Cross-Layer Design for the Security of Wireless Sensor Networks

Improved security is especially important for the success of the wireless sensor network (WSN), because the data collected are often sensitive and the network is particularly vulnerable. While a number of approaches have been proposed to provide security solutions against various threats to the WSN, most of which are based on the layered design. In this paper, we point out that these layered approaches are often inadequate and inefficient, and it is advantageous to break with the conventional layering rules and design the security scheme for the WSN based on information from several protocol layers. We overview the existing schemes for the cross-layer design of WSN security and propose some new solutions. A few open problems in this area are also discussed

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[3]  Hui-Feng Huang A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network , 2008, ISI Workshops.

[4]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[5]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[6]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[7]  Qun Li,et al.  Three power-aware routing algorithms for sensor networks , 2003, Wirel. Commun. Mob. Comput..

[8]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[9]  Radha Poovendran,et al.  VP3: using vertex path and power proximity for energy efficient key distribution , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[10]  Yong Guan,et al.  A robust group-based key management scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[11]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[12]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[13]  Radha Poovendran,et al.  Cross-layer design for energy-efficient secure multicast communications in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[14]  Nathan Ickes,et al.  The Hardware and the Network: Total-System Strategies for Power Aware Wireless Microsensors , 2002 .

[15]  Paramvir Bahl,et al.  Distributed Topology Control for Wireless Multihop Ad-hoc Networks , 2001, INFOCOM.

[16]  Aura Ganz,et al.  Runtime security composition for sensor networks (SecureSense) , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[17]  J. Rabaey,et al.  PicoRadio: Ad-hoc wireless networking of ubiquitous low-energy sensor/monitor nodes , 2000, Proceedings IEEE Computer Society Workshop on VLSI 2000. System Design for a System-on-Chip Era.

[18]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[19]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[20]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.