AWISSENET: Setting up a secure Wireless Sensor Network

Ad-hoc wireless sensor networks (AWSN) are quickly gaining popularity due to the fact that they are potentially low-cost solutions that can be used in a variety of application areas including emergency response, medical monitoring, homeland security and environmental monitoring. On the other hand, AWSN introduce severe node resource constraints due to their lack of data storage capabilities, power limitation, low bandwidth, restricted transmission range. All these factors represent major obstacles to the implementation of traditional security techniques in AWSN. In this paper, we present AWSN security and operational requirements, sensor node constraints affecting security requirements and finally the goals of AWISSENET, an EU funded project aiming at further securing AWSN.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Falko Dressler,et al.  Experimental Performance Evaluation of Cryptographic Algorithms on Sensor Nodes , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[3]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[4]  Evgeny Osipov,et al.  UbiSec & Sens Deliverable < 0 . 2 > Scenario driven security analysis and architecture driven requirement specification , 2022 .

[5]  Falko Dressler,et al.  Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[6]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[7]  Peter Langendörfer,et al.  Scenario Definition and Initial Threat Analysis , 2006 .

[8]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[9]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..