On communication security in wireless ad-hoc sensor networks

Networks of wireless microsensors for monitoring physical environments have emerged as an important new application area for wireless technology. Key attributes of these new types of networked systems are the severely constrained computational and energy resources, and an ad hoc operational environment. This paper is a study of the communication security aspects of these networks. Resource limitations and specific architecture of sensor networks call for customized security mechanisms. Our approach is to classify the types of data existing in sensor networks, and identify possible communication security threats according to that classification. We propose a communication security scheme where for each type of data we define a corresponding security mechanism. By employing this multitiered security architecture where each mechanism has different resource requirements, we allow for efficient resource management, which is essential for wireless sensor networks.

[1]  Elaine B. Barker,et al.  Status Report on the First Round of the Development of the Advanced Encryption Standard , 1999, Journal of Research of the National Institute of Standards and Technology.

[2]  Joseph P. Macker,et al.  Techniques and issues in multicast security , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[3]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[4]  Suvo Mittra,et al.  Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.

[5]  David L. Tennenhouse,et al.  Proactive computing , 2000, Commun. ACM.

[6]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[7]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[8]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[10]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[11]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[12]  Gregory J. Pottie,et al.  Development platform for self-organizing wireless sensor networks , 1999, Defense, Security, and Sensing.

[13]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[14]  Deborah Estrin,et al.  Embedding the Internet: introduction , 2000, Commun. ACM.

[15]  Guevara Noubir,et al.  Secure multicast groups on ad hoc networks , 2003, SASN '03.

[16]  Li Gong,et al.  Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.

[17]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[18]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[19]  J. Rabaey,et al.  PicoRadio: Ad-hoc wireless networking of ubiquitous low-energy sensor/monitor nodes , 2000, Proceedings IEEE Computer Society Workshop on VLSI 2000. System Design for a System-on-Chip Era.

[20]  Ahmed Helmy,et al.  Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[21]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[22]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[23]  Gaurav S. Sukhatme,et al.  Embedding robots into the Internet , 2000, Commun. ACM.

[24]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[25]  Chris Hanson,et al.  Amorphous computing , 2000, Commun. ACM.

[26]  Ahmed Helmy,et al.  Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.

[27]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[28]  Gaetano Borriello,et al.  Embedded computation meets the World Wide Web , 2000, Commun. ACM.

[29]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[30]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[31]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[32]  Deborah Estrin,et al.  Time synchronization for wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.