On the security and energy consumption estimation of wireless sensor network protocols

Along with the recent rapid development of Wireless Sensor Network (WSN) systems, the range of attacks against WSN routing protocols have grown. As a result, there is an increased need for secure WSN routing protocols. WSN routing protocols should be secured once they are involved in sensitive data transmission. However, secure routing protocols require extra time and energy for security computations. Further, due to the limited power supply of WSN nodes, it is useful to theoretically evaluate the energy consumption of the protocol prior to their deployment. This thesis concerns the energy efficiency of WSN routing protocols and the cost of security in terms of additional energy dissipation. Two new secure routing protocols are proposed and their security is analyzed. Further, the energy consumption of the new protocols is evaluated using estimation methods and empirical measurements. Comparison of these results reveals that current estimation models have significant inaccuracies. A new energy consumption estimation model is proposed that computes the energy consumption of microcontrollers during: security operations, memory read-write operations and radio transceiver actions. Applying the proposed estimation model against the previously analyzed protocols demonstrates that it more accurately forecasts the actual energy consumption than traditional models.

[1]  Yang Xiao,et al.  MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks , 2006, EURASIP J. Wirel. Commun. Netw..

[2]  Vinod Kumar,et al.  Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks , 2011 .

[3]  Morris J. Dworkin,et al.  SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication , 2005 .

[4]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[5]  Andrea Vitaletti,et al.  Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..

[6]  John Anderson,et al.  An analysis of a large scale habitat monitoring application , 2004, SenSys '04.

[7]  Fangzhou Zhang,et al.  Rijndael Arithmetic Analyse and Optimize , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[8]  Michael R. Lyu,et al.  On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[9]  Fumiyuki Adachi,et al.  Time division multiple access methods for wireless personal communications , 1995, IEEE Commun. Mag..

[10]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[11]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[12]  Zhang Jizan Multi-path routing protocol of node cover layer in WSN , 2010 .

[13]  Abraham O. Fapojuwo,et al.  A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.

[14]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[15]  Luca Benini,et al.  Dynamic Power Management , 1998 .

[16]  Guido Bertoni,et al.  Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.

[17]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[18]  Lin Shen,et al.  A New Kind of Cluster-based Key Management Protocol in Wireless Sensor Network , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[19]  Deborah Estrin,et al.  A wireless sensor network For structural monitoring , 2004, SenSys '04.

[20]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[21]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[22]  Reiner Dojen,et al.  A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications , 2011, Int. J. Inf. Secur. Priv..

[23]  T. Coffey,et al.  Establishing and fixing a freshness flaw in a key-distribution and Authentication Protocol , 2008, 2008 4th International Conference on Intelligent Computer Communication and Processing.

[24]  Mohamad R. Neilforoshan Network security architecture , 2004 .

[25]  Elfed Lewis,et al.  Efficiently securing data on a wireless sensor network , 2007 .

[26]  John A. Stankovic,et al.  LUSTER: wireless sensor network for environmental research , 2007, SenSys '07.

[27]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008 .

[28]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[29]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[30]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[31]  Suho Park Routing Security in Sensor Network: HELLO Flood Attack and Defense , 2005 .

[32]  Philip Levis,et al.  The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.

[33]  John R. Vacca Computer and Information Security Handbook , 2009 .

[34]  Md. Abdul Hamid,et al.  Routing Security in Sensor Network : HELLO Flood Attack and Defense , 2005 .

[35]  Nuraj Pradhan,et al.  Energy efficient distributed power management algorithm with directional antenna for wireless sensor networks , 2011, 34th IEEE Sarnoff Symposium.

[36]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[37]  Reiner Dojen,et al.  The concept of layered proving trees and its application to the automation of security protocol verification , 2005, TSEC.

[38]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[39]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[40]  Bernhard Sterzbach GPS-based Clock Synchronization in a Mobile, Distributed Real-Time System , 2004, Real-Time Systems.

[41]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[42]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[43]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[44]  Kaveh Pahlavan,et al.  Wireless Information Networks: Pahlavan/Wireless Information Networks, Second Edition , 2005 .

