Practical algorithm for data security (PADS) in wireless sensor networks

When data are generated in sensor networks, high-speed data streams travel through the network. Traditional security approaches are often unable to keep up with the rates of the streams or they introduce overhead, which shortens the life of the network. The approach proposed in this paper is one that solves the problems posed above. By embedding a one-time pad, the actual value is distorted enough to make any information gleaned from eavesdropping useless to an attacker. The use of the one-time pad ensures that the data were indeed received from a particular sensor, and it gives adequate protection against injected messages. The simulation shows this approach provides security with negligible overhead while the throughput is similar to the same network without security.

[1]  Radu Sion,et al.  Resilient Rights Protection for Sensor Streams , 2004, VLDB.

[2]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[3]  Philip Levis,et al.  TOSSIM: A Simulator for TinyOS Networks , 2003 .

[4]  Budhaditya Deb,et al.  A topology discovery algorithm for sensor networks with applications to network management , 2001 .

[5]  Harald Vogt,et al.  Exploring Message Authentication in Sensor Networks , 2004, ESAS.

[6]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[7]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[8]  Yingyu Wan,et al.  Accurate Time Synchronization for Wireless Sensor Networks , 2005, MSN.

[9]  David E. Culler,et al.  Active sensor networks , 2005, NSDI.

[10]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[11]  Judith Kelner,et al.  Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[12]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[13]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[14]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[15]  Roger Wattenhofer,et al.  Gathering correlated data in sensor networks , 2004, DIALM-POMC '04.

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[17]  Yee Wei Law,et al.  Benchmarking Block Ciphers for Wireless Sensor Networks (Extended Abstract) , 2004 .

[18]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[19]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[20]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[21]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .