Security - Lifetime tradeoffs for wireless sensor networks

This paper deals with tradeoffs between the security capability of wireless sensor networks and the lifetime performance. The REWARD algorithm for secure routing is used as a main example. Nodes listen to neighbors transmissions to detect black hole attacks. As a result, symmetrical forwarding of packets is required. The paper analyzes the opportunities for power efficient partitioning of the wireless link under medium access control based on beacons and advertising windows. Then, the energy overhead associated with symmetrical routing is discussed. The energy overhead is broken down into static, the additional energy required to watch for attacks, and dynamic, which is application specific.

[1]  Zdravko Karakehayov,et al.  Design of Distributed Sensor Networks for Security and Defense , 2005 .

[2]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[3]  David E. Culler,et al.  Mica: A Wireless Platform for Deeply Embedded Networks , 2002, IEEE Micro.

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[6]  Zdravko Karakehayov,et al.  Scalable Security Service for Sensor-Actuator Networks , 2006 .

[7]  Aki Happonen,et al.  Low Power Design for Wireless Sensor Networks , 2004 .

[8]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[9]  Zdravko Karakehayov,et al.  Low-Power Design for Smart Dust Networks , 2004, Handbook of Sensor Networks.

[10]  Zdravko Karakehayov Low-power communication for wireless sensor-actuator networks , 2006, Communication Systems and Networks.

[11]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[12]  Z. Karakehayov Zero-power design for Smart Dust networks , 2002, Proceedings First International IEEE Symposium Intelligent Systems.

[13]  Jan M. Rabaey,et al.  PicoRadio Supports Ad Hoc Ultra-Low Power Wireless Networking , 2000, Computer.

[14]  Mark A. Shayman,et al.  Energy Efficient Routing in Wireless Sensor Networks , 2003 .

[15]  Ivan Stojmenovic,et al.  Power-Aware Localized Routing in Wireless Networks , 2001, IEEE Trans. Parallel Distributed Syst..

[16]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[17]  Leonard Kleinrock,et al.  Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals , 1984, IEEE Trans. Commun..

[18]  D. Puccinelli,et al.  Wireless sensor networks: applications and challenges of ubiquitous sensing , 2005, IEEE Circuits and Systems Magazine.