Complete Security Framework for Wireless Sensor Networks

Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.

[1]  Sajal K. Das,et al.  A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[2]  Insup Lee,et al.  Sensor Network Security: More Interesting Than You Think , 2006, HotSec.

[3]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[4]  Chin-Tser Huang,et al.  LOFT: Low-Overhead Freshness Transmission in Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[7]  Sami S. Al-Wakeel,et al.  PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[8]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  S. Sitharama Iyengar,et al.  Energy equivalence routing in wireless sensor networks , 2004, Microprocess. Microsystems.

[10]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[11]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[12]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[13]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[14]  E. Lewis,et al.  Resources Implications for Data Security in Wireless Sensor Network Nodes , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).

[15]  Mingbo Xiao,et al.  Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[16]  Mihir Bellare,et al.  OCB: a block-cipher mode of operation for efficient authenticated encryption , 2001, CCS '01.

[17]  Kameswari Chebrolu,et al.  Censor networks: a critique of "sensor networks" from a systems perspective , 2008, CCRV.

[18]  Sanjay Burman,et al.  Cryptography and security - future challenges and issues , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).

[19]  Dennis Pfisterer,et al.  Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.

[20]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[21]  Yee Wei Law,et al.  How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[22]  Tassos Dimitriou,et al.  Providing Transparent Security Services to Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[23]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[24]  Adrian Perrig,et al.  Secure sensor network routing: a clean-slate approach , 2006, CoNEXT '06.