ABSTRACT
The main contribution of this work is to propose a new concept: the AutoNomouS Wireless sEnsor netwoRk (ANSWER) whose mission is to provide in-situ users with secure information that enhances their context awareness. ANSWER finds immediate applications to both overt and covert operations ranging from tactical battlefield surveillance to crisis management and homeland security. ANSWER is capable of performing sophisticated analyses for detecting trends and identifying unexpected, coherent, and emergent behavior.
- Akyildiz, I. F., Su, W., Sankarasubramanian, Y., and Cayirci, E. Wireless sensor networks: A survey, Computer Networks, 38, 4 (2002), 393--422.]] Google ScholarDigital Library
- Anderson, R. and Kuhn, M. Tamper resistance - a cautionary note, In Proceedings of the 2nd Usenix Workshop on Electronic Commerce (Berkely, California, 1996).]] Google ScholarDigital Library
- Ateniese, G., Herzberg, A., Krawczyk, H., and Tsudik, G. Untraceable mobility or how to travel incognito, Computer Networks, 31, 8 (1999), 871--884.]] Google ScholarDigital Library
- Bahl, P., Russell, W., Wang, Y.-M., Balachandran, A., Voelker, G. M. and Miu, A. PAWNs: satisfying the need for ubiquitous secure connectivity and location services, IEEE Wireless Communications, 9, 1 (2002), 40--48.]]Google ScholarDigital Library
- Basagni, S., Herrin, K., Rosti, E. and Bruschi, D. Secure pebblenets, In Proceedings of the MobiHoc (Long Beach, California, October 2001).]] Google ScholarDigital Library
- Berthold, O., Federrath, H. and Kohntopp, M. Project anonymity and unobservability in the Internet, In Proceedings of the Computers Freedom and Privacy (CFP 2000), Workshop on Freedom and Privacy by Design, 2000.]] Google ScholarDigital Library
- Beresford, A. and Stajano, F. Location privacy in pervasive computing, Pervasive Computing, 2, 1 (2003), 46--55.]] Google ScholarDigital Library
- Capkun, S., Hubaux, J.-P., and Jakobsson, M. Secure and privacy-preserving communication in hybrid ad hoc networks, EPFL-IC Tech. Report No. IC/2004/10, 2004.]]Google Scholar
- Carman, D. W., Kruus, P. S. and Matt, B. J., Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, 2000.]]Google Scholar
- Carman, D.W., Matt, B.J. and Cirincione, G.H., Energy-efficient and low-latency key management for sensor networks. <http://www.ccs.neu.edu/../../papers/ad-hoc-network/sensor/OO-03.pdf> In Proceedings of the 23rd Army Science Conference, (Orlando, Florida, December 2-5 2002).]]Google Scholar
- Chan, H., Perrig, A. and Song, D., Random key pre-distribution schemes for sensor networks, In Proceedings of the IEEE Symposium on Security and Privacy, (Oakland, California, October 2003).]] Google ScholarDigital Library
- Culler, D., Estrin, D. and Srivastava, M. Overview of sensor networks, IEEE Computer, 37, 8 (2004), 41--49.]] Google ScholarDigital Library
- DiPietro, R., Mancini, L. V. and Jajodia, S. Providing secrecy in key management protocols for large wireless sensor networks, Journal of AdHoc Networks, 1, 4 (2003), 455--468.]]Google Scholar
- DiPietro, R., Mancini, L. V. and Mei, A. Random key assignment for secure wireless sensor networks, Proc. 1st Workshop on Security in Ad Hoc and Sensor Networks, (SANS'03) (2003).]] Google ScholarDigital Library
- Du, W., Deng, J., Han, Y. S., Chen, S. and Varshney, P. A key management scheme for wireless sensor networks using deployment knowledge, In Proceedings of the IEEE INFOCOM'04 (2004).]]Google Scholar
- Eschenauer, L. and Gligor, V. A key management scheme for distributed sensor networks, In Proceedings of the 9th ACM Conference on Computer and Communications Security (2003).]] Google ScholarDigital Library
- Gracanin, D., Eltoweissy, M., Olariu, S. and Wadaa, A. On modeling wireless sensor networks, In Proceedings of the IEEE Workshop on Mobile Ad Hoc and Sensor Networks (WMAN'04), (2004).]]Google ScholarCross Ref
