Anti-Theft System, IEEE INFOCOM 2008 (2008) pp. 2128–2136

    Google Scholar 

  10. K. Piotrowski, P. Langendoerfer, S. Peter: How Public Key Cryptography Influences Wireless Sensor Node Lifetime, 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2006 (2006) pp. 169–176

    Google Scholar 

  11. A. Cerpa, J. Elson, M. Hamilton, J. Zhao: Habitat Monitoring: Application Driver for Wireless Communications Technology, ACM SIGCOMM 2001, Costa Rica (2001) pp. 20–41

    Google Scholar 

  12. B. Halweil: Study finds modern farming is costly, World Watch 14, 910 (2001)

    Google Scholar 

  13. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Modelling Node Capture Attacks in Wireless Sensor Networks Using Simulation, 23rd Annual UK Performance Engineering Workshop 2007, Edge Hill University (2007) pp. 9–10

    Google Scholar 

  14. T. He, S. Krishnamurthy, J.A. Stankovic, T. Abdelzaher, R.S.L. Luo, T. Yan, L. Gu, G. Zhou, J. Hui, B. Krogh: VigilNet: An integrated sensor network system for energy-efficient surveillance, ACM Trans. Sens. Netw. 2(1), 1–38 (2006)

    Article  Google Scholar 

  15. J. Stankovic: Wireless Sensor Networks. In: Handbook of Real-Time and Embedded Systems, ed. by I. Lee, J.Y.-T. Leung, S.H. Son (CRC Press, Boca Raton 2007)

    Google Scholar 

  16. VigilNet. Available at: http://www.cs.virginia.edu/wsn/vigilnet/ (last accessed 31/12/2006)

  17. E. Biagioni, K. Bridges: The application of remote sensor technology to assist the recovery of rare and endangered species, Int. J. High Perform. Comput. Appl. 16(3), 315–324 (2002)

    Article  Google Scholar 

  18. ALERT. Available at: http://www.alertsystems.org (last accessed 01/01/2007)

  19. G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, M. Welsh: Fidelity and Yield in a Volcano Monitoring Sensor Network, 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI) 2006, Seattle (2006) pp. 381–396

    Google Scholar 

  20. G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Welsh: Deploying a wireless sensor network on an active volcano, IEEE Internet Comput. 10(2), 18–25 (2006)

    Article  Google Scholar 

  21. Volcano monitoring. Available at: http://www.eecs.harvard.edu/ mdw/proj/volcano/ (last accessed 10/1/2007)

  22. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, D. Rubenstein: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, 10th Int. Conference on Architectural Support for Programming Languages and Operating Systems 2002, San Jose (2002) pp. 96–107

    Google Scholar 

  23. ZebraNet. Available at: http://www.princeton.edu/ mrm/zebranet.html (last accessed 3/11/2006)

  24. C. Hartung, S. Holbrook, R. Han, C. Seielstad: FireWxNet: A Multi-Tiered Portable Wireless System for Monitoring Weather Conditions in Wildland Fire Environments, 4th Int. Conference on Mobile Systems, Applications and Services (MobiSys), 2006 (2006) pp. 28–41

    Google Scholar 

  25. S. Patel, K. Lorincz, R. Hughes, N. Huggins, J.H. Growdon, M. Welsh, P. Bonato: Analysis of Feature Space for Monitoring Persons with Parkinson’s Disease with Application to a Wireless Wearable Sensor System, 29th IEEE EMBS Annual Int. Conference 2007, Lyon (2007) pp. 6290–6293

    Google Scholar 

  26. T. Gao, T. Massey, L. Selavo, M. Welsh, M. Sarrafzadeh: Participatory User Centered Design Techniques for a Large Scale Ad-Hoc Health Information System, 1st Int. Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet) 2007, San Juan (2007) pp. 43–48

    Google Scholar 

  27. T. Gao, D. Greenspan, M. Welsh: Improving Patient Monitoring and Tracking in Emergency Response, Int. Conference on Information Communication Technologies in Health 2005 (2005)

