Abstract
With extremely limited resources, it is hard to protect sensor networks well with conventional security mechanisms. We study a class of passive fingerprinting techniques and propose an innovative information quality based approach to improve the security of sensor network. For each sensor, we create a quality profile QP of profiling its normal/standard sensing behaviour. After deployment, new sensor readings are verified using this QP. If significant deviation is found, we either regard the readings as an abnormal behaviour or declare the sensor to be a fake sensor. The methods can be used as an assistant sensor authentication mechanism, but with a potential drawback. Furthermore, we also demonstrate a secure data fusion protocol, applying the proposed methods together with conventional security mechanisms. Through security analysis, we point out several countermeasures that can explicitly or implicitly defend against these attacks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004); Special Issue on Wireless sensor networks
Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications (May 2003)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defenses. In: Third International Symposium on Information Processing in Sensor Networks, IPSN 2004 (2004)
Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-Service Attacks on Battery-powered Mobile Computers. In: Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), Orlando, Florida, March 14-17, 2004, pp. 309–318 (2004)
Wang, W., Bhargava, B.: Visualization of Wormholes in Sensor Networks. In: ACM WiSe 2004, October 1 (2004)
Smith, D., Mahon, R., Koundinya, S., Panicker, S.: SNTS: Sensor Node Traceback Scheme. In: ACM WiSe 2004, October 1 (2004)
Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Workshop on Security and Assurance in Ad hoc Networks (January 2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor Networks. In: IEEE 2003 Global Communications Conference (GLOBECOM), San Francisco, CA, USA, December 1-5 (2003)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. of ACM SenSys 2003 (2003)
Wagner, D.: Resilient Aggregation in Sensor Networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), October 25 (2004)
Girao, J., Westhoff, D., Schneider, M.: CDA: Concealed Data Aggregation in Wireless Sensor Networks. In: ACM WiSe 2004, October 1 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qiu, Q., Li, T., Biswas, J. (2005). Improving Sensor Network Security with Information Quality. In: Molva, R., Tsudik, G., Westhoff, D. (eds) Security and Privacy in Ad-hoc and Sensor Networks. ESAS 2005. Lecture Notes in Computer Science, vol 3813. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11601494_6
Download citation
DOI: https://doi.org/10.1007/11601494_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30912-3
Online ISBN: 978-3-540-31615-2
eBook Packages: Computer ScienceComputer Science (R0)