- Hu, Y.-C., Johnson, D. B. and Perrig, A. SEAD: Secure efficient distance vector routing in mobile wireless ad hoc networks, In Proceedings of the 4th Workshop on Mobile Computing Systems and Applications (WMCSA'02) (2002).]] Google ScholarDigital Library
- Jones, K., Wadaa, A., Olariu, S, Wilson, L. and Eltoweissy, M. Towards a new paradigm for securing wireless sensor networks, In Proceedings of the Workshop on New Security Paradigms, (NSPW'2003) (August 2003).]] Google ScholarDigital Library
- Karlof, C. and Wagner, D. Secure routing in sensor networks: attacks and countermeasures, In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications (May 2003).]]Google ScholarCross Ref
- Kong, J., Hong, X. and Gerla, M. An anonymous on demand routing protocol with untraceable routes for mobile ad hoc network, UCLA Computer Sc. Tech. Report 030020, 2003.]]Google Scholar
- Liu, D. and Ning, P. Establishing pairwise keys in distributed sensor networks, In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), (October 2003).]] Google ScholarDigital Library
- Liu, D. and Ning, P. Location-based pairwise key establishments for static sensor networks, In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks, (SASN '03) (October 2003).]] Google ScholarDigital Library
- Liu, D. and Ning, P. Multi-level μTESLA: A broadcast authentication system for distributed sensor networks, ACM Transactions in Embedded Computing Systems (2004).]] Google ScholarDigital Library
- Menezes, A. J., Van Oorschot, P. and Vanstone, S. Handbook of Applied Cryptography, CRC Press, Boca Raton, 1996.]] Google ScholarDigital Library
- Molva, R., Samfat, D. and Tsudik, G. Authentication of mobile users, IEEE Network, 8, 2 (1994), 26--34.]]Google ScholarDigital Library
- Newsome, J., Shi, R., Song, D. and Perrig, A. The sybil attack in sensor networks: Analysis and defenses, In Proceedings of the IEEE International Conference on Information Processing in Sensor Networks, (IPSN 2004), (2004).]] Google ScholarDigital Library
- Olariu, S., Wadaa, A., Wilson, L. and Eltoweissy, M. Wireless sensor networks: leveraging the virtual infrastructure, IEEE Network, 18, 4 (2004), 51--56.]]Google ScholarDigital Library
- Olariu, S. and Xu, Q. A simple self-organization protocol for massively deployed sensor networks, Computer Communications, (2005) to appear.]]Google Scholar
- Pearlman, M. R., Haas, Z. J., Sholander, P. and Tabrizi, S. S. On the impact of alternate path routing for load balancing in mobile ad hoc networks, In Proceedings of the MobiHoc (2000).]] Google ScholarDigital Library
- Perrig, A., Canetti, R., Tygar, D. and Song, D. The TESLA broadcast authentication protocol, RSA CryptoBytes, 5, 2 (2002), 2-13.]]Google Scholar
- Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J. D. SPINS: Security protocols for sensor networks, Wireless Networks, 8, 5 (2002), 521--534.]] Google ScholarDigital Library
- Perrig, A., Stankovic, J. and Wagner, D. Security in wireless sensor networks, Communications of the ACM, 47, 6 (2004), 53--57.]] Google ScholarDigital Library
- Pfitzmann, and Kohntopp, M. Anonymity, unobservability, and pseudonymity -- a proposal for terminology. In H. Federrath, editor, DIAU'00, LNCS 2009, 2000, 1--9.]] Google ScholarDigital Library
- Przydatek, B., Song, D. and Perrig, A., SIA: Secure information aggregation in sensor networks, In Proceedings of the 1st ACM Conference on Embedded Networked Sensor Systems (SenSy'03) (November 2003).]] Google ScholarDigital Library
- Reed, M. G., Syverson, P. F. and Goldschlag, D. M., Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, 16, 4 (1998).]]Google ScholarDigital Library
- Reiter, M. K. and Rubin, A. D. Crowds: Anonymity for web transactions, ACM Transactions on Information and System Security, 1, 1 (1998), 66-92.]] Google ScholarDigital Library
