A Survey on Security in Wireless Sensor Networks

Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There is numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, the lack of infrastructure, which impose unique security challenges and make innovative approaches desirable. In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research.

[1]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[2]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[3]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[4]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[5]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[6]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[9]  Sencun Zhu,et al.  LEAP: efficient security mechanisms for large-scale distributed sensor networks , 2003, CCS '03.

[10]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[11]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[14]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[15]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[16]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[17]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[18]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[19]  Jiang Wu,et al.  Product Construction of Key Distribution Schemes for Sensor Networks , 2004, Selected Areas in Cryptography.

[20]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[21]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[22]  P. Ning,et al.  Multi-Level μ TESLA : Broadcast Authentication for Distributed Sensor Networks , 2004 .

[23]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[24]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[25]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[26]  Anish Mathuria,et al.  Efficient Secure Aggregation in Sensor Networks , 2004, HiPC.

[27]  Roberto Di Pietro,et al.  Connectivity properties of secure wireless sensor networks , 2004, SASN '04.

[28]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[29]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[30]  Sushil Jajodia,et al.  Practical broadcast authentication in sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[31]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.

[32]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[33]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[34]  Stephan Olariu,et al.  Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.

[35]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[36]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[37]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[38]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[39]  Guido Bertoni,et al.  ECC Hardware Coprocessors for 8-bit Systems and Power Consumption Considerations , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).

[40]  Subhamoy Maitra,et al.  A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design , 2005, International Journal of Information Security.

[41]  Mihui Kim,et al.  Denial-of-service (DoS) detection through practical entropy estimation on hierarchical sensor networks , 2006, 2006 8th International Conference Advanced Communication Technology.

[42]  Alan F. Smeaton,et al.  Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..

[43]  Jong-Wook Han,et al.  Consideration of efficient nearest node discovering mechanisms for key infection , 2006, 2006 8th International Conference Advanced Communication Technology.

[44]  Paola Inverardi,et al.  Distributed IDSs for enhancing Security in Mobile Wireless Sensor Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[45]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[46]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[47]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[48]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[49]  Seung-Woo Seo,et al.  WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks , 2006, ICUCT.

[50]  Radha Poovendran,et al.  Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks , 2006, Advances in Information Security.

[51]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[52]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[53]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2006, IEEE Transactions on Mobile Computing.

[54]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[55]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[56]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[57]  Deep Medhi,et al.  Modeling Pairwise Key Establishment for Random Key Predistribution in Large-Scale Sensor Networks , 2007, IEEE/ACM Transactions on Networking.

[58]  Dong Seong Kim,et al.  A Secure Data Aggregation Scheme for Wireless Sensor Networks , 2007, ISPA Workshops.

[59]  Thomas F. La Porta,et al.  SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[60]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[61]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[62]  Mahmut T. Kandemir,et al.  On the Detection of Clones in Sensor Networks Using Random Key Predistribution , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[63]  Sanjay Kumar Madria,et al.  Sybil attack detection in a hierarchical sensor network , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[64]  Seung-Woo Seo,et al.  Optimized Hash Tree for Authentication in Sensor Networks , 2007, IEEE Communications Letters.

[65]  Maryline Laurent-Maknavicius,et al.  A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks , 2007, Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007).

[66]  Dong Hoon Lee,et al.  Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).

[67]  Qi Shi,et al.  Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol , 2007, Third International Symposium on Information Assurance and Security.

[68]  Weili Wu,et al.  Wireless Sensor Networks and Applications , 2008 .

[69]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[70]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[71]  Wensheng Zhang,et al.  Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[72]  Ricardo Dahab,et al.  NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks , 2008, EWSN.

[73]  Sukumar Nandi,et al.  Defense against outside attacks in wireless sensor networks , 2008, Comput. Commun..

[74]  Jiang Wu,et al.  Minimum node degree and κ-connectivity for key predistribution schemes and distributed sensor networks , 2008, WiSec '08.

[75]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .