A Survey on Security in Wireless Sensor Networks

Recent advances in electronics and wireless network technologies have offered us access to a new era where wireless sensor networks formed by inter-connected small intelligent sensing devices provide us the possibility to form smart environments. Considering the specialty of wireless sensor network, the security threats and possible countermeasures are quite different from those in Internet and Mobile Ad Hoc Networks (MANETs). On the one hand, the wireless communication, large scale and possibly human unattended deployment make attacks in wireless sensor networks relatively easier to perform. Furthermore, all features that make sensor nodes cheap and thus sensor network application affordable, such as limited energy resource, limited bandwidth and limited memory, also make many well-developed security mechanisms inappropriate in sensor networks. On the other hand, the user unfriendly interface makes the physical compromise of a sensor node difficult, the relatively simple communication profile makes the intrusion detection easy to perform, and also the redundant deployment makes the new type of network more fault-tolerant. Thus, we need a complete redesign of sensor network security mechanisms from technique to management.

[1]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[2]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[3]  Satyajit Banerjee,et al.  Symmetric key based authenticated querying in wireless sensor networks , 2006, InterSense '06.

[4]  Sajal K. Das,et al.  Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[5]  Kuang-Ching Wang,et al.  Value-Fusion versus Decision-Fusion for Fault-tolerance in Collaborative Target Detection in Sensor Networks , 2001 .

[6]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[7]  Antonio Alfredo Ferreira Loureiro,et al.  Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.

[8]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[9]  Issa M. Khalil,et al.  DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[10]  Jie Wu,et al.  Fault-Tolerant Topology Control for Heterogeneous Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[11]  Jessica Staddon,et al.  Efficient tracing of failed nodes in sensor networks , 2002, WSNA '02.

[12]  Yurong Xu,et al.  Providing Anonymity in Wireless Sensor Networks , 2007, IEEE International Conference on Pervasive Services.

[13]  Mohamed Eltoweissy,et al.  Combinatorial optimization of multicast key management , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[14]  Saswati Sarkar,et al.  On optimal placement of intrusion detection modules in sensor networks , 2004, First International Conference on Broadband Networks.

[15]  H.E. Michel,et al.  Integrated modeling for wireless sensor networks reliability and security , 2006, RAMS '06. Annual Reliability and Maintainability Symposium, 2006..

[16]  M. Potkonjak,et al.  Fault tolerance techniques for wireless ad hoc sensor networks , 2002, Proceedings of IEEE Sensors.

[17]  Hannes Hartenstein,et al.  Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers , 2005, ESAS.

[18]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[19]  Felix C. Freiling,et al.  Towards an Intrusion Detection System in Wireless Sensor Networks , 2007 .

[20]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[21]  Jiannong Cao,et al.  A dynamic user authentication scheme for wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[22]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[23]  Satyajayant Misra,et al.  Efficient anonymity schemes for clustered wireless sensor networks , 2006, Int. J. Sens. Networks.

[24]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[25]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[26]  Philip S. Yu,et al.  Cross-feature analysis for detecting ad-hoc routing anomalies , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[27]  Bao Li,et al.  An Efficient Scheme for User Authentication in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[28]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[29]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[30]  Ali Miri,et al.  An intrusion detection system for wireless sensor networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..

[31]  Wenke Lee,et al.  A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.

[32]  Yuguang Fang,et al.  MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.

[33]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[34]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[35]  Ali Miri,et al.  A real-time node-based traffic anomaly detection algorithm for wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[36]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[37]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[38]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[39]  Shivakant Mishra,et al.  A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks , 2003, IPSN.

[40]  Satyajayant Misra,et al.  Fault-Tolerant Relay Node Placement in Wireless Sensor Networks: Problems and Algorithms , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[41]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[42]  Liudong Xing,et al.  Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[43]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[44]  Antonio Alfredo Ferreira Loureiro,et al.  MANNA: a management architecture for wireless sensor networks , 2003, IEEE Commun. Mag..

[45]  Xiang-Yang Li,et al.  Asymptotic distribution of the number of isolated nodes in wireless ad hoc networks with Bernoulli nodes , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..

[46]  Peng Ning,et al.  Fault-tolerant cluster-wise clock synchronization for wireless sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[47]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[48]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[49]  Parameswaran Ramanathan,et al.  Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.

[50]  Tingting Zhang,et al.  Detecting Anomaly Node Behavior in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[51]  S.K. Ghosh,et al.  Distributed fault tolerant topology control in wireless ad-hoc sensor networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.

[52]  Abdel Aitouche,et al.  Sensor network design for fault tolerant estimation , 2004 .

[53]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[54]  S. Sitharama Iyengar,et al.  Efficient and Fault-Tolerant Feature Extraction in Wireless Sensor Networks , 2003, IPSN.

[55]  Kirk Martinez,et al.  Environmental sensor networks , 2004, Computer.

[56]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[57]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[58]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[59]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[60]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[61]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[62]  Yunghsiang Sam Han,et al.  A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks , 2006, IEEE Transactions on Wireless Communications.

[63]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[64]  P. Djukic,et al.  Minimum energy fault tolerant sensor networks , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..

[65]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[66]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[67]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[68]  Tingting Zhang,et al.  Sec-SNMP: Policy-based Security Management for Sensor Networks , 2008, SECRYPT.

[69]  Abdel Aitouche,et al.  Optimal design of fault tolerant sensor networks , 2000, Proceedings of the 2000. IEEE International Conference on Control Applications. Conference Proceedings (Cat. No.00CH37162).