Advertisement

A Survey on Sensor Network Security

  • Xiaojiang Du
  • Yang Xiao
Part of the Signals and Communication Technology book series (SCT)

Recent advances in electronics and wireless communication technologies have enabled the development of large-scale sensor networks that consist of many low-power, low-cost, and small-sized sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is very important for many sensor network applications, such as military target tracking and security monitoring. Providing security to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, and energy. In this chapter, we present the current state-of-art of research on sensor network security. In particular, we discuss several important security issues in sensor networks: typical attacks, security objectives, key management, and secure routing.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Medium Access Control Malicious Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wenliang Du, Jing Deng., Yunghsiang S. Han, Shigang Chen, and Pramod K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using De-ployment Knowledge, Proc. of IEEE INFOCOM 2004.Google Scholar
  2. 2.
    J. Deng, R. Han, and S. Mishra, Security support for in-network processing in wireless sensor networks, Proc. of First ACM Workshop on the Security of Ad Hoc and Sensor Networks (SASN’03 2003).Google Scholar
  3. 3.
    C. Karlof and D. Wagner, Secure Routing in Sensor Networks: Attacks and Coun-termeasures, Proc. of First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.Google Scholar
  4. 4.
    H. Chan and A. Perrig, PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, Proc. of IEEE INFOCOM 2005.Google Scholar
  5. 5.
    X. Du and Y. Xiao, Secure Cell Relay Routing Protocol for Sensor Networks, Sub-mitted to Wireless Communications and Mobile Computing (WCMC) Journal, Special Issue on Wireless Network Security.Google Scholar
  6. 6.
    D. Liu, P. Ning, Establishing Pairwise Keys in Distributed Sensor Networks, Proc. of the 10th ACM Conference on Computer and Communications Security (CCS ’03).Google Scholar
  7. 7.
    F. Ye, H. Luo, S. Lu, and L. Zhang, Statistical En-route Detection and Filtering of Injected False Data in Sensor Networks, Proc. of IEEE INFOCOM 2004.Google Scholar
  8. 8.
    D. Liu and P. Ning, Establishing pairwise keys in distributed sensor networks, Proc. of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp. 52-61.Google Scholar
  9. 9.
    H. Chan, A. Perrig, D. Song, Random Key Predistribution Schemes for Sensor Networks, Proc. of the 2003 IEEE Symposium on Security and Privacy, May 11-14, 197 - 213.Google Scholar
  10. 10.
    S. Zhu, S. Setia and S. Jajodia, LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Proc. of the 10th ACM Conference on Com-puter and Communications Security (CCS ’03).Google Scholar
  11. 11.
    L. Eschenauer and V. D. Gligor, A key management scheme for distributed sen-sor networks, Proc. of the 9th ACM Conference on Computer and Communication Security, pp. 41-47, Nov. 2002.Google Scholar
  12. 12.
    H. Chan, A. Perrig, Security and privacy in sensor networks, Computer, Vol. 36, No. 10, Oct. 2003, pp. 103-105.CrossRefGoogle Scholar
  13. 13.
    A.D., Wood, J.A., Stankovic, Denial of service in sensor networks, Computer, Vol. 35, No. 10, Oct. 2002, Pages: 54-62.CrossRefGoogle Scholar
  14. 14.
    A. Perrig, et Al., SPINS: Security Protocols for Sensor Networks, Proc. of MO-BICOM 2001.Google Scholar
  15. 15.
    Y.-C. Hu, A. Perrig, and D. B. Johnson, Wormhole detection in wireless ad hoc networks, Department of Computer Science, Rice University, Tech. Rep. TR01-384.Google Scholar
  16. 16.
    J. R. Douceur, The Sybil Attack, Proc. of IPTPS ’02.Google Scholar
  17. 17.
    C. Karlof, N. Sastry, and D. Wagner, TinySec: A Link Layer Security Archi-tecture for Wireless Sensor Networks, Proc. of the Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004).Google Scholar
  18. 18.
    W. Du, J. Deng, Y. Han, P. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, Proc. of the 10th ACM Conference on Computer and Communi-cations Security (CCS), pp. 42-51, 2003.Google Scholar
  19. 19.
    F. Ye, S. Lu, and L. Zhang, Gradient Broadcast: A Robust, Long lived Sensor Network, (http://irl.cs.ucla.edu/papers/grab-techreports.ps, 2001).
  20. 20.
    F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, A Two tier Data Dissemination Model for Large-scale Wireless Sensor Networks, Proc. of ACM MOBICOM’02.Google Scholar
