Secure and Efficient WSN Communication Infrastructure

Efficient wireless communication in conjunction with high level security provision concerning highly challenging medical applications is of paramount importance. Such requirements however comprise multifaceted challenges for CyberPhysical systems relying on state of the art WSN communication technologies. In that respect this chapter highlights two critical relative aspects as follows: The first aspect focuses on the sensor devices. Based on identified and presented requirements various security countermeasures are analyzed offering adequate security level while taking into consideration specific requirements such as low resource availability and low cost as well as the fact that sensors are miniaturized devices operating for long time periods. The second aspect addresses security concerning the wireless transmission with respect to performance and resource overhead. This chapter focuses on two different wireless communication technologies, comprising probably the most vulnerable part of a CPS platform. It is noted that the presented information effectively comprise the main outcome following an extensive evaluation based on both simulation as well as real platform measurements conducted in the context of the ARMOR FP7 project. Last but not least, a novel ultra low power hardware encryption module design is presented in order to further enhance the security level provided by the system while minimizing resource wastage.

[1]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[2]  George Krikis,et al.  Design and implementation of efficient reconfigurable cipher algorithms for wireless sensor networks , 2013, 2013 11th IEEE International Conference on Industrial Informatics (INDIN).

[3]  Wen Tao Zhu Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme , 2011, 2011 International Conference on Network Computing and Information Security.

[4]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[5]  Zoran Bojkovic,et al.  Security Issues in Wireless Sensor Networks , 2008 .

[6]  Ingrid Verbauwhede,et al.  Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.

[7]  Sang Hyuk Son,et al.  The price of security in wireless sensor networks , 2010, Comput. Networks.

[8]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[9]  Konstantinos Antonopoulos,et al.  The effect of symmetric block ciphers on WSN performance and behavior , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[10]  Kamin Whitehouse,et al.  Protecting your daily in-home activity information from a wireless snooping attack , 2008, UbiComp.

[11]  Christophe De Cannière,et al.  Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.

[12]  Zubair A. Baig,et al.  Distributed Denial of Service Attack Detection in Wireless Sensor Networks , 2008 .

[13]  Sandra Dominikus,et al.  Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.

[14]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[15]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[16]  V. Manjula,et al.  Replication Attack Mitigations for Static and Mobile WSN , 2011, ArXiv.

[17]  Bruce Schneier,et al.  Comments on Twofish as an AES Candidate , 2000, AES Candidate Conference.

[18]  Moti Yung,et al.  Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[19]  Sandeep Kumar,et al.  Embedded end-to-end wireless security with ECDH key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[20]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[21]  M. McLoone,et al.  Reconfigurable cryptographic RISC microprocessor , 2005, 2005 IEEE VLSI-TSA International Symposium on VLSI Design, Automation and Test, 2005. (VLSI-TSA-DAT)..