Implementing Data Security in Wireless Sensor Network’s through Location Aware Multifunctional Key Management Framework

As wireless sensor network"s (WSN"s) consists of large number of nodes which are deployed in unattended/hostile environments and are exposed to different types of attacks due to compromisation of node or group of nodes. Usually, security designs provide a hop-by-hop security paradigm and are vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption and selective forwarding, puts data availability at stake. In this paper, we overcome these vulnerabilities for large-scale static WSN"s by using Location aware multifunctional key management framework. Sensors will be deployed in some area in a grid type model and knows its position based on X and Y coordinates in the grid. Further, embed the location information of each sensor into few of its secret keys which are owned by that sensor node and location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. This framework assures both node-to-sink and node-to-node authentication along the report forwarding routes and demonstrates that this design is highly resilient against an increasing number of compromised nodes and effective in energy savings by avoiding DoS attacks.

[1]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[5]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[6]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[8]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[11]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[12]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[13]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[14]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[15]  James P. Titus,et al.  Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).