Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms.

[1]  Claudio Soriente,et al.  Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[2]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[3]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[4]  Christof Paar,et al.  Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers , 2008, 2008 International Symposium on Industrial Embedded Systems.

[5]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[6]  Benton H. Calhoun,et al.  Body Area Sensor Networks: Challenges and Opportunities , 2009, Computer.

[7]  Zhi Ang Eu,et al.  Wireless sensor networks powered by ambient energy harvesting (WSN-HEAP) - Survey and challenges , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[8]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[9]  S. Petersen,et al.  Wireless Sensor Networks: Introduction to Installation and Integration on an Offshore Oil & Gas Platform , 2008 .

[10]  E. Lewis,et al.  Wireless Sensor Node hardware: A review , 2008, 2008 IEEE Sensors.

[11]  Saurabh Bagchi,et al.  Optimizing AES for embedded devices and wireless sensor networks , 2008 .

[12]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[13]  Dennis Pfisterer,et al.  Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.

[14]  S. Shankar Sastry,et al.  Time synchronization attacks in sensor networks , 2005, SASN '05.

[15]  Anish Arora,et al.  Spatial Signatures for Lightweight Security in Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[16]  Mohammad Ilyas,et al.  Secure Routing in Wireless Sensor Networks , 2010, Handbook of Information and Communication Security.

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[19]  Stefanos Gritzalis,et al.  Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.

[20]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[21]  Seokhie Hong,et al.  TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote , 2008, IEICE Trans. Inf. Syst..

[22]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[23]  Juan Manuel González Nieto,et al.  RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[24]  Felix C. Freiling,et al.  Intrusion Detection in Wireless Sensor Networks , 2009 .

[25]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[26]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[27]  Stefanos Gritzalis,et al.  Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach , 2008, Int. J. Syst. Syst. Eng..

[28]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[29]  Yuan Li,et al.  Research challenges and applications for underwater sensor networking , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[30]  Azzedine Boukerche,et al.  Secure time synchronization protocols for wireless sensor networks , 2007, IEEE Wireless Communications.

[31]  David E. Culler,et al.  A building block approach to sensornet systems , 2008, SenSys '08.

[32]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[33]  Frank Stajano,et al.  Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks , 2008, ACNS.

[34]  Li Xiao,et al.  Securing Sensor Nodes Against Side Channel Attacks , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[35]  Scott F. Midkiff,et al.  Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols , 2009, IEEE Transactions on Vehicular Technology.

[36]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[37]  Mani Srivastava,et al.  Overview of sensor networks , 2004 .

[38]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[39]  Kyung Jun Choi,et al.  Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[40]  Rodrigo Roman,et al.  Secure Management of SCADA Networks , 2008 .

[41]  Cristina Alcaraz,et al.  Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios , 2006, CRITIS.

[42]  Cristina Alcaraz,et al.  On the Hardware Implementation Efficiency of Cryptographic Primitives , 2008 .

[43]  Juan Manuel González Nieto,et al.  Secure Data Aggregation in Wireless Sensor Network: a survey , 2008, AISC.

[44]  M. Gasulla,et al.  A Review of Commercial Energy Harvesters for Autonomous Sensors , 2007, 2007 IEEE Instrumentation & Measurement Technology Conference IMTC 2007.

[45]  Xiaoyun Wang,et al.  Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.

[46]  Michael Scott,et al.  On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.

[47]  Yan Sun,et al.  Securing Time-Synchronization Protocols in Sensor Networks: Attack Detection and Self-Healing , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[48]  Ronald E. Fisher,et al.  Analyzing Cross-Sector Interdependencies , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[49]  J. Barondess On excellence. , 1988, The Pharos of Alpha Omega Alpha-Honor Medical Society. Alpha Omega Alpha.

[50]  Ian F. Akyildiz,et al.  Wireless underground sensor networks: Research challenges , 2006, Ad Hoc Networks.

[51]  Rodrigo Roman,et al.  Integrating wireless sensor networks and the internet: a security analysis , 2009, Internet Res..

[52]  Adrian Perrig,et al.  SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.

[53]  Ian F. Akyildiz,et al.  Cross-Layer Packet Size Optimization for Wireless Terrestrial, Underwater, and Underground Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[54]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[55]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[56]  Kyung Sup Kwak,et al.  A Study of Implanted and Wearable Body Sensor Networks , 2008, KES-AMSTA.

[57]  Antonio Brogi,et al.  Towards Secure Middleware for Embedded Peer-to-Peer Systems : Objectives & Requirements , 2007 .

[58]  R. Castro Application-driven security in wireless sensor networks (seguridad orientada a aplicaciones en redes de sensores) , 2008 .

[59]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[60]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[61]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[62]  Yang Xiao,et al.  Secure data aggregation in wireless sensor networks: A comprehensive overview , 2009, Comput. Networks.

[63]  Rodrigo Roman,et al.  A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks , 2008, CANS.

[64]  Maximilian Ott,et al.  Source-location privacy for networks of energy-constrained sensors , 2004 .

[65]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[66]  Michael,et al.  [IEEE 2008 IEEE Sensors - Lecce, Italy (2008.10.26-2008.10.29)] 2008 IEEE Sensors - Wireless Sensor Node hardware: A review , 2008 .

[67]  Ian F. Akyildiz,et al.  Wireless multimedia sensor networks: A survey , 2007, IEEE Wireless Communications.

[68]  Hsiao-Hwa Chen,et al.  Trust and Reputation Systems for Wireless Sensor Networks , 2009 .

[69]  Seyit Camtepe,et al.  Key Management in Wireless Sensor Networks , 2008 .

[70]  Deborah Estrin,et al.  Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.