    Google Scholar 

  28. D. Malan, T.R.F. Fulford-Jones, M. Welsh, S. Moulton: CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care, MobiSys Workshop on Applications of Mobile Embedded Systems (WAMES) 2004, Boston (2004) pp. 12–14

    Google Scholar 

  29. N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron: Monitoring behaviour in home using a smart fall sensor, IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology 2000 (2000) pp. 607–610

    Google Scholar 

  30. E. Jovanov, A. Milenkovic, C. Otto, P.C. de Groen: A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation, J. Neuro Eng. Rehabil. 2(6), 18–29 (2005)

    Google Scholar 

  31. J. Welch, F. Guilak, S.D. Baker: A Wireless ECG Smart Sensor for Broad Application in Life Threatening Event Detection, 26th Annual Int. Conference of the IEEE Engineering in Medicine and Biology Society 2004, San Francisco (2004) pp. 3447–3449

    Google Scholar 

  32. A. Milenkovic, C. Otto, E. Jovanov: Wireless sensor networks for personal health monitoring: issues and an implementation, Comput. Commun. 29(13/14), 2521–2533 (2006)

    Article  Google Scholar 

  33. A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, J. Stankovic: ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring, Department of Computer Science, University of Virginia (2006)

    Google Scholar 

  34. G. Virone, T. Doan, A. Wood, J.A. Stankovic: Dynamic Privacy in Assisted Living and Home Health Care, Joint Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability 2007 (2007)

    Google Scholar 

  35. AlarmNet. Available at: http://www.cs.virginia.edu/wsn/medical/ (last accessed 10/1/2007)

  36. H. Callaway: Wireless Sensor Networks: Architectures and Protocols, 0849318238, 9780849318238 (CRC Press, Boca Raton 2003)

    Google Scholar 

  37. M. Demirbas: Scalable design of fault-tolerance for wireless sensor networks, Ph.D. Thesis (Ohio State University, Columbus, OH 2004)

    Google Scholar 

  38. F. Koushanfar, M. Potkonjak, A. Sangiovanni-Vincentelli: Fault-Tolerance in Sensor Networks. In: Handbook of Sensor Networks, Vol. 36, ed. by I. Mahgoub, M. Ilyas (CRC Press, Boca Raton 2004)

    Google Scholar 

  39. E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan: Physical layer driven protocol and algorithm design for energy-efficient Wireless Sensor Networks, ACM MobiCom 2001, Rome (2001) pp. 272–286

    Google Scholar 

  40. J.N. Al-Karaki, A.E. Kamal: Routing techniques in wireless sensor networks: A survey, IEEE Wirel. Commun. 11(6), 6–28 (2004)

    Article  Google Scholar 

  41. F. Ye, H. Luo, J. Cheng, S. Lu, L. Zhang: A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks, ACM/IEEE MOBICOM 2002 (2002) pp. 148–159

    Google Scholar 

  42. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Security in Mobile Wireless Sensor Networks, 8th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet) 2007, Liverpool (2007) pp. 28–29

    Google Scholar 

  43. N. Bulusu, D. Estrin, L. Girod, J. Heidemann: Scalable coordination for Wireless Sensor Networks: self- configuring localization systems, in International Symposium on Communication Theory and Applications 2001, Ambleside (2001)

    Google Scholar 

  44. G.J. Pottie, W.J. Kaiser: Wireless integrated network sensors, Commun. ACM 43(5), 551–558 (2000)

    Article  Google Scholar 

  45. J.M. Kahn, R.H. Katz, K.S.J. Pister: Next Century Challenges: Mobile Networking For Smart Dust, ACM MobiCom 1999, Washington (1999) pp. 271–278

    Google Scholar 

  46. A. Rowe, R. Mangharam, R. Rajkumar: RT-Link: A global time-synchronized link protocol for sensor networks, Elsevier Ad hoc Netw. 6(8), 1201–1220 (2008)

    Article  Google Scholar 

  47. E. Farrugia, R. Simon: An efficient and secure protocol for sensor network time synchronization, J. Syst. Softw. 79(2), 147–162 (2006)

