Threat Models and Security Issues in Wireless Sensor Networks

Security is a crucial issue for wireless sensor networks due to the deployment nature and the resources limitations of tiny sensor devices used in such networks. Sensor networks are used sometime in very sensitive applications such as healthcare and military. With this in mind we must address the security concerns from the beginning of network design. Owing to limited resources and computing constraints security in sensor networks poses more severe challenges as compare to the traditional networks. There are currently enormous approaches in the field of wireless sensor networks security. No comprehensive study lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have corroborated well known security issues and have provided the direction of research towards effective countermeasures against the threats posed by these issues.

[1]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[2]  Srdjan Capkun,et al.  Secure time synchronization service for sensor networks , 2005, WiSe '05.

[3]  Garimella Rama Murthy,et al.  Distributed key management for wireless sensor networks , 2009, Q2SWinet '09.

[4]  Ahmed Helmy,et al.  Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.

[5]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[6]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[7]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[8]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  Xun Wang,et al.  Sensor Network Configuration Under Physical Attacks , 2005, ICCNMC.

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[12]  Radha Poovendran,et al.  Secure Broadcast in Energy-Aware Wireless Sensor Networks , 2002 .

[13]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[14]  Pekka Nikander,et al.  DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.

[15]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[16]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[17]  Adrian Perrig,et al.  SAKE: Software attestation for key establishment in sensor networks , 2011, Ad Hoc Networks.

[18]  Xun Wang,et al.  Sensor network configuration under physical attacks , 2005, Int. J. Ad Hoc Ubiquitous Comput..

[19]  Radha Poovendran,et al.  Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[20]  Pascal von Rickenbach,et al.  Wireless Ad Hoc And sensor netWorks , 2007 .

[21]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[22]  Bo Zhu,et al.  Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN , 2009, ISA.

[23]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[24]  Kalpana Sharma,et al.  A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .

[25]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[26]  Kalpana Sharma,et al.  Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.

[27]  Adrian Perrig,et al.  The Coremelt Attack , 2009, ESORICS.

[28]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .