Scalable Security in Wireless Sensor and Actuator Networks ( WSANs )

Our research aims to address the challenging security issues in Wireless Sensor and Actuator Networks (WSANs), a special type of Wireless Sensor Networks (WSNs). Since WSANs have specific network constraints and data transmission requirements compared to general ad hoc networks and other wireless/wired networks, we propose to seamlessly integrate WASN security with a ripple-zone (RZ)-based routing architecture that is scalable and energy-efficient. In this research, we will also develop a two-level re-keying/re-routing schemes that cannot only adapt to a dynamic network topology but also securely update keys for each data transmission session. Moreover, to provide the security for the in-networking processing such as data aggregation in WSANs, we define a multiple-key management scheme in conjunction with our proposed Ripple-Zone routing architecture. Extensive simulations and hardware experiments have been conducted to verify the energy-efficiency and security performance of our security scheme for WSANs.

[1]  Martin Haenggi,et al.  Mobile sensor-actuator networks: opportunities and challenges , 2002, Proceedings of the 2002 7th IEEE International Workshop on Cellular Neural Networks and Their Applications.

[2]  Yee Wei Law,et al.  Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying , 2002 .

[3]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[6]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[7]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[8]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[10]  J. Zachary,et al.  A decentralized approach to secure management of nodes in distributed sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[11]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[12]  Abbas Jamalipour,et al.  Wireless communications , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[13]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[14]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[15]  Kang G. Shin,et al.  LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.

[16]  Waqaas Siddiqui SPECTRA: Secure Power Efficient Clustered Topology Routing Algorithm , 2005 .

[17]  Wen Hu,et al.  An Anycast Service for Hybrid Sensor/Actuator Networks , 2003 .

[18]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[19]  Lui Sha,et al.  Design and analysis of an MST-based topology control algorithm , 2003, IEEE Transactions on Wireless Communications.

[20]  Chi-Fu Huang,et al.  A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[21]  Rajeev Barua,et al.  Contention-free periodic message scheduler medium access control in wireless sensor/actuator networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[22]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[23]  B. Hohlt,et al.  Flexible power scheduling for sensor networks , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[24]  Rimon Barr SWANS- Scalable Wireless Ad hoc Network Simulator User Guide , 2004 .

[25]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[26]  Hugh Harney,et al.  Group Key Management Protocol (GKMP) Architecture , 1997, RFC.

[27]  Y. Tipsuwan,et al.  Network-based control systems: a tutorial , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).

[28]  Sushil Jajodia,et al.  An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[29]  Mike Chen,et al.  Security and Deployment Issues in a Sensor Network , 2000 .

[30]  Xiaozhou Li,et al.  Batch rekeying for secure group communications , 2001, WWW '01.

[31]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[32]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[33]  K. Wehrle,et al.  Accurate prediction of power consumption in sensor networks , 2005, The Second IEEE Workshop on Embedded Networked Sensors, 2005. EmNetS-II..

[34]  Yee Wei Law,et al.  Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .

[35]  T. La Porta,et al.  On supporting distributed collaboration in sensor networks , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[36]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[37]  Kanad Ghose,et al.  Energy-efficiency of VLSI caches: a comparative study , 1997, Proceedings Tenth International Conference on VLSI Design.

[38]  David E. Culler,et al.  The Emergence of Networking Abstractions and Techniques in TinyOS , 2004, NSDI.

[39]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[40]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[41]  Maja J. Matarić,et al.  A market-based formulation of sensor-actuator network coordination , 2002, AAAI 2002.

[42]  Hongyi Wu,et al.  Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006, IEEE Transactions on Mobile Computing.

[43]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[44]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[45]  Hongyi Wu,et al.  Mobile telemedicine sensor networks with low-energy data query and network lifetime considerations , 2006 .

[46]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[47]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[48]  Sunil Kumar,et al.  The integration of ad hoc sensor and cellular networks for multi-class data transmission , 2006, Ad Hoc Networks.

[49]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.