    Article  Google Scholar 

  48. S. Wu, K.S. Candan: Demand-scalable geographic multicasting in wireless sensor networks, Comput. Commun. 33(14–15), 2931–2953 (2007)

    Article  Google Scholar 

  49. Y. Wang, J. Gao, J.S.B. Mitchell: Boundary Recognition in Sensor Networks by Topological Methods, 12th Annual Int. Conference on Mobile Computing and Networking (MobiCom) 2006 (2006) pp. 122–133

    Google Scholar 

  50. E. Shi, A. Perrig: Designing secure sensor networks, Wirel. Commun. Mag. 11(6), 38–43 (2004)

    Article  Google Scholar 

  51. D. W. Carman, P.S. Krus, B.J. Matt: Constraints and Approaches for Distributed Sensor Network Security, Technical Report 00-010, NAI Labs, Network Associates, Inc, Glenwood, MD, Iss., 2000.

    Google Scholar 

  52. A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler: Spins: Security protocols for sensor networks, Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  53. D. Liu, P. Ning, S. Zhu, S. Jajodia: Practical Broadcast Authentication in Sensor Networks, 2nd Annual Int. Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous) 2005 (2005) pp. 118–129

    Google Scholar 

  54. D. Liu, P. Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks, 10th Annual Network and Distributed System Security Symposium 2003 (2003) pp. 263–276

    Google Scholar 

  55. D. Liu, P. Ning: Multilevel μTesla: broadcast authentication for distributed sensor networks, Trans. Embed. Comput. Syst. 3(4), 800–836 (2004)

    Article  Google Scholar 

  56. N. Engelbrecht, W.T. Penzhorn: Secure Authentication Protocols Used for Low Power Wireless Sensor Networks, IEEE International Symposiumon 2005 (2005) pp. 1777–1782

    Google Scholar 

  57. Z. Benenson, N. Gedicke, O. Raivio: Realizing Robust User Authentication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks (REALWSN) 2005 (2005) pp. 20–21

    Google Scholar 

  58. P. Nicopolitidis, M.S. Obaidat, G.I. Papadimitriou, A.S. Pomportsis: Wireless Networks, Vol. 2 (Wiley, West Sussex, UK 2003)

    Google Scholar 

  59. FunctionX. Computer Networks. Available at: http://www.functionx.com/networking/Lesson01.htm (last accessed 9/8/2005)

  60. Y. Xu, J. Heidemann, D. Estrin: Geography-informed Energy Conservation for Ad Hoc Routing, Mobicom 2001 (2001) pp. 70–84

    Google Scholar 

  61. T. Karygiannis, L. Owens: Wireless Network Security: 802.11, Bluetooth, and Handheld Devices, NIST (2002)

    Google Scholar 

  62. M. Langheinrich: A Privacy Awareness System for Ubiquitous Computing Environments, 4th Int. Conference on Ubiquitous Computing 2002 (2002)

    Google Scholar 

  63. E. Snekkenes: Concepts for Personal Location Privacy Policies, 3rd ACM Conference on Electronic Commerce 2001 (ACM Press, New York, USA 2001) pp. 48–57

    Google Scholar 

  64. S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, J. Tang: Framework for Security And Privacy In Automotive Telematics, 2nd ACM Int. Workshop on Mobile Commerce 2002 (2002) pp. 25–32

    Google Scholar 

  65. L. Sweeney: Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-based Syst. 10(5), 571–588 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  66. M. Gruteser, G. Schelle, A. Jain, R. Han, D. Grunwald: Privacy-Aware Location Sensor Networks, 9th Conference on Hot Topics in Operating Systems 2003 (2003) pp. 28–28

    Google Scholar 

  67. C. Karlof, D. Wagner: Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s Ad Hoc Net. J. 1(1), 293–315 (2003)

    Article  Google Scholar 

  68. I. Ahmed: Efficient key management for wireless sensor networks, M.Sc. Thesis (Hope University, Liverpool, 2006)

    Google Scholar 

  69. W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan: Energy Efficient Communication Protocol for Wireless Microsensor Networks, Hawaiian Int. Conference On Systems Science 2000 (2000)

