Providing Holistic Security in Sensor Networks

We propose a new paradigm for the secure operation of wireless sensor networks. The network model assumed in this paper consists of tiny, energy -constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous and unaware of their location. Our main contribution is a scalable and energy -efficient solution where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[3]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[4]  王艺明 Pawns: Satisfying the need for ubiquitous secure connectivity and location services , 2002 .

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[7]  Kristofer S. J. Pister,et al.  Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.

[8]  V.V. Zhirnov,et al.  New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.

[9]  Paramvir Bahl,et al.  PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.

[10]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[11]  B Warneke,et al.  Smart Dust 立方ミリメートル・コンピュータと通信する , 2001 .

[12]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[13]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[14]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[15]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[16]  Birgit Pfitzmann,et al.  Trusting Mobile User Devices and Security Modules , 1997, Computer.

[17]  Paul Saffo,et al.  Sensors: the next wave of innovation , 1997, CACM.

[18]  Stephan Olariu,et al.  Training a Wireless Sensor Network , 2005, Mob. Networks Appl..

[19]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.