Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks

Wireless sensor networks (WSN) consist of a large number of tiny sensor devices that have limited power and limited sensing, computation, and wireless communications capabilities. Sensor nodes usually operate in unattended and even harsh environments, and as a result, sensor nodes are prone to failures and are vulnerable to malicious attacks. Therefore, for reliable and secure computation and communication in WSN, fault tolerance and intrusion tolerance become two essential attributes that should be designed into WSN. In this paper, we study state-of-the-art fault tolerance and intrusion tolerance techniques for WSN and propose a new fault-intrusion tolerant routing mechanism called MVMP (multi-version multi-path) for WSN that will support highly reliable and secure sensor networks. Follow-up work on the MVMP to be carried out in the near future is also discussed

[1]  Frank Mueller,et al.  Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.

[2]  P. Varaiya,et al.  Fault tolerance and energy efficiency of data aggregation schemes for sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[3]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[4]  Shahram Latifi,et al.  On Reliability Concerns in Wireless Sensor Networks , 2004, International Conference on Parallel and Distributed Processing Techniques and Applications.

[5]  S. Sitharama Iyengar,et al.  Functional characterization of fault tolerant integration in distributed sensor networks , 1991, IEEE Trans. Syst. Man Cybern..

[6]  Deborah Estrin,et al.  Highly-resilient, energy-efficient multipath routing in wireless sensor networks , 2001, MOCO.

[7]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[8]  H.E. Michel,et al.  Integrated modeling for wireless sensor networks reliability and security , 2006, RAMS '06. Annual Reliability and Maintainability Symposium, 2006..

[9]  M. Potkonjak,et al.  Fault tolerance techniques for wireless ad hoc sensor networks , 2002, Proceedings of IEEE Sensors.

[10]  Thomas F. La Porta,et al.  The effects of probabilistic key management on secure routing in sensor networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..

[11]  Deborah Estrin,et al.  Rumor routing algorthim for sensor networks , 2002, WSNA '02.

[12]  Stefano Basagni,et al.  Secure pebblenets , 2001, MobiHoc '01.

[13]  Kuang-Ching Wang,et al.  Value-Fusion versus Decision-Fusion for Fault-tolerance in Collaborative Target Detection in Sensor Networks , 2001 .

[14]  Deborah Estrin,et al.  Rumor Routing Algorithm For Sensor Networks , 2002 .

[15]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[16]  Peter Y. A. Ryan,et al.  Architectural Analysis of MAFTIA's Intrusion Tolerance Capabilities , 2003 .

[17]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[18]  Yaping Li,et al.  ARRIVE: Algorithm for Robust Routing in Volatile Environments , 2003 .

[19]  S. Sitharama Iyengar,et al.  Functional characterization of sensor integration in distributed sensor networks , 1991, [1991] Proceedings. The Fifth International Parallel Processing Symposium.

[20]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[21]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[22]  Antonio Alfredo Ferreira Loureiro,et al.  LHA-SP: secure protocols for hierarchical wireless sensor networks , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[23]  Arunabha Sen,et al.  A new metric for fault-tolerance in sensor networks , 2004, SenSys '04.

[24]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[25]  Martina Zitterbart,et al.  Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.

[26]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[27]  Ahmed Helmy,et al.  Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.

[28]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[29]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[30]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[31]  Yunghsiang Sam Han,et al.  A combined decision fusion and channel coding scheme for fault-tolerant classification in wireless sensor networks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[32]  Christian Bettstetter,et al.  Connectivity of Wireless Multihop Networks in a Shadow Fading Environment , 2005, Wirel. Networks.

[33]  Panagiotis Papadimitratos,et al.  Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.

[34]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[35]  Yunghsiang Sam Han,et al.  A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networks , 2006, IEEE Transactions on Wireless Communications.

[36]  P. Djukic,et al.  Minimum energy fault tolerant sensor networks , 2004, IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom Workshops 2004..

[37]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[38]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[39]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[40]  Theodore S. Rappaport,et al.  SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[41]  Keith Marzullo,et al.  Tolerating failures of continuous-valued sensors , 1990, TOCS.

[42]  Abdel Aitouche,et al.  Sensor network design for fault tolerant estimation , 2004 .

[43]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.