    Google Scholar 

  70. M. Saxena: Security in Wireless Sensor Networks – A Layer based Classification, CERIAS Technical Report (2007)

    Google Scholar 

  71. H. Alzaid, E. Foo, J.M.G. Nieto: Secure data aggregation in wireless sensor network: A survey, Proc. 6th Australasian conference on Information security 2008, Wollongong (2008) pp. 93–105

    Google Scholar 

  72. C.Y. Wen, W.A. Sethares: Adaptive Decentralized Re-Clustering For Wireless Sensor Networks, SMC 2006, Taipei (2006) pp. 2709–2716

    Google Scholar 

  73. S. Vasudevan, B. DeCleene, N. Immerman, J.F. Kurose, D.F. Towsley: Leader Election Algorithms for Wireless Ad Hoc Networks, DISCEX 2003 (2003) pp. 261–272

    Google Scholar 

  74. IDs. Available at: http://searchsecurity.techtarget.com (last accessed 10/12/2006)

  75. F. Freiling, I. Krontiris, T. Dimitriou: Towards Intrusion Detection in Wireless Sensor Networks, 13th European Wireless Conference 2007, Paris (2007)

    Google Scholar 

  76. C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann: Impact of Network Density on Data Aggregation in Wireless Sensor Networks, 22nd Int. Conference on Distributed Computing Systems, Vienna, Austria, 2002 (2002) pp. 457–458

    Google Scholar 

  77. S. Madden, M.J. Franklin, J.M. Hellerstein, W. Hong: TAG: A tiny aggregation service for ad-hoc sensor networks, SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)

    Article  Google Scholar 

  78. Y. Yao, J. Gehrke: The COUGAR approach to in-network query processing in sensor networks, SIGMOD Rec. 31(3), 9–18 (2002)

    Article  Google Scholar 

  79. H. Chan, A. Perrig, D. Song: Secure Hierarchical In-Network Aggregation in Sensor Networks, 13th ACM Conference on Computer and communications Security 2006, Alexandria (2006) pp. 278–287

    Google Scholar 

  80. A. Deshpande, S. Nath, P.B. Gibbons, S. Seshan: Cache-and-Query for Wide Area Sensor Databases, Int. Conference on Management of Data SIGMOD 2003, San Diego (2003) pp. 503–514

    Google Scholar 

  81. C. Castelluccia, E. Mykletun, G. Tsudik: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, 2nd Annual Int. Conference on Mobile and Ubiquitous Systems 2005 (2005) pp. 109–117

    Google Scholar 

  82. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Applying Secure Data Aggregation Techniques for a Structure and Density Independent Group Based Key Management Protocol, 3rd IEEE Int. Symposium on Information Assurance and Security (IAS) 2007, Manchester (2007) pp. 44–49

    Google Scholar 

  83. L. Hu, D. Evans: Secure Aggregation for Wireless Networks, Workshop on Security and Assurance in Ad hoc Networks 2003 (2003) pp. 384–391

    Google Scholar 

  84. P. Jadia, A. Mathuria: Efficient Secure Aggregation In Sensor Networks, 11th Int. Conference on High Performance Computing 2004 (2004)

    Google Scholar 

  85. B. Przydatek, D. Song, A. Perrig: SIA: Secure Information Aggregation In Sensor Networks, 1st Int. Conference on Embedded Networked Sensor Systems 2003 (2003) pp. 255–265

    Google Scholar 

  86. Y. Yang, X. Wang, S. Zhu, G. Cao: SDAP: A secure hop-by-hop data aggregation protocol for sensor networks, ACM Trans. Inf. Syst. Secur. 11(4), 1–43 (2008)

    Article  Google Scholar 

  87. J. Girao, M. Schneider, D. Westhoff: CDA: Concealed Data Aggregation in Wireless Sensor Networks, ACM Workshop on Wireless Security 2004 (2004)

    Google Scholar 

  88. H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli: Energy-efficient secure pattern based data aggregation for wireless sensor networks, Comput. Commun. 29, 446–455 (2006)

    Article  Google Scholar 

  89. B. Krebs: A Short History of Computer Viruses and Attacks. Available at: http://www.washingtonpost.com/ac2/wp-dyn/A50636-2002Jun26 (last accessed 12/10/2007)

