Integrity Enhancement in Wireless Sensor Networks

Consideration for security level in Wireless Sensor Networks (WSN) should depend on the demand of the intended applications. As energy consumption increase linearly with security level, the security designer should carefully choose the best security technique and the most suitable security parameters enough to protect the intended application. With the advancement and demand of WSNs applications in areas such as the military, structural health monitoring, transportation, agriculture, smart home and many more, the system stands to be exposed to too many potential threats. It is generally considered that applications such as smart home, transportation and agriculture need no security or be less secure compared to military and medical applications. However, sensor networks make large-scale attacks become trivial when private information on the entire system can instantly reach the hand of attackers. Due to the nature of WSNs that are left unattended and limited resources, there exist an urgent need for higher security features in sensor nodes and its overall systems. Without it, attackers with their own intentions and targets combined with their capabilities and sophisticated tools will always become a threat to future WSNs applications. However, latest technology in embedded security combined (low power, on-SOC memory, small size) with trusted computing specifications (ensuring trusted communication and user) is believed to enhance security features for future WSNs applications.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  Wei Pan,et al.  Design and Implementation of Secure Embedded Systems Based on Trustzone , 2008, 2008 International Conference on Embedded Software and Systems.

[3]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[4]  Yit Pin Lai Verilog design of a 256-bit AES crypto processor core , 2007 .

[5]  G. Edward Suh,et al.  Aegis: A Single-Chip Secure Processor , 2007, IEEE Design & Test of Computers.

[6]  Johann Großschädl,et al.  Enhancing an Embedded Processor Core with a Cryptographic Unit for Speed and Security , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.

[7]  Nidhi Verma,et al.  Practical implementation and performance analysis on security of sensor networks , 2006 .

[8]  Rajit Manohar,et al.  An ultra low-power processor for sensor networks , 2004, ASPLOS XI.

[9]  W.T. Penzhorn,et al.  Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware , 2005, Proceedings of the IEEE International Symposium on Industrial Electronics, 2005. ISIE 2005..

[10]  Ingrid Verbauwhede,et al.  Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.

[11]  Choong Seon Hong,et al.  Feasibility of PKC in resource-constrained wireless sensor networks , 2008, 2008 11th International Conference on Computer and Information Technology.

[12]  Tomi Salo Security in Pervasive Computing , 2001 .

[13]  Erkay Savas,et al.  Enhancing an Embedded Processor Core with a Cryptographic Unit for Performance and Security , 2008 .

[14]  E. Lewis,et al.  Wireless Sensor Node hardware: A review , 2008, 2008 IEEE Sensors.

[15]  Johannes Winter,et al.  Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.

[16]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[17]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[18]  Pan Wei,et al.  Design and Implementation of Secure Embedded Systems Based on Trustzone , 2008 .

[19]  Muhammad Amin,et al.  Trends and Directions in Trusted Computing: Models, Architectures and Technologies , 2008 .

[20]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[21]  Marcos Augusto M. Vieira,et al.  Survey on wireless sensor network devices , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).

[22]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[23]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.

[24]  Arul Paniandi A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems , 2006 .

[25]  Dan Boneh,et al.  Architectural support for copy and tamper resistant software , 2000, SIGP.

[26]  Peter Wilson,et al.  Implementing Embedded Security on Dual-Virtual-CPU Systems , 2007, IEEE Design & Test of Computers.

[27]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[28]  Frank Stajano Security in Pervasive Computing , 2003, SPC.

[29]  Yu Han,et al.  An Energy-Efficient AES-CCM Implementation for IEEE802.15.4 Wireless Sensor Networks , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.