- Samfat, D., Molva, R. and Asokan, N. Untraceability in mobile networks, In Proceedings of the ACM MOBICOM, (1995).]] Google ScholarDigital Library
- Shields, C. and Levine, B. N. A protocol for anonymous communication over the Internet, In Proceedings of the ACM Conference on Computer and Communications Security (CCS'00) (2000).]] Google ScholarDigital Library
- Sohrabi, K., Gao, J., Ailawadhi, V. and Pottie, G. Protocols for self-organization of a wireless sensor network, IEEE Personal Communications, 7, 5 (2000), 16--27.]]Google ScholarCross Ref
- Sohrabi, K., et al., Methods for scalable self-assembly of ad hoc wireless sensor networks, IEEE Transactions on Mobile Computing, 3, 4 (2004), 317--331.]]Google ScholarCross Ref
- Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M. and Jones ,K. Training a wireless sensor network, Mobile Networks and Applications, 10, (2005), 151-167.Wadaa, A., Olariu, S., Wilson, L. and Eltoweissy, M., Scalable key management for secure communications in wireless sensor networks, In Proceedings of the International Workshop on Wireless Ad-hoc Networking (Tokyo, Japan, March 23-26, 2004).]] Google ScholarDigital Library
- Wood, A. D. and Stankovic, J. A. Denial of service in sensor networks, IEEE Computer, 35, 4 (2002), 54--62.]] Google ScholarDigital Library
- Yan, T., He, T. and Stankovic, J. A. Differentiated surveillance for sensor networks, In Proceedings of the ACM SenSys, (Los Angeles, California, November 2003).]] Google ScholarDigital Library
- Yang, H. and Lu, S. Self-organized network layer security in mobile ad hoc networks, In Proceedings of the 1st ACM Workshop on Wireless Security (WiSe) (2002).]] Google ScholarDigital Library
- Yau, P. and Mitchell, C. J. Security vulnerability in ad hoc networks, In Proceedings of the 7th International Sysmposium on Communication Theory and Applications (Ambleside, UK, July, 2003).]]Google Scholar
- Ye, F., Luo, H., Lu, S. and Zhang, L. Statistical en-route filtering of injected false data in sensor networks, In Proceedings of the IEEE INFOCOM (March 2004).]]Google Scholar
- Zhirnov, V. V. and Herr, D. J. C. New frontiers: self-assembly and nano-electronics, IEEE Computer, 34, 1 (2001), 34-43.]] Google ScholarDigital Library
- Zhou, L. and Haas, Z.J. Securing ad-hoc networks, IEEE Network, 13, 6 (1999), 24--30.]]Google Scholar
- Zhu, S., Setia, S. and Jajodia, S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks, In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03) (October 2003).]] Google ScholarDigital Library
- Zhu, S., Setia, S., Jajodia, S. and Ning, P. An interleaved hop-by-hop authentication scheme for filtering data in sensor networks, In Proceedings of the IEEE Symposium on Security and Privacy (May 2004).]]Google Scholar
Index Terms
- ANSWER: autonomous wireless sensor network
Recommendations
ANSWER: AutoNomouS netWorked sEnsoR system
Sensor networks are expected to evolve into long-lived, open, ubiquitous, multi-purpose networked systems. We propose a new concept called AutoNomouS netWorked sEnsoR system (ANSWER) whose mission is to provide in situ users with real-time, secure ...
Efficient binary schemes for training heterogeneous sensor and actor networks
HeterSanet '08: Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networksSensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users - called actors - with real-time information in support of specific goals supportive of their mission. The network is ...
A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
Most queries in wireless sensor network (WSN) applications are issued at the point of the base station or gateway node of the network. However, for critical applications of WSNs there is a great need to access the real-time data inside the WSN from the ...
Comments