Securing a wireless sensor network for human tracking: a review of solutions

Currently, wireless sensor networks WSNs are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade-off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real-case scenario. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Jörg Kaiser,et al.  Improving the Accuracy of Ultrasound-Based Localisation Systems , 2005, LoCA.

[2]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[3]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[4]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[5]  Subramaniam Shamala,et al.  A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks , 2012, Int. J. Commun. Syst..

[6]  Xinsong Liu,et al.  Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme , 2012, Int. J. Commun. Syst..

[7]  Cristina Comaniciu,et al.  Cross-layer MAC design for location-aware wireless sensor networks , 2011, Int. J. Commun. Syst..

[8]  Abdalkarim Awad,et al.  Adaptive Distance Estimation and Localization in WSN using RSSI Measures , 2007, 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007).

[9]  Cristina Alcaraz,et al.  A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes , 2007, Mob. Networks Appl..

[10]  Feng Xia,et al.  A Localization Strategy Based on N-times Trilateral Centroid with Weight , 2012, Int. J. Commun. Syst..

[11]  Ritu Sharma,et al.  Analysis of Security Protocols in Wireless Sensor Network , 2010 .

[12]  Jiannong Cao,et al.  Secure localization and location verification in wireless sensor networks: a survey , 2010, The Journal of Supercomputing.

[13]  Feng Xia,et al.  An integrated scheme based on service classification in pervasive mobile services , 2012, Int. J. Commun. Syst..

[14]  Gianluca Dini,et al.  On experimentally evaluating the impact of security on IEEE 802.15.4 networks , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[15]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[16]  E. Jovanov,et al.  An environment for runtime power monitoring of wireless sensor network platforms , 2005, Proceedings of the Thirty-Seventh Southeastern Symposium on System Theory, 2005. SSST '05..

[17]  Elfed Lewis,et al.  Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.

[18]  P. Pandarinath Secure localization with defense against selective forwarding attacks in wireless sensor networks , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[19]  Zhikui Chen,et al.  An energy efficient medium access control protocol for target tracking based on dynamic convey tree collaboration in wireless sensor networks , 2012, Int. J. Commun. Syst..

[20]  Ingrid Moerman,et al.  Throughput and Delay Analysis of Unslotted IEEE 802.15.4 , 2006, J. Networks.

[21]  Azzedine Boukerche,et al.  Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.

[22]  Azzedine Boukerche,et al.  A Secure Cooperative Approach for Nonline-of-Sight Location Verification in VANET , 2012, IEEE Transactions on Vehicular Technology.

[23]  Santosh Devasia,et al.  A Survey of Control Issues in Nanopositioning , 2007, IEEE Transactions on Control Systems Technology.

[24]  Ravi Prakash,et al.  Parallel and Gaussian frequency hopping for dynamic coexistence in the unlicensed band , 2011, Int. J. Commun. Syst..

[25]  Rong Peng,et al.  Angle of Arrival Localization for Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[26]  Yun Liu,et al.  High energy‐efficient and privacy‐preserving secure data aggregation for wireless sensor networks , 2013, Int. J. Commun. Syst..

[27]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[28]  Joel J. P. C. Rodrigues,et al.  Routing and mobility approaches in IPv6 over LoWPAN mesh networks , 2011, Int. J. Commun. Syst..

[29]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[30]  Carlos León,et al.  LIS: Localization based on an intelligent distributed fuzzy system applied to a WSN , 2012, Ad Hoc Networks.

[31]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[32]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[33]  Jonathan Loo,et al.  6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..

[34]  Guangjie Han,et al.  A novel secure localization scheme against collaborative collusion in wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[35]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[36]  Theodore B. Zahariadis,et al.  Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks , 2010, EURASIP J. Wirel. Commun. Netw..

[37]  Philip Levis,et al.  TinyOS Programming: Introduction , 2009 .

[38]  Donggang Liu,et al.  Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[39]  Mohammad Iftekhar Husain,et al.  IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks , 2009 .

[40]  Luay A. Wahsheh,et al.  Security of Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[41]  M. S. Alam,et al.  Efficient CDMA wireless position location system using TDOA method , 2011, Int. J. Commun. Syst..

[42]  Brian D. O. Anderson,et al.  Wireless sensor network localization techniques , 2007, Comput. Networks.

[43]  Kouichi Sakurai,et al.  A generic evaluation method for key management schemes in wireless sensor network , 2011, ICUIMC '11.

[44]  Daqiang Zhang,et al.  Internet of Things , 2012, J. Univers. Comput. Sci..

[45]  Zhang Naitong,et al.  A Two-Step TOA Estimation Method for UWB Based Wireless Sensor Networks , 2007 .

[46]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[47]  Lin Lei,et al.  An improved node localization algorithm based on DV-HOP in WSN , 2010, 2010 2nd International Conference on Advanced Computer Control.

[48]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[49]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[50]  Eun-Jun Yoon,et al.  Cryptanalysis of a simple three-party password-based key exchange protocol , 2011, Int. J. Commun. Syst..

[51]  Matt Welsh,et al.  MoteTrack: A Robust, Decentralized Approach to RF-Based Location Tracking , 2005, LoCA.

[52]  David E. Culler,et al.  Telos: enabling ultra-low power wireless research , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[53]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[54]  Adam Dunkels,et al.  Time synchronization for predictable and secure data collection in wireless sensor networks , 2007 .

[55]  Mario Gerla,et al.  Measuring effective capacity of IEEE 802.15.4 beaconless mode , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..