Key Pre-distribution Techniques for WSN Security Services

In recent years, thanks to technology advances in low-power wirelessly networked systems and, we have witnessed the emergence of Wireless Sensor Networks (WSNs) and embedded computing technologies in many fields of our life; which range from military to medical applications and from industry to home appliances. Although most of researchers focus on designing protocols that maximizes both the processing capabilities and energy reserves, many of these protocols pay little attention to securing this WSNs. Nowadays, security goal is vital for ensuring the performance and the acceptance of the wireless sensor networks in many recent applications. This goal is still a challenge on account of the constraint resources of these wireless sensor nodes. This chapter givesan overviewof the desired security services required for the WSNs, their threats model and finally the chapter presents in details different pairwise key distribution security techniques for distribution WSNs.

[1]  Ayfer Özgür,et al.  Spatial Degrees of Freedom of Large Distributed MIMO Systems and Wireless Ad Hoc Networks , 2013, IEEE Journal on Selected Areas in Communications.

[2]  Kalpana Sharma,et al.  A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .

[3]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[4]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[5]  Yassine Maleh,et al.  A review of security attacks and Intrusion Detection Schemes in Wireless Sensor Networks , 2013, ArXiv.

[6]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[7]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[8]  Rabie A. Ramadan,et al.  Smart Environmental Monitoring Using Wireless Sensor Networks , 2013 .

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[12]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[13]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[14]  S. Gopalakrishnan,et al.  A SURVEY OF WIRELESS NETWORK SECURITY , 2014 .

[15]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[16]  Deborah Estrin,et al.  Energy conservation by adaptive clustering for ad-hoc networks , 2002 .

[17]  Lirui Zhang,et al.  BRS-Based Robust Secure Localization Algorithm for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[18]  Rabie A. Ramadan,et al.  Wireless Sensor Networks, A Medical Perspective , 2013 .

[19]  Jiyong Jang,et al.  A Time-Based Key Management Protocol for Wireless Sensor Networks , 2007, ISPEC.

[20]  Seema Verma,et al.  Analysis of a New Random Key Pre-distribution Scheme Based on Random Graph Theory and Kryptograph , 2012, IAIT 2012.

[21]  Mohamed Mostafa M. Fouad,et al.  Study of the effects of pairwise key pre-distribution scheme on the performance of a topology control protocol , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[22]  Vijay Laxmi,et al.  Detection and Countermeasure of Node Misbehaviour in Clustered Wireless Sensor Network , 2013 .

[23]  Donggang Liu,et al.  Security for Wireless Sensor Networks , 2006, Advances in Information Security.

[24]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[25]  Shih-Lin Wu,et al.  Wireless Ad Hoc Networking : Personal-Area, Local-Area, and the Sensory-Area Networks , 2007 .

[26]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[27]  Sushil Jajodia,et al.  Securing Topology Maintenance Protocols for Sensor Networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[28]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[29]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[30]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[31]  Jyoteesh Malhotra,et al.  Review on Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[32]  Yu-Chee Tseng,et al.  Wireless Ad Hoc Networking , 2007 .

[33]  Mahmut T. Kandemir,et al.  The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense , 2006, Int. J. Distributed Sens. Networks.

[34]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[35]  Ming Li,et al.  Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.

[36]  Azzedine Boukerche,et al.  Algorithms and Protocols for Wireless Sensor Networks , 2008, Wiley series on parallel and distributed computing.

[37]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[38]  M. M. M. Fouad,et al.  SOPK: Second Opportunity Pairwise Key Scheme for Topology Control Protocols , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.

[39]  Roberto Di Pietro,et al.  Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN , 2009, SecureComm.

[40]  Deborah Estrin,et al.  Geographical and Energy Aware Routing: a recursive data dissemination protocol for wireless sensor networks , 2002 .

[41]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[42]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[43]  Reza Ebrahimi Atani,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, J. Information Security.

[44]  Moti Yung,et al.  Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.