  21. 21.
    C. Intanagonwiwat, R. Govindan and D. Estrin, Directed Diffusion: A Scal-able and Robust Communication Paradigm for Sensor Networks, Proc. of ACM MOBICOM’00.Google Scholar
  22. 22.
    A. Savvides, C. Han, and M. Strivastava, Dynamic fine-grained localization in ad-hoc networks of sensors, Proc. of ACM MOBICOM’01, pp 166-179.Google Scholar
  23. 23.
    L. Doherty, L. El Ghaoui, and K. S. J. Pister, Convex position estimation in wireless sensor networks, Proc. of IEEE INFOCOM 2001.Google Scholar
  24. 24.
    W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, Energy-Efficient Com-munication Protocols for Wireless Microsensor Networks, Proc. of Hawaiians Int’l Conf. on Systems Science, Jan. 2000.Google Scholar
  25. 25.
    J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, Providing robust and ubiqui-tous security support for mobile ad-hoc networks, Proc. of IEEE International Conference on Network Protocols (ICNP), pp. 251-260, 2001.Google Scholar
  26. 26.
    K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks, Proc. of IEEE International Conference on Network Protocols (ICNP). Nov. 2002.Google Scholar
  27. 27.
    J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, Adaptive security for multi-layer ad-hoc networks, Wireless Communications and Mobile Computing, 2002.Google Scholar
  28. 28.
    Y.-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, Proc. of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Jun. 2002, pp. 3-13.Google Scholar
  29. 29.
    Y.-C. Hu, A. Perrig, and D. B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, Proc. of The 8th ACM International Conference on Mobile Computing and Networking, Sep. 2002.Google Scholar
  30. 30.
    P. Papadimitratos and Z. Haas, Secure routing for mobile ad hoc networks, Proc. of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), Jan. 2002.Google Scholar
  31. 31.
    J. Deng, R. Han, S. Mishra, INSENS: Intrusion-tolerant routing in wireless Sen-sor Networks, Technical Report CU-CS-939-02, Department of Computer Science, University of Colorado, Nov. 2002.Google Scholar
  32. 32.
    B. C. Neuman and T. Tso, Kerberos: An authentication service for computer networks, IEEE Communications, vol. 32, no. 9, pp. 33-38, Sep. 1994.CrossRefGoogle Scholar
  33. 33.
    W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE Transac-tions on Information Theory, vol. 22, pp. 644-654, Nov. 1976.MATHCrossRefMathSciNetGoogle Scholar
  34. 34.
    R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.MATHCrossRefMathSciNetGoogle Scholar
  35. 35.
    Crossbow Technology Inc., www.xbow.com .
  36. 36.
    F. Stann and J. Heidemann, RMST: Reliable Data Transport in Sensor Net-works, Proc. of the First International Workshop on Sensor Net Protocols and Applications, pp. 102-112.Google Scholar
  37. 37.
    T. Aura, P. Nikander, and J. Leiwo, DOS-Resistant Authentication with Client Puzzles, Proc. of Security Protocols Workshop 2000, pp. 170-177.Google Scholar
  38. 38.
    R. Blom, An optimal class of symmetric key generation systems, In Advances in Cryptology: Proceedings of Eurocrypt ’84, pages 335-338, 1984.Google Scholar
  39. 39.
    C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, Perfectly secure key distribution for dynamic conferences, In Ernest F. Brick-ell, editor, Advances in Cryptology - Crypto ’92, pages 471-486, Berlin, 1992. Springer-Verlag. Lecture Notes in Computer Science Volume 740.Google Scholar
  40. 40.
    LAN MAN Standards Committee of the IEEE Computer Society, Wireless LAN medium access control (MAC) and physical layer (PHY) specification, IEEE, New York, NY, USA, IEEE Std 802.11-1997 edition, 1997.Google Scholar
  41. 41.
    S. Zhu, S. Xu, S. Setia, and S. Jajodia, “ LHAP: A Lightweight Hop-by-Hop Authentication Protocol For Ad-Hoc Networks,” Proc. of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCSW’03), May 2003, Providence, RI.Google Scholar
  42. 42.
    W. Du, R. Wang, and P. Ning. “An Efficient Scheme for Authenticating Public Keys in Sensor Networks,” Proc. of the 6th ACM MobiHoc, May, 2005, UIUC.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2008

Authors and Affiliations

  • Xiaojiang Du
    • 1
  • Yang Xiao
    • 2
  1. 1.Department of Computer ScienceNorth Dakota State UniversityFargoUSA
  2. 2.Department of Computer ScienceUniversity of MemphisMemphisUSA

Personalised recommendations