Security for Sensor Networks

This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks. A survey of current WSN security research is presented. The security issues of Mobile Ad-Hoc Networks and infrastructure supported wireless networks are briefly compared and contrasted to the security concerns of Wireless Sensor Networks. A framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities is defined.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[3]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[4]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[5]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[6]  Yordan Kostov,et al.  Low-cost optical instrumentation for biomedical measurements , 2000 .

[7]  Haiyun Luo,et al.  Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .

[8]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[9]  Mani B. Srivastava,et al.  SensorSim: a simulation framework for sensor networks , 2000, MSWIM '00.

[10]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[11]  Philippe Bonnet,et al.  Towards Sensor Database Systems , 2001, Mobile Data Management.

[12]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[13]  Samuel Madden,et al.  Fjording the stream: an architecture for queries over streaming sensor data , 2002, Proceedings 18th International Conference on Data Engineering.

[14]  Yee Wei Law,et al.  Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .