Information assurance in wireless sensor networks

Networking unattended wireless sensors is expected to have significant impact on the efficiency of a large array of military and non-military applications. The main goal of wireless sensor networks is to obtain globally meaningful information from strictly local gleaned by individual sensor nodes. The network is deployed such that the sensors are embedded, possibly at random, in a target environment. However, a wireless sensor network is only as good as the information it produces. In this respect, the most important concern is information assurance. Indeed, in most application domains sensor networks constitute a mission critical component requiring commensurate security protection. Sensor network communications must prevent disclosure and undetected modification of exchanged messages. Due to the fact that individual sensor nodes are anonymous and that communication among sensors is via wireless links, sensor networks are highly vulnerable to security attacks. If an adversary can thwart the work of the network by perturbing the information produced, stopping production, or pilfering information, then the perceived usefulness of sensor networks would be drastically curtailed. Thus, security is a major issue that must be resolved in order for the potential of wireless sensor networks to be fully exploited.

[1]  Ding-Zhu Du,et al.  Improving Wireless Sensor Network Lifetime through Power Aware Organization , 2005, Wirel. Networks.

[2]  Wendi B. Heinzelman,et al.  Sensor management policies to provide application QoS , 2003, Ad Hoc Networks.

[3]  N. S. Barnett,et al.  Private communication , 1969 .

[4]  Stephan Olariu,et al.  A unifying look at clustering in mobile ad hoc networks , 2004, Wirel. Commun. Mob. Comput..

[5]  Leonard Kleinrock,et al.  QoS control for sensor networks , 2003, IEEE International Conference on Communications, 2003. ICC '03..

[6]  Andrea Vitaletti,et al.  Localized techniques for broadcasting in wireless sensor networks , 2004, DIALM-POMC '04.

[7]  A. Ephremides,et al.  A design concept for reliable mobile radio networks with frequency hopping signaling , 1987, Proceedings of the IEEE.

[8]  Stefano Basagni,et al.  A performance comparison of protocols for clustering and backbone formation in large scale ad hoc networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[9]  Filip De Turck,et al.  Modeling wireless shadow networks , 2004, MSWiM '04.

[10]  Tian He,et al.  Differentiated surveillance for sensor networks , 2003, SenSys '03.

[11]  王艺明 Pawns: Satisfying the need for ubiquitous secure connectivity and location services , 2002 .

[12]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[13]  Jennifer C. Hou,et al.  Maintaining Sensing Coverage and Connectivity in Large Sensor Networks , 2005, Ad Hoc Sens. Wirel. Networks.

[14]  Stephan Olariu,et al.  Wireless sensor networks: leveraging the virtual infrastructure , 2004, IEEE Network.

[15]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[16]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[17]  Amy L. Murphy,et al.  Middleware to support sensor network applications , 2004, IEEE Network.

[18]  Stephan Olariu,et al.  On modeling wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[19]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[20]  Stephan Olariu,et al.  A simple and robust virtual infrastructure for massively deployed wireless sensor networks , 2005, Comput. Commun..

[21]  Jennifer C. Hou,et al.  On deriving the upper bound of α-lifetime for large sensor networks , 2004, MobiHoc '04.

[22]  Baochun Li,et al.  On the fundamental capacity and lifetime limits of energy-constrained wireless sensor networks , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..

[23]  Paramvir Bahl,et al.  PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.

[24]  V.V. Zhirnov,et al.  New Frontiers: Self-Assembly and Nanoelectronics , 2001, Computer.

[25]  Donald F. Towsley,et al.  A study of the coverage of large-scale sensor networks , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[26]  Himanshu Gupta,et al.  Connected sensor cover: self-organization of sensor networks for efficient query execution , 2003, IEEE/ACM Transactions on Networking.

[27]  Dirk Timmermann,et al.  Service-Oriented Software Architecture for Sensor Networks , 2003 .

[28]  Catherine Rosenberg,et al.  Design guidelines for wireless sensor networks: communication, clustering and aggregation , 2004, Ad Hoc Networks.

[29]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[30]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[31]  William J. Kaiser,et al.  Methods for scalable self-assembly of ad hoc wireless sensor networks , 2004, IEEE Transactions on Mobile Computing.

[32]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[33]  Luiz A. DaSilva,et al.  A service-centric model for wireless sensor networks , 2005, IEEE Journal on Selected Areas in Communications.

[34]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[35]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[36]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[37]  Guoliang Xing,et al.  Co-Grid: an efficient coverage maintenance protocol for distributed sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[38]  Adrian Perrig,et al.  ACE: An Emergent Algorithm for Highly Uniform Cluster Formation , 2004, EWSN.

[39]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[40]  Stephan Olariu,et al.  Training a Wireless Sensor Network , 2005, Mob. Networks Appl..

[41]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.