  90. The History of Computer Viruses. Available at: http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-viruses.shtml (last accessed 12/10/2007)

  91. P. Innella: A Brief History of Network Security and the Need for Host Based Intrusion Detection. Available at: http://www.tdisecurity.com/resources/ (last accessed 01/10/2007)

  92. T. Roosta, S. Shieh, S. Sastry: Taxonomy of Security Attacks in Sensor Networks, 1st IEEE Int. Conference on System Integration and Reliability Improvements 2006, Hanoi (2006) pp. 13–15

    Google Scholar 

  93. A. Becher, Z. Benenson, M. Dornseif: Tampering with Motes: Real-world Physical Attacks on Wireless Sensor Networks, Int. Conference on Security in Pervasive Computing (SPC) 2006 (2006) pp. 104–118

    Google Scholar 

  94. L. Eschenauer, V. Gligor: A Key Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security 2002 (2002) pp. 41–47

    Google Scholar 

  95. A. Hac: Wireless Sensor Networks Design (Wiley, UK 2003)

    Book  Google Scholar 

  96. D. Liu, P. Ning, W. Du: Group-Based Key Pre-Distribution in Wireless Sensor Networks, ACM Workshop on Wireless Security (WiSe) 2005 (2005) pp. 11–20

    Google Scholar 

  97. H. Chan, A. Perrig, D. Song: Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Research in Security and Privacy 2003 (2003) pp. 197–213

    Google Scholar 

  98. H. Chan, A. Perrig: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, INFOCOM 2005 (2005) pp. 524–535

    Google Scholar 

  99. M. Eltoweissy, A. Wadaa, S. Olariu, L. Wilson: Group key management scheme for large-scale sensor networks, Elsevier Ad Hoc Netw. 3(5), 668–688 (2004)

    Google Scholar 

  100. W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE INFOCOM 2004 (2004)

    Google Scholar 

  101. D. Huang, M. Mehta, D. Medhi, L. Harn: Location-Aware Key Management Scheme for Wireless Sensor Networks, 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2004 (2004) pp. 29–42

    Google Scholar 

  102. L. Zhou, J. Ni, C.V. Ravishankar: Efficient Key Establishment for Group-Based Wireless Sensor Deployments, WiSe 2005 (2005) pp. 1–10

    Google Scholar 

  103. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Application independent dynamic group-based key establishment for large-scale wireless sensor networks, China Commun. 4(1), 14–27 (2007)

    Google Scholar 

  104. C.C. Tiu: A new frequency-based side channel attack for embedded systems, M.Sc. Thesis (University of Waterloo, Waterloo, ON, Canada, 2005)

    Google Scholar 

  105. P. Kocher, J. Jaffe, B. Jun: Differential Power Analysis. In: Advances in Cryptography – CRYPTO’99, Lecture Notes in Computer Science, Vol. 1666, ed. by M. Wiener (Springer, Berlin Heidelberg 1999) pp. 388–397

    Google Scholar 

  106. D. Agrawal, B. Archambeault, J. R. Rao, P. Rohatgi: The EM Side-Channel (s): Attacks and Assessment Methodologies, IBM (2002)

    Google Scholar 

  107. K. Okeya, T. Iwata: Side channel attacks on message authentication codes, IPSJ Digit. Cour. 2, 478–488 (2006)

    Article  Google Scholar 

  108. C. Karlof, N. Sastry, D. Wagner: Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks, 2nd ACM Conference on Embedded Networked Sensor Systems 2004 (2004) pp. 162–175

    Google Scholar 

  109. A. Perrig, D. Wagner, J. Stankovic: Security in wireless sensor networks, Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  110. M. Krishnan: Intrusion Detection in Wireless Sensor Networks, Department of EECS, University of California at Berkeley (2006)

    Google Scholar 

  111. R. Muraleedharan, L.A. Osadciw: Cross Layer Protocols in Wireless Sensor Networks (Poster), IEEE Infocomm Student Workshop 2006 (2006)

