Abstract
In recent years, wireless sensor networks have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. The problem is more critical if its purpose is for some mission-critical applications such as in a tactical battlefield. This paper presents a security scheme for group-based distributed wireless sensor networks. Our first goal is to devise a group-based secure wireless sensor network. We exploit the multi-line version of matrix key distribution technique and Gaussian distribution to achieve this goal. Secondly, security mechanisms are proposed for such a group-based network architecture in which sensed data collected at numerous, inexpensive sensor nodes are filtered by local processing on its way through more capable and compromise-tolerant reporting nodes. We address the upstream requirement that reporting nodes authenticate data produced by sensors before aggregating and the downstream requirement that sensors authenticates commands disseminated from reporting nodes. Security analysis is presented to quantify the strength of the proposed scheme against security threats. Through simulations, we validate the analytical results.
Similar content being viewed by others
References
Pottie GJ, Kaiser WJ (2000) Wireless integrated network sensors. Commun ACM 43(5):551–558
Akyildiz I, Su W, Sankarasubramaniam Y and Cayirci E (2002) “A Survey on sensor networks,” IEEE Communications Magn, vol. 40, no. 8
Akyildiz I, Su W, Sankarasubramaniam Y, and Cayirci E (2002) “Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4
Hamid MA, Rahman MM, Yoon YJ, and Hong CS (2007) “Developing a group-based security scheme for wireless sensor networks,” in Proc. of IEEE GLOBECOM, Washing DC, USA, pp. 1354–1359. November 26–30
Liu D, Ning P, and Du W (2005) “Group-based key pre-distribution in wireless sensor networks,” in Proc. of ACM WiSE’05, September 2
Estrin D, Govindan R, Heidemann J, and Kumar S, “Next century challenges: scalable coordination in sensor networks,” in Proc. of ACM Mobicom, Seattle, Washington, USA, pp. 263–270, August 1999.
Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann, “Impact of network density on data aggregation in wireless sensor networks,” in Proc. of ICDCS, pp. 457–458, 2002.
Intanagonwiwat C, Govindan R, and Estrin D, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proc. of MOBICOM, pp. 56–67, 2000.
Krishnamachari B, Estrin D, and Wicker S, “The impact of data aggregation in wireless sensor networks,” in Proc. of Int. Workshop on Distributed Event-Based Systems, DEBS’02, Vienna, Austria, July 2002.
AI-Karaki XJN, UI-Mustafa R and Kamal AE, “Data aggregation in wireless sensor networks—exact and approximate algorithms,” Workshop on High Performance Switching and Routing, pp. 241–245, April 19–21, 2004.
Przydatek B, Song D and Perrig A “SIA: secure information aggregation in sensor networks,” in Proc. of ACM SenSys’03, Los Angeles, California, USA, November 5–7, 2003.
Hu L and Evans D, “Secure aggregation for wireless networks,” in Proc. of the 2003 Symposium on Applications and the Internet Workshops, pp. 384–2003.
Zhu S, Setia S, Jajodia S and Ning P, “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” in Proc. of the 2004 IEEE Symposium on Security and Privacy, pp. 259–271, May 9–12, 2004.
Bekara C, Laurent-Maknavicius M, Bekara K (2007) SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless. In: Zhang H, Olariu S, Cao J, Johnson DB (eds) MSN 2007. LNCS, vol 4864. Springer, Heidelberg, pp 784–798
Okorafor UN, Kundur D (2010) Security-aware routing and localization for a directional mission critical network. IEEE J Sel Areas Commun 28(5):664–676
Pietro RD, Mancini LV, Soriente C, Spognardi A, Tsudik G (2009) Data security in unattended wireless sensor networks. IEEE Trans Comput 58(11):1500–1511
Zhu B, Setia S, Jajodia S, Roy S, Wang L (2010) Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans Mob Comput 9(7):913–926
Gura N, Patel A, Wander A, Eberle H, Shantz SC, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. of the Sixth Workshop on Crypto- graphic Hardware and Embedded Systems (CHES’04), Cambridge, MA, USA, pp. 119–132, 2004.
Eschenauer L and Gligor VD, “A key-management scheme for distributed sensor networks,” in Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002.
Gong Li, Wheeler DJ (1990) A matrix-key distribution scheme. J Cryptol 2:51–59
Law YW, Doumen J, Hartel P (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sens Netw 2(1):65–93
Ross SM (2003) Introduction to Probability Models, Academic, 8th Edition,
The Network Simulator–ns-2, http://www.isi.edu/nsnam/ns/index.html
Deng J, Han R and Mishra S, 2003 “The performance evaluation of intrusion-tolerant routing in wireless sensor networks,” in Proc. of 2 nd IEEE Int. Workshop on Information processing in Sensor Networks, IPSN’03, LNCS 2634
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hamid, M.A., Sarkar, A.M.J. A group-based security scheme for wireless sensor networks. Ann. Telecommun. 67, 455–469 (2012). https://doi.org/10.1007/s12243-011-0278-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12243-011-0278-3