Improving Resilience Against Node Capture Attacks in Wireless Sensor Networks Using ICmetrics

Wireless Sensor Networks (WSNs) have the potential of being employed in a variety of applications ranging from battlefield surveillance to everyday applications such as smart homes and patient monitoring. Security is a major challenge that all applications based on WSNs are facing nowadays. Firstly, due to the wireless nature of WSNs, and secondly due to their ability to operate in unattended environments makes them even more vulnerable to various sorts of attacks. Among these attacks is node capture attack in WSNs, whose threat severity can range from a single node being compromised in the network to the whole network being compromised as a result of that single node compromise. In this paper, we propose the use of ICMetric technology to provide resilience against node compromise in WSN. ICmetrics generates the security attributes of the sensor node based on measurable hardware and software characteristics of the integrated circuit. These properties of ICmetrics can help safeguard WSNs from various node capture attacks.

[1]  W. Gareth J. Howells,et al.  Integrating Feature Values for Key Generation in an ICmetric System , 2009, 2009 NASA/ESA Conference on Adaptive Hardware and Systems.

[2]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[3]  W. Gareth J. Howells,et al.  Integrating Multi-Modal Circuit Features within an Efficient Encryption System , 2007, Third International Symposium on Information Assurance and Security.

[4]  Dirk Westhoff,et al.  Security Solutions for Wireless Sensor Networks , 2006 .

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  W. Gareth J. Howells,et al.  Key Generation for Secure Inter-satellite Communication , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[7]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[8]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[9]  W. Gareth J. Howells,et al.  Ensuring Secure Healthcare Communications via ICmetric Based Encryption on Unseen Devices , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.

[10]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[11]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[12]  Sandip Sen,et al.  Comparing trust mechanisms for monitoring aggregator nodes in sensor networks , 2009, AAMAS.

[13]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[14]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[15]  Dirk Westhoff,et al.  Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[16]  Jie Ling,et al.  Certified Email Delivery with Offline TTP , 2007 .