Abstract
We propose a new paradigm for the secure operation of wireless sensor networks. The network model assumed in this paper consists of tiny, energy -constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous and unaware of their location. Our main contribution is a scalable and energy -efficient solution where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.
Chapter PDF
Similar content being viewed by others
References
I. F. Akyildiz, W. Su, Y. Sankarasubramanian, and E. Cayirci, Wireless sensor networks: A survey, Computer Networks, 38(4), 2002, 393–422.
R. Anderson and M. Kuhn, Tamper resistance — a cautionary note, Proc. 2 nd Usenix Workshop on Electronic Commerce, Berkely, CA, 1996, 1–11.
P. Bahl, W. Russell, Y.-M. Wang, A. Balachandran, G. M. Voelker, and A. Miu, PAWNs: satisfying the need for ubiquitous secure connectivity and location services, IEEE Wireless Communications, 9(1), 2002, 40–48.
D. W. Carman, P. S. Kruus, and B. J. Matt, Constraints and approaches for distributed sensor network security, Tech. Rep. #00-010, NAI Labs, 2000.
Cross Bow Technologies, http://www.xbow.com/
A. Ephremides, J. Wieselthier and D. Baker, A design concept for reliable mobile radio networks with frequency hopping signaling, Proceedings of the IEEE, 75(1), 1987, 56–73.
J.-P. Hubaux, L. Buttyan, and S. Capkun, The quest for security in mobile ad-hoc networks, Proc. MobiHoc, Long Beach, October 2001, 146–155.
J. M. Kahn, R. H. Katz and K. S. J. Pister, Mobile networking for Smart Dust, Proc. MOBICOM'99, Seattle, WA, August 1999.
S. Marti, T. J. Giuli, K. Lai, and M. Baker, Mitigating routing misbehavior in mobile ad-hoc networks, Proc. MOBICOM, Boston, MA, August 2000.
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, SPINS: Security protocols for sensor networks, Proc. MOBICOM, Rome, Italy, August 2001, 189–199.
A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer, 30(2), 1997, 61–68.
P. Saffo, Sensors, the next wave of innovation, Communications of the ACM, 40(2), 1997, 93–97.
TinySec http://www.cs.berkeley.edu/~nks/tinysec/
A. Wadaa, S. Olariu, L. Wilson, K. Jones, and Q. Xu, On training wireless sensor networks, MONET, February 2005, to appear.
B. Warneke, M. Last, B. Leibowitz, and K. Pister, SmartDust: communicating with a cubic-millimeter computer, IEEE Computer, 34(1), 2001, 44–51.
A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, IEEE Computer, 35(4), 2002, 54–62.
Y. Zhang and W. Lee, Intrusion detection in ad-hoc networks, Proc. MOBICOM, Boston, MA, August 2000.
V. V. Zhirnov and D. J. C. Herr, New frontiers: self-assembly and nano-electronics, IEEE Computer, 34(1), 2001, 34–43.
L. Zhou and Z.J. Haas, Securing ad-hoc networks, IEEE Network, 13(6), 1999, 24–30.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Olariu, S., Wadaa, A., Wilson, L., Xu, Q., Eltoweissy, M., Jones, K. (2005). Providing Holistic Security in Sensor Networks. In: Gayraud, T., Mazzella, M., Boavida, F., Monteiro, E., Orvalho, J. (eds) Broadband Satellite Comunication Systems and the Challenges of Mobility. IFIP WCC TC6 2004. IFIP International Federation for Information Processing, vol 169. Springer, Boston, MA. https://doi.org/10.1007/0-387-24043-8_13
Download citation
DOI: https://doi.org/10.1007/0-387-24043-8_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23993-4
Online ISBN: 978-0-387-24043-5
eBook Packages: Computer ScienceComputer Science (R0)