Towards a new paradigm for securing wireless sensor networks

The network model assumed in this paper consists of tiny, energy-constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous and unaware of their location. Our main contribution is to propose a new robust and energy-efficient solution for secure operation of wireless sensor networks. The paper motivates a new paradigm where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.

[1]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[2]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[3]  Paramvir Bahl,et al.  PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.

[4]  Birgit Pfitzmann,et al.  Trusting Mobile User Devices and Security Modules , 1997, Computer.

[5]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[6]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[9]  Ira S. Moskowitz,et al.  A new paradigm hidden in steganography , 2001, NSPW '00.

[10]  王艺明 Pawns: Satisfying the need for ubiquitous secure connectivity and location services , 2002 .

[11]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[12]  Wenke Lee,et al.  Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.

[13]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[14]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[15]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[16]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[17]  Kristofer S. J. Pister,et al.  Smart Dust: Communicating with a Cubic-Millimeter Computer , 2001, Computer.

[18]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.