[45]  Gyula Simon,et al.  Countersniper system for urban warfare , 2005, TOSN.

[46]  Walter Tuchman,et al.  A brief history of the data encryption standard , 1997 .

[47]  Sang-Ha Kim,et al.  Scalable and robust data dissemination for large-scale wireless sensor networks , 2010, IEEE Transactions on Consumer Electronics.

[48]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[49]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks: Challenges, Design Principles, and Technical Approaches , 2009, IEEE Transactions on Industrial Electronics.

[50]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[51]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[52]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[53]  Gerhard P. Hancke,et al.  Industrial Wireless Sensor Networks , 2011 .

[54]  Saïd Bettayeb,et al.  Efficient Algorithms for Secure Multicast key Management , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[55]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[56]  William Stallings,et al.  Cryptography and network security , 1998 .

[57]  Xiaotie Deng,et al.  TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[58]  Rodrigo Roman,et al.  A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.

[59]  Jie Zhang,et al.  RANC: Opportunistic Multi-path Routing Protocol in WSNs Using Reality-Aware Network Coding , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[60]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[61]  Catherine Rosenberg,et al.  A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.

[62]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[63]  R. Srinivasan,et al.  AC: Cluster Based Secure Routing Protocol for WSN , 2007, International Conference on Networking and Services (ICNS '07).

[64]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[65]  Kris Steenhaut,et al.  A traffic-adaptive multi-channel MAC protocol for wireless sensor networks , 2010, International Conference on Communications and Electronics 2010.

[66]  Yongtae Shin,et al.  AES Implementation and Performance Evaluation on 8-bit Microcontrollers , 2009, ArXiv.

[67]  Wu Xiao-bei Survey on sensor deployment problem in wireless sensor networks , 2008 .

[68]  Fan Zhang,et al.  Comparative performance and energy consumption analysis of different AES implementations on a wireless sensor network node , 2011, Int. J. Sens. Networks.

[69]  Yang Yang,et al.  MRBCH: A Multi-Path Routing Protocol Based on Credible Cluster Heads for Wireless Sensor Networks , 2010, Int. J. Commun. Netw. Syst. Sci..

[70]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .

[71]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[72]  Tomoyuki Ohta,et al.  Secure decentralized data transfer against node capture attacks for wireless sensor networks , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[73]  Secure cell relay routing protocol for sensor networks: Research Articles , 2006 .

[74]  Mazliza Othman Principles of mobile computing and communications , 2007 .

[75]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[76]  P. Baran,et al.  On Distributed Communications Networks , 1964 .

[77]  Phillip Rogaway,et al.  Nonce-Based Symmetric Encryption , 2004, FSE.

[78]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[79]  Fan Zhang,et al.  On the Formal Verification of a Cluster Based Key Management Protocol for Wireless Sensor Networks , 2008, 2008 IEEE International Performance, Computing and Communications Conference.

[80]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[81]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[82]  Dajin Wang An Energy-efficient Clusterhead Assignment Scheme for Hierarchical Wireless Sensor Networks , 2008, Int. J. Wirel. Inf. Networks.

[83]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[84]  Masayuki Kanda,et al.  Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function , 2000, Selected Areas in Cryptography.

[85]  Hiromitsu Kumamoto,et al.  Analysis of Information Security Problem by Probabilistic Risk Assessment , 2009 .

[86]  Thomas Engel,et al.  Design of an enhanced energy conserving routing protocol based on route diversity in wireless sensor networks , 2010, 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[87]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[88]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[89]  Christian Steger,et al.  Evaluation of component-aware dynamic voltage scaling for mobile devices and wireless sensor networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[90]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[91]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[92]  Reiner Dojen,et al.  Countering jamming attacks against an authentication and key agreement protocol for mobile satellite communications , 2011, Comput. Electr. Eng..

[93]  Krishna M. Sivalingam,et al.  Data Gathering Algorithms in Sensor Networks Using Energy Metrics , 2002, IEEE Trans. Parallel Distributed Syst..

[94]  Berk Sunar,et al.  Energy Comparison of AES and SHA-1 for Ubiquitous Computing , 2006, EUC Workshops.

[95]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[96]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.