A security model for wireless sensor networks

Until recently use of sensors to collect sensitive parameters had only few risk factors such as sensor malfunction, uncertainty of data collection, or missing data coverage. Some issues in these categories were addressed by multi-sensor application or sensor fusion. However, advancement in technology and advent of wireless sensors in a networked environment, brought along a new risk factor related to the security in wireless sensor network. Therefore security in Wireless Sensor Network WSNs is challenging and critical to the functionality of the networked sensors. This is very important in cases of highly secure environment, especially in industrial, military, and medical domains. The standard WSN protocols focus on energy efficiency; transmission efficiency, and routing. WSN is known for limitations on hardware and software and for resources-constrained in general. An adaptive model of security that meets requirements and constraints in WSN is Intrusion Detections. This article investigates security in WSN and presents a design process for achieving optimum security based on requirements and constraints in WSNs. Further, comparative results between a proposed technique and other security current approaches are discussed.

[1]  Gregorio Martínez Pérez,et al.  Providing trust in wireless sensor networks using a bio-inspired technique , 2011 .

[2]  Thomas Stützle,et al.  Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .

[3]  Félix Gómez Mármol,et al.  Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.

[4]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[5]  Salil S. Kanhere,et al.  Authentication and Confidentiality in Wireless Ad Hoc Networks , 2009 .

[6]  H. Marzi Sensor fusion and use of reconfigurable neural networks in condition monitoring , 2005, CIMSA. 2005 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, 2005..

[7]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[8]  Diego Gambetta Can We Trust Trust , 2000 .

[9]  Edgar H. Callaway,et al.  Wireless Sensor Networks: Architectures and Protocols , 2003 .

[10]  S. Marti,et al.  Taxonomy of trust : Categorizing P 2 P reputation systems q , 2005 .

[11]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[12]  Hosein Marzi,et al.  An Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Network , 2013, ANT/SEIT.

[13]  F. G. Marmol,et al.  TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[14]  Chrysanthos Dellarocas,et al.  Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms , 2011, EC '01.

[15]  William S. Hortos Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[16]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[17]  Roberto Uribeetxeberria,et al.  Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.

[18]  Hosein Marzi Modular Neural Network Architecture for Precise Condition Monitoring , 2008, IEEE Transactions on Instrumentation and Measurement.

[19]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .

[20]  Leonidas J. Guibas,et al.  Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.

[21]  Cem Ersoy,et al.  Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.

[22]  Ace Dimitrievski,et al.  Security Issues and Approaches in WSN , 2009 .

[23]  Loren Schwiebert,et al.  Introduction to Wireless Sensor Networking , 2005, Handbook of Sensor Networks.