Protecting the Communication Structure in Sensor Networks

In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, denial of service attacks (DoS) that compromise or disrupt communications or target nodes serving key roles in the network, e.g. sink nodes, can easily undermine the functionality as well as the performance delivered by the network. Particularly vulnerable are the components of the communications or operation infrastructure. Although, by construction, most sensor network systems do not possess a built-in infrastructure, a virtual infrastructure, that may include a coordinate system, a cluster structure, and designated communication paths, may be established post-deployment in support of network management and operation. Since knowledge of this virtual infrastructure can be instrumental for successfully compromising network security, maintaining the anonymity of the virtual infrastructure is a primary security concern. Somewhat surprisingly, in spite of its importance, the anonymity problem has not been addressed in wireless sensor networks. The main contribution of this work is to propose an energy-efficient protocol for maintaining the anonymity of the virtual infrastructure in a class of sensor network systems. Our solution defines schemes for randomizing communications such that the cluster structure, and coordinate system used remain undetectable and invisible to an observer of network traffic during both the setup and operation phases of the network.

[1]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[2]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[3]  Justine Cassell,et al.  StoryMat: a play space for collaborative storytelling , 1999, CHI Extended Abstracts.

[4]  Mark G. Terwilliger,et al.  Overview of Sensor Networks , 2004 .

[5]  N. Asokan,et al.  Untraceability in mobile networks , 1995, MobiCom '95.

[6]  G. Tsudik,et al.  Authentication of mobile users , 1994, IEEE Network.

[7]  Stefano Basagni,et al.  A performance comparison of protocols for clustering and backbone formation in large scale ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[8]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[9]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.

[10]  Paul F. Syverson,et al.  Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..

[11]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[12]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[13]  Butler W. Lampson,et al.  31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .

[14]  William J. Kaiser,et al.  Methods for scalable self-assembly of ad hoc wireless sensor networks , 2004, IEEE Transactions on Mobile Computing.

[15]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[16]  Ding-Zhu Du,et al.  Improving Wireless Sensor Network Lifetime through Power Aware Organization , 2005, Wirel. Networks.

[17]  Hannes Federrath,et al.  Project “anonymity and unobservability in the Internet” , 2000, CFP '00.

[18]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[19]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[20]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[21]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[22]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[23]  V.V. Zhirnov,et al.  New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.

[24]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[25]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[26]  Gaurav S. Sukhatme,et al.  Connecting the Physical World with Pervasive Networks , 2002, IEEE Pervasive Comput..

[27]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[28]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[29]  Sushil Jajodia,et al.  Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.

[30]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[31]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[32]  Stephan Olariu,et al.  A simple and robust virtual infrastructure for massively deployed wireless sensor networks , 2005, Comput. Commun..

[33]  R. Möhring Algorithmic graph theory and perfect graphs , 1986 .

[34]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[35]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .

[36]  Stephan Olariu,et al.  A unifying look at clustering in mobile ad hoc networks , 2004, Wirel. Commun. Mob. Comput..

[37]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[38]  P. Ning,et al.  Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗ , 2003 .

[39]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[40]  Adrian Perrig,et al.  ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.

[41]  Brian Neil Levine,et al.  A protocol for anonymous communication over the Internet , 2000, CCS.

[42]  Miodrag Potkonjak,et al.  Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments , 2001, MobiCom '01.

[43]  Luiz A. DaSilva,et al.  A service-centric model for wireless sensor networks , 2005, IEEE Journal on Selected Areas in Communications.

[44]  Peter E. Sholander,et al.  On the impact of alternate path routing for load balancing in mobile ad hoc networks , 2000, MobiHoc.

[45]  Mani B. Srivastava,et al.  Design of a wearable sensor badge for smart kindergarten , 2002, Proceedings. Sixth International Symposium on Wearable Computers,.

[46]  Stephan Olariu,et al.  On modeling wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[47]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[48]  Tian He,et al.  Differentiated surveillance for sensor networks , 2003, SenSys '03.

[49]  Songwu Lu,et al.  Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.

[50]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[51]  Kevin A. Delin,et al.  Sensor web: a new instrument concept , 2001, SPIE OPTO.

[52]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[53]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[54]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[55]  Donggang Liu,et al.  Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks , 2003 .

[56]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[57]  Stephan Olariu,et al.  Wireless sensor networks: leveraging the virtual infrastructure , 2004, IEEE Network.

[58]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[59]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[60]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[61]  Xiaoyan Hong,et al.  An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks , 2003 .

[62]  Paramvir Bahl,et al.  PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.

[63]  王艺明 Pawns: Satisfying the need for ubiquitous secure connectivity and location services , 2002 .

[64]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[65]  K. Pister,et al.  Instrumenting the physical world with pervasive networks , 2002 .

[66]  Srdjan Capkun,et al.  Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .

[67]  Hugo Krawczyk,et al.  Untraceable mobility or how to travel incognito , 1999, Comput. Networks.

[68]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[69]  Paul Saffo,et al.  Sensors: the next wave of innovation , 1997, CACM.

[70]  John Anderson,et al.  An analysis of a large scale habitat monitoring application , 2004, SenSys '04.

[71]  Stephan Olariu,et al.  Training a Wireless Sensor Network , 2005, Mob. Networks Appl..

[72]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[73]  David E. Culler,et al.  Analysis of wireless sensor networks for habitat monitoring , 2004 .

[74]  Gaetano Borriello,et al.  The flock: mote sensors sing in undergraduate curriculum , 2004, Computer.

[75]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.