Privacy and Security in Wireless Sensor Networks: Protocols, Algorithms, and Efficient Architectures

In the last years, Wireless Sensor Networks (WSNs) experienced a rapid growth with a huge interest from both academia and industry. Besides communication services, their applications include environmental monitoring, surveillance, logistics and process control in industrial scenarios, local and home area networks for health, assistance of elderly and disabled people, energy saving, smart homes, and/or smart city services. The widespread deployment of WSN nodes and their interconnection through personal, local, or metropolitan area networks pose several challenges in terms of privacy and security of the network and of the access to data. Moreover, some of the possible applications of WSN have stringent security issues. Notwithstanding, this is only a part of the problem: the nodes of a WSN have limited resources in terms of computational and storage capability and have strict constraints in terms of compact size, low-power consumption, and power management. Therefore, new models, protocols, and advanced architectures for WSN have to be devised. In the aforementioned context, the article by I. Coisel and T. Martin addresses the privacy concerns derived from the rise of wireless applications based on Radio Frequency Identification (RFID) technology. Indeed, nowadays when such an application is deployed, informed customers yearn for guarantees that their privacy will not be threatened. One formal way to perform this task is to assess the privacy level of the RFID application with a model. However, if the chosen model does not reflect the assumptions and requirements of the analyzed application, it may misevaluate its privacy level. Selecting the most appropriate model among all the existing ones is not an easy task. To this end, the article by I. Coisel and T. Martin investigates the eight most well-known RFID privacy models and thoroughly examines their advantages and drawbacks in three steps. Firstly, five RFID authentication protocols are analyzed with these models. This discloses a main worry: although these protocols intuitively ensure different privacy levels, no model is able to accurately distinguish them. Secondly, these models are grouped according to their features (e.g., tag corruption ability). This classification reveals the most appropriate candidate model(s) to be used for a privacy analysis when one of these features is especially required. Furthermore, it points out that none of the models is comprehensive. Hence, some combinations of features may not match any model. Finally, the privacy properties of the eight models are compared in order to provide an overview of their relations. This part …

[1]  Dae-Man Han,et al.  Smart home energy management system using IEEE 802.15.4 and zigbee , 2010, IEEE Transactions on Consumer Electronics.

[2]  Qi Han,et al.  Circuit-Level Load Monitoring for Household Energy Management , 2011, IEEE Pervasive Computing.

[3]  Carles Gomez,et al.  Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.

[4]  Matt Blaze,et al.  Protocol failure in the escrowed encryption standard , 1994, CCS '94.

[5]  In-Jeong Chung,et al.  Intelligent process control system with RFID cuboid , 2009, ICEC.

[6]  A. Monorchio,et al.  Compact Triple-Frequency Antenna for Sub-GHz Wireless Communications , 2012, IEEE Antennas and Wireless Propagation Letters.

[7]  Johanna D. Moore,et al.  Machine learning and multimedia content generation for energy demand reduction , 2012, 2012 Sustainable Internet and ICT for Sustainability (SustainIT).

[8]  Ju-Jang Lee,et al.  An improved localization system with RFID technology for a mobile robot , 2008, 2008 34th Annual Conference of IEEE Industrial Electronics.

[9]  L. M. Tomas-Balibrea,et al.  Classification of marble surfaces using wavelets , 2003 .

[10]  Feng Hao,et al.  Password Authenticated Key Exchange by Juggling , 2008, Security Protocols Workshop.

[11]  Klaus Finkenzeller,et al.  Rfid Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification , 2003 .

[12]  Hyung-Joun Yoo,et al.  A Multi-Standard 13.56MHz RFID Reader System , 2008 .

[13]  Luca Fanucci,et al.  Capacitive sensors for process control in industrial marble machines , 2009, 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[14]  R. Zurawski Guest Editorial Special Section On Factory Automation , 1997 .

[15]  Luca Fanucci,et al.  Experimental analysis towards the application of RFID technologies in industrial marble machines , 2009, 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.

[16]  Martin Kollár Measurement of Capacitances Based on a Flip-Flop Sensor , 2003 .

[17]  Luis-Manuel Tomás-Balibrea,et al.  Automatic system for quality-based classification of marble textures , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[18]  Okan Önal,et al.  Cascaded and Hierarchical Neural Networks for Classifying Surface Images of Marble Slabs , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[19]  Luca Fanucci,et al.  Power Optimization of an 8051-Compliant IP Microcontroller , 2005, IEICE Trans. Electron..

[20]  Luca Fanucci,et al.  Design and Test of an HV-CMOS Intelligent Power Switch With Integrated Protections and Self-Diagnostic for Harsh Automotive Applications , 2011, IEEE Transactions on Industrial Electronics.

[21]  Tanya L. Brewer,et al.  Smart Grid Cyber Security Strategy and Requirements , 2009 .

[22]  Gianni Fenu,et al.  RFID- based supply chain traceability system , 2009, 2009 35th Annual Conference of IEEE Industrial Electronics.

[23]  Mauro Bramanti,et al.  A planar applicator for measuring surface dielectric constant of materials , 2000, IEEE Trans. Instrum. Meas..

[24]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[25]  Yung C. Shin,et al.  In-process control of surface roughness due to tool wear using a new ultrasonic system , 1996 .

[26]  Mauro Bramanti,et al.  A Procedure to Detect Flaws inside Large Sized Marble Blocks by Ultrasound , 2001 .

[27]  Feng Hao,et al.  J-PAKE: Authenticated Key Exchange without PKI , 2010, Trans. Comput. Sci..

[28]  A. Schoofs,et al.  Real-Time Recognition and Profiling of Appliances through a Single Electricity Sensor , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[29]  Renato Orta,et al.  Measurement system of complex permittivity of ornamental rocks in L frequency band , 2004, IEEE Transactions on Geoscience and Remote Sensing.

[30]  A. Monorchio,et al.  Parametric Design of Compact Dual-Frequency Antennas for Wireless Sensor Networks , 2011, IEEE Transactions on Antennas and Propagation.

[31]  Georg Brasseur Design rules for robust capacitive sensors , 2003, IEEE Trans. Instrum. Meas..

[32]  Y.S. Akgul,et al.  A generic system for the classification of marble tiles using Gabor filters , 2008, 2008 23rd International Symposium on Computer and Information Sciences.

[33]  Bryce Osoinach Proximity Capacitive Sensor Technology for Touch Sensing Applications , 2008 .

[34]  Giuseppe Anastasi,et al.  A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks , 2011, IEEE Transactions on Industrial Informatics.

[35]  David Dugdale Essentials of electromagnetism , 1993 .

[36]  Timo Jakobi,et al.  Putting the user in charge: End user development for eco-feedback technologies , 2012, 2012 Sustainable Internet and ICT for Sustainability (SustainIT).