MoteSec-Aware: A Practical Secure Mechanism for Wireless Sensor Networks

Ensuring the security of communication and access control in Wireless Sensor Networks (WSNs) is of paramount importance. In this paper, we present a security mechanism, MoteSec-Aware, built on the network layer for WSNs with focus on secure network protocol and data access control. In the secure network protocol of MoteSec-Aware, a Virtual Counter Manager (VCM) with a synchronized incremental counter is presented to detect the replay and jamming attacks based on the symmetric key cryptography using AES in OCB mode. For access control, we investigate the Key-Lock Matching (KLM) method to prevent unauthorized access. We implement MoteSec-Aware for the TelosB prototype sensor platform running TinyOS 1.1.15, and conduct field experiments and TOSSIM-based simulations to evaluate the performance of MoteSec-Aware. The results demonstrate that MoteSec-Aware consumes much less energy, yet achieves higher security than several state-of-the-art methods.

[1]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[2]  Rui Zhang,et al.  A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[3]  Mani B. Srivastava,et al.  High-resolution, low-power time synchronization an oxymoron no more , 2010, IPSN '10.

[4]  Philippas Tsigas,et al.  ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System , 2009, NordSec.

[5]  Jianhua Ma,et al.  Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime , 2010, J. Univers. Comput. Sci..

[6]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[7]  Yufeng Wang,et al.  Delay-Throughput Trade-Off with Opportunistic Relaying in Wireless Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[8]  Chun Chen,et al.  Distributed Access Control with Privacy Support in Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[9]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[10]  Pin-Han Ho,et al.  TSVC: timed efficient and secure vehicular communications with privacy preserving , 2008, IEEE Transactions on Wireless Communications.

[11]  Peng Ning,et al.  TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.

[12]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[13]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[14]  Chun-Shien Lu,et al.  Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Dhiren R. Patel,et al.  FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks , 2012, ArXiv.

[16]  Tarek F. Abdelzaher,et al.  Design and Comparison of Lightweight Group Management Strategies in EnviroSuite , 2005, DCOSS.

[17]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[18]  C.-S. Lu,et al.  Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[19]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[20]  Moni Naor,et al.  Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.

[21]  Dhiren R. Patel,et al.  Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks , 2008, ICISS.

[22]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[23]  C.-S. Lu,et al.  Constrained Function-Based Message Authentication for Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[24]  Deborah Estrin,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Fine-grained Network Time Synchronization Using Reference Broadcasts , 2022 .

[25]  Sam Blackshear,et al.  R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks , 2010, SAC '10.

[26]  Peng Ning,et al.  Securing network access in wireless sensor networks , 2009, WiSec '09.

[27]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[28]  P. C. Wang,et al.  A New Access Control Method Using Prime Factorisation , 1992, Comput. J..

[29]  M. McConnell Information assurance in the twenty-first century , 2002 .