    Google Scholar 

  112. A.D. Wood, J.A. Stankovic: Denial of service in sensor networks, IEEE Comput. 35(10), 54–62 (2002)

    Google Scholar 

  113. A.D. Wood, J.A. Stankovic: A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks. In: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, ed. by M. Ilyas, I. Mahgoub (CRC Press, Boca Raton, FL, USA 2005)

    Google Scholar 

  114. J. Regehr, N. Cooprider, W. Archer, E. Eide: Memory Safety and Untrusted Extensions for Tinyos, School of Computing, University of Utah (2006)

    Google Scholar 

  115. N. Cooprider, W. Archer, E. Eide, D. Gay, J. Regehr: Efficient Memory Safety for TinyOS, 5th ACM Conference on Embedded Networked Sensor Systems (SenSys) 2007, Sydney (2007) pp. 205–218

    Google Scholar 

  116. J. Hill, P. Bounadonna, D. Culler: Active Message Communication for Tiny Network Sensors, UC Berkeley, Berkeley (2001)

    Google Scholar 

  117. M. Shaneck, K. Mahadevan, V. Kher, Y. Kim: Remote Software-Based Attestation for Wireless Sensors, 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks 2005 (2005) pp. 27–41

    Google Scholar 

  118. A. Perrig, J. Newsome, E. Shi, D. Song: The Sybil Attack in Sensor Networks: Analysis and Defences, 3rd Int. Symposium on Information Processing in Sensor Networks 2004 (ACM Press, New York, USA 2004) pp. 259–268

    Google Scholar 

  119. D. Raffo: Security Schemes for the OLSR Protocol for Ad Hoc Networks, University of Paris (2005), Chap. 3

    Google Scholar 

  120. Y.-C. Hu, A. Perrig, D.B. Johnson: Adriane: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Annual ACM Int. Conference on Mobile Computing and Networking (MobiCom) 2002 (2002)

    Google Scholar 

  121. Y.-C. Hu, A. Perrig, D.B. Johnson: Packet Leashes: A Defence Against Wormhole Attacks in Wireless Ad Hoc Networks, 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 2003, San Francisco (2003) pp. 1976–1986

    Google Scholar 

  122. B. Yu, B. Xiao: Detecting Selective Forwarding Attacks in Wireless Sensor Networks, 20th Int. Parallel and Distributed Processing Symposium IPDPS 2006, Greece (2006) pp. 1–8

    Google Scholar 

  123. A.A. Pirzada, C. McDonald: Circumventing Sinkholes and Wormholes in Wireless Sensor Networks, Int. Workshop on Wireless Ad-hoc Networks 2005 (2005)

    Google Scholar 

  124. S. Datema: A case study of wireless sensor network attacks, M.Sc. Thesis (Delft University, Delft, The Netherlands 2005)

    Google Scholar 

  125. J. Deng, R. Han, S. Mishra: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks, First IEEE/Cerate Net Conference on Security and Privacy in Communication Networks (SecureComm) 2005, Athens (2005) pp. 113–124

    Google Scholar 

  126. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Group-based secure communication for large scale wireless sensor networks, J. Inf. Assur. Secur. 2(2), 139–147 (2007)

    Google Scholar 

  127. H. Yang, H.Y. Luo, F. Ye, S.W. Lu, L. Zhang: Security in mobile ad hoc networks: challenges and solutions, IEEE Wirel. Commun. 11(1), 38–47 (2004)

    Article  Google Scholar 

  128. H. Fu, S. Kawamura, M. Zhang, L. Zhang: Replication attack on random key pre-distribution schemes for wireless sensor networks, Comput. Commun. 31(4), 842–857 (2008)

    Article  Google Scholar 

  129. H. Fu, S. Kawamura, M. Zhang, L. Zhang: Replication Attack on Random Key Pre-Distribution Schemes for Wireless Sensor Networks, IEEE Workshop on Information Assurance and Security 2005, US Military Academy, West Point (2005) pp. 134–141

    Google Scholar 

  130. D. Liu, P. Ning: Establishing Pairwise Keys in Distributed Sensor Networks, 10th ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 52–61

    Google Scholar 

  131. W. Du, J. Deng, Y. Han, P. Varshney: A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, 10th ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 42–51

    Google Scholar 

  132. W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, A. Khalili: A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)

    Article  Google Scholar 

  133. B. Parno, A. Perrig, V. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks, IEEE Symposium on Security and Privacy 2005, Oakland (2005) pp. 49–63

    Google Scholar 

  134. Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway: A survey of key management schemes in wireless sensor Networks, Comput. Commun. 30(11–12), 2314–2341 (2007)

    Article  Google Scholar 

  135. P. Ning, R. Li, D. Liu: Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)

    Article  Google Scholar 

  136. F. Anjum: Location dependent key management using random key predistribution in sensor networks, WiSe 2006, 21–30 (2006)

    Article  Google Scholar 

  137. X. Du, Y. Xiao, M. Guizani, H.H. Chen: An effective key management scheme for heterogeneous sensor networks, Elsevier Ad Hoc Netw. 5(1), 24–34 (2007)

    Article  Google Scholar 

  138. B.C. Lai, S. Kim, I. Verbauwhede: Scalable Session Key Construction Protocol For Wireless Sensor Networks, IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES) 2002 (2002)

    Google Scholar 

  139. RSA. Available at: http://www.rsasecurity.com/rsalabs/ (last accessed 2/2/2006)

  140. R.D. Pietro, L.V. Mancini, S. Jajodia: Providing secrecy in key management protocols for large wireless sensors networks, Ad Hoc Netw. 1(4), 455–468 (2003)

    Article  Google Scholar 

  141. S. Zhu, S. Setia, S. Jajodia: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 62–72

    Google Scholar 

  142. G. Jolly, M.C. Kuscu, P. Kokate, M. Younis: A Low-Energy Key Management Protocol for Wireless Sensor Networks, IEEE Symposium on Computers and Communications (ISCC) 2003, Kemer – Antalya (2003) pp. 335–340

    Google Scholar 

  143. M. Bohge, W. Trappe: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks, 2nd ACM workshop on Wireless security (WiSe) 2003 (2003) pp. 79–87

    Google Scholar 

  144. M.F. Younis, K. Ghumman, M. Eltoweissy: Location-aware combinatorial key management scheme for clustered sensor networks, IEEE Trans. Parallel Distrib. Syst. 17(8), 865–882 (2006)

    Article  Google Scholar 

  145. X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2007)

    Article  Google Scholar 

  146. S. Hussain, F. Kausar, A. Masood: An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks, ACM Int. Conference on Wireless communications and Mobile Computing (IWCMC) 2007 (2007) pp. 388–392

    Google Scholar 

  147. P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta: Establishing Pair-Wise Keys In Heterogeneous Sensor Networks, IEEE INFOCOM 2006 (2006) pp. 1–12

    Google Scholar 

  148. C.S. Raghavendra, K.M. Sivalingam, T. Znati: Wireless Sensor Networks (Springer, New York, USA 2004)

    Book  Google Scholar 

  149. Homomorphic Encryption. Available at: http://en.wikipedia.org/wiki/Homomorphic_encryption (last accessed 01/03/2007)

  150. B. Schneier: Secret and Lies, Digital Security in a Networked World (Wiley, UK 2000)

    Google Scholar 

  151. N. Wang, S. Fang: A hierarchical key management scheme for secure group communications in mobile ad hoc networks, J. Syst. Softw. 80(10), 1667–1677 (2007)

    Article  MathSciNet  Google Scholar 

  152. B. Wu, J. Wu, E.B. Fernandez, M. Ilyas, S. Magliveras: Secure and efficient key management in mobile ad hoc networks, J. Netw. Comput. Appl. 30(3), 937–954 (2007)

    Article  Google Scholar 

  153. J. Cho, I. Chen, D. Wang: Performance optimization of region-based group key management in mobile ad hoc networks, Perform. Evaluation 65(5), 319–344 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Kifayat, K., Merabti, M., Shi, Q., Llewellyn-Jones, D. (2010). Security in Wireless Sensor Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04117-4_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04116-7

  • Online ISBN: 978-3-642-04117-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics