FleGSens - secure area monitoring using wireless sensor networks

In the project FleGSens, a wireless sensor network (WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information security. The intended prototype consists of 200 sensor nodes for monitoring a 500m long land strip. The system is focused on ensuring integrity and authenticity of generated alarms and availability in the presence of an attacker who may even compromise a limited number of sensor nodes. In this paper, two of the main protocols developed in the project are presented, a tracking protocol to provide secure detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols and particularly demonstrating the impact and cost of several attacks. Keywords—Wireless Sensor Network, Security, Trespass Detection, Testbed.

[1]  François Ingelrest,et al.  The hitchhiker's guide to successful wireless sensor network deployments , 2008, SenSys '08.

[2]  Mahalingam Ramkumar,et al.  HARPS: HAshed Random Preloaded Subset Key Distribution , 2003, IACR Cryptology ePrint Archive.

[3]  Wang-Chien Lee,et al.  Dual prediction-based reporting for object tracking sensor networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[4]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[5]  Vinayak S. Naik,et al.  A line in the sand: a wireless sensor network for target detection, classification, and tracking , 2004, Comput. Networks.

[6]  Shigeng Zhang,et al.  Secure Hop-Count Based Localization in Wireless Sensor Networks , 2007 .

[7]  Yu-Chee Tseng,et al.  Efficient in-network moving object tracking in wireless sensor networks , 2006, IEEE Transactions on Mobile Computing.

[8]  Sándor P. Fekete,et al.  Shawn: A new approach to simulating wireless sensor networks , 2005, ArXiv.

[9]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[10]  Biplab Sikdar,et al.  A protocol for tracking mobile targets using sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..