Skip to main content
Log in

A group-based security scheme for wireless sensor networks

  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

In recent years, wireless sensor networks have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. The problem is more critical if its purpose is for some mission-critical applications such as in a tactical battlefield. This paper presents a security scheme for group-based distributed wireless sensor networks. Our first goal is to devise a group-based secure wireless sensor network. We exploit the multi-line version of matrix key distribution technique and Gaussian distribution to achieve this goal. Secondly, security mechanisms are proposed for such a group-based network architecture in which sensed data collected at numerous, inexpensive sensor nodes are filtered by local processing on its way through more capable and compromise-tolerant reporting nodes. We address the upstream requirement that reporting nodes authenticate data produced by sensors before aggregating and the downstream requirement that sensors authenticates commands disseminated from reporting nodes. Security analysis is presented to quantify the strength of the proposed scheme against security threats. Through simulations, we validate the analytical results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Pottie GJ, Kaiser WJ (2000) Wireless integrated network sensors. Commun ACM 43(5):551–558

    Article  Google Scholar 

  2. Akyildiz I, Su W, Sankarasubramaniam Y and Cayirci E (2002) “A Survey on sensor networks,” IEEE Communications Magn, vol. 40, no. 8

    Google Scholar 

  3. Akyildiz I, Su W, Sankarasubramaniam Y, and Cayirci E (2002) “Wireless Sensor Networks: A Survey,” Computer Networks, vol. 38, no. 4

  4. Hamid MA, Rahman MM, Yoon YJ, and Hong CS (2007) “Developing a group-based security scheme for wireless sensor networks,” in Proc. of IEEE GLOBECOM, Washing DC, USA, pp. 1354–1359. November 26–30

  5. Liu D, Ning P, and Du W (2005) “Group-based key pre-distribution in wireless sensor networks,” in Proc. of ACM WiSE’05, September 2

  6. Estrin D, Govindan R, Heidemann J, and Kumar S, “Next century challenges: scalable coordination in sensor networks,” in Proc. of ACM Mobicom, Seattle, Washington, USA, pp. 263–270, August 1999.

  7. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann, “Impact of network density on data aggregation in wireless sensor networks,” in Proc. of ICDCS, pp. 457–458, 2002.

  8. Intanagonwiwat C, Govindan R, and Estrin D, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proc. of MOBICOM, pp. 56–67, 2000.

  9. Krishnamachari B, Estrin D, and Wicker S, “The impact of data aggregation in wireless sensor networks,” in Proc. of Int. Workshop on Distributed Event-Based Systems, DEBS’02, Vienna, Austria, July 2002.

  10. AI-Karaki XJN, UI-Mustafa R and Kamal AE, “Data aggregation in wireless sensor networks—exact and approximate algorithms,” Workshop on High Performance Switching and Routing, pp. 241–245, April 19–21, 2004.

  11. Przydatek B, Song D and Perrig A “SIA: secure information aggregation in sensor networks,” in Proc. of ACM SenSys’03, Los Angeles, California, USA, November 5–7, 2003.

  12. Hu L and Evans D, “Secure aggregation for wireless networks,” in Proc. of the 2003 Symposium on Applications and the Internet Workshops, pp. 384–2003.

  13. Zhu S, Setia S, Jajodia S and Ning P, “An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks,” in Proc. of the 2004 IEEE Symposium on Security and Privacy, pp. 259–271, May 9–12, 2004.

  14. Bekara C, Laurent-Maknavicius M, Bekara K (2007) SAPC: A Secure Aggregation Protocol for Cluster-Based Wireless. In: Zhang H, Olariu S, Cao J, Johnson DB (eds) MSN 2007. LNCS, vol 4864. Springer, Heidelberg, pp 784–798

    Google Scholar 

  15. Okorafor UN, Kundur D (2010) Security-aware routing and localization for a directional mission critical network. IEEE J Sel Areas Commun 28(5):664–676

    Article  Google Scholar 

  16. Pietro RD, Mancini LV, Soriente C, Spognardi A, Tsudik G (2009) Data security in unattended wireless sensor networks. IEEE Trans Comput 58(11):1500–1511

    Article  MathSciNet  Google Scholar 

  17. Zhu B, Setia S, Jajodia S, Roy S, Wang L (2010) Localized multicast: efficient and distributed replica detection in large-scale sensor networks. IEEE Trans Mob Comput 9(7):913–926

    Article  Google Scholar 

  18. Gura N, Patel A, Wander A, Eberle H, Shantz SC, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. of the Sixth Workshop on Crypto- graphic Hardware and Embedded Systems (CHES’04), Cambridge, MA, USA, pp. 119–132, 2004.

  19. Eschenauer L and Gligor VD, “A key-management scheme for distributed sensor networks,” in Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002.

  20. Gong Li, Wheeler DJ (1990) A matrix-key distribution scheme. J Cryptol 2:51–59

    Article  MathSciNet  MATH  Google Scholar 

  21. Law YW, Doumen J, Hartel P (2006) Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans Sens Netw 2(1):65–93

    Article  Google Scholar 

  22. Ross SM (2003) Introduction to Probability Models, Academic, 8th Edition,

  23. The Network Simulator–ns-2, http://www.isi.edu/nsnam/ns/index.html

  24. Deng J, Han R and Mishra S, 2003 “The performance evaluation of intrusion-tolerant routing in wireless sensor networks,” in Proc. of 2 nd IEEE Int. Workshop on Information processing in Sensor Networks, IPSN’03, LNCS 2634

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Md. Abdul Hamid.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hamid, M.A., Sarkar, A.M.J. A group-based security scheme for wireless sensor networks. Ann. Telecommun. 67, 455–469 (2012). https://doi.org/10.1007/s12243-011-0278-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-011-0278-3

Keywords

Navigation