Skip to main content

Security in Mobile Wireless Sensor Networks: Attacks and Defenses

  • Chapter
  • First Online:
Book cover Cooperative Robots and Sensor Networks 2015

Part of the book series: Studies in Computational Intelligence ((SCI,volume 604))

Abstract

In recent years wireless sensor networks (WSNs) are fast emerging as an important domain for both commercial and personal use. The advancement in robotics has enabled exploring another domain in WSNs i.e., mobile WSNs (MWSNs). A MWSN consists of a collection of nodes that can move on their own and interact with the physical environment. Several applications demand the need for mobility in nodes which, in general are static. Due to the nature of deployment of the nodes coupled with their resource constraints, providing security to such MWSNs have gained a prime importance. Also, they can be deployed in physically inaccessible environment as well as critical areas, and therefore the need to make them secure is very important. Mobility of nodes in MWSNs makes them more vulnerable to attacks by adversaries. Many works have been conducted in recent past where various promising solutions have been provided for detecting the attack, diagnosing the adversary nodes, and nullifying their capabilities for further damage in MWSNs. To start with, this chapter presents the need for MWSNs followed by security objectives, key issues and inherent challenges faced by these networks. Existing works dealing with basic security features and the different attacks faced by MWSNs are discussed. Finally, we give an insight into the possible directions for future work in securing MWSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sara, G.S., Sridharan, D.: Routing in mobile wireless sensor network: a survey. Telecommun. Syst. 57(1), 51–79 (2014)

    Article  Google Scholar 

  2. Anastasi, G., Conti, M., Francesco, M.D., Passarella, A.: Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw. 7(3), 537–568 (2009)

    Article  Google Scholar 

  3. Chellappan, S., Bai, X., Ma, B., Xuan, D., Xu, C.: Mobility limited flip-based sensor networks deployment. IEEE Trans. Parallel Distrib. Syst. 18(2), 199–211 (2007)

    Google Scholar 

  4. Yang, Y., Fonoage, M.I., Cardei, M.: Improving network lifetime with mobile wireless sensor networks. Comput. Commun. 33(4), 409–419 (2010)

    Article  Google Scholar 

  5. Dantu, K., Rahimi, M.H., Shah, H., Babel, S., Dhariwal, A., Sukhatme, G.S.: Robomote: enabling mobility in sensor networks. In: Proceedings of 4th International Symposium on Information Processing in Sensor Networks (IPSN), article no. 55 (2005)

    Google Scholar 

  6. Lee, U., Magistretti, E.O. Zhou, B.O., Gerla, M., Bellavista, P., Corradi, A.: Efficient data harvesting in mobile sensor platforms. In: Proceedings of 4th PerCom Workshops, pp. 352–356 (2006)

    Google Scholar 

  7. Munir, S.A., Ren, B., Jiao, W., Wang, B., Xie, D., Ma, J.: Mobile wireless sensor network: architecture and enabling technologies for ubiquitous computing. In: Proceedings of 21st AINA Workshops, vol. 2, pp. 113–120 (2007)

    Google Scholar 

  8. Ekici, E., Gu, Y., Bozdag, D.: Mobility-based communication in wireless sensor networks. IEEE Commun. Mag. 44(7), 56–62 (2006)

    Article  Google Scholar 

  9. Tilak, S., Kolar, V., Ghazaleh, N.B.A., Kang, K.D.: Dynamic localization control for mobile sensor networks. In: Proceedings of 24th IEEE International Performance, Computing and Communications Conference (IPCCC), pp. 587–592 (2005)

    Google Scholar 

  10. Kweon, K., Ghim, H., Hong, J., Yoon, H.: Grid-based energy efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks. In: Proceedings of 4th International Conference on Wireless Pervasive Computing, pp. 185–189 (2009)

    Google Scholar 

  11. Yu, F., Park, S., Lee, E., Kim, S.H.: Elastic routing: a novel geographic routing for mobile sinks in wireless sensor networks. IET Commun. 4(6), 716–727 (2010)

    Article  Google Scholar 

  12. Mir, Z.H., Ko, Y.B.: A quadtree-based hierarchical data dissemination for mobile sensor networks. Telecommun. Syst. 36(1–3), 117–128 (2007)

    Article  Google Scholar 

  13. Cao, G., Kesidis, G., Porta, T.L., Yao, B., Phoha, S.: Purposeful Mobility in Tactical Sensor Networks. Sensor Network Operations. Wiley-IEEE Press (2006)

    Google Scholar 

  14. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)

    Article  Google Scholar 

  15. Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 10(3), 6–28 (2008)

    Article  Google Scholar 

  16. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2), 52–73 (2009)

    Article  Google Scholar 

  17. Zin, S.M., Anuar, N.B., Kiah, M.L.M., Pathan, A.S.K.: Routing protocol design for secure wsn: review and open research issues. J. Netw. Comput. Appl. 41, 517–530 (2014)

    Article  Google Scholar 

  18. Xu, J., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)

    Article  Google Scholar 

  19. Park, J.H.: An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J. Supercomputing 62(1), 105–117 (2012)

    Article  Google Scholar 

  20. Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: Proceedings of 15th IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2014)

    Google Scholar 

  21. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. ACM Sigplan Not. 37(10), 96–107 (2002)

    Article  Google Scholar 

  22. Friedman, J., Lee, D.C., Tsigkogiannis, I., Wong, S., Chao, D., Levin, D., Kaisera, W.J. Srivastava, M.B.: Ragobot: a new platform for wireless mobile sensor networks. In: Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS), LNCS-3560, p. 412 (2005)

    Google Scholar 

  23. Shah, C.R., Roy, S., Jain, S., Brunette, W.: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Netw. 1(2), 215–233 (2003)

    Article  Google Scholar 

  24. Wang, G., Cao, G., Porta, T., Zhang, W.: Sensor relocation in mobile sensor networks. In: Proceedings of 24th IEEE INFOCOM, vol. 4, pp. 2302–2312 (2005)

    Google Scholar 

  25. Amundson, I., Koutsoukos, X., Sallai, J.: Mobile sensor localization and navigation using RF doppler shifts. In: Proceedings of 1st International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT), pp. 97–102 (2008)

    Google Scholar 

  26. Fang, L., Antsaklis, P.J., Montestruque, L., Mcmickell, M.B., Lemmon, M., Sun, Y., Fang, H., Koutroulis, I., Haenggi, M., Xie, M., Xie, X.: Design of a wireless assisted pedestrian dead reckoning system-the navmote experience. IEEE Trans. Instrum. Measur. 54(6), 2342–2358 (2005)

    Article  Google Scholar 

  27. Chen, C., Ma, J., Yu, K.: Designing energy efficient wireless sensor networks with mobile sinks. In: Proceedings of Workshop on World-Sensor-Web (WSW) at ACM SenSys, pp. 1–6 (2006)

    Google Scholar 

  28. Wang, Q., Hempstead, M., Yang, W.: A realistic power consumption model for wireless sensor network devices. In: Proceedings of 3rd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), vol. 1, pp. 286–295 (2006)

    Google Scholar 

  29. Natalizio, E., Loscri, V.: Controlled mobility in mobile sensor networks: advantages, issues and challenges. Telecommun. Syst. 52(4), 2411–2418 (2013)

    Article  Google Scholar 

  30. Kansal, A., Somasundara, A.A., Jea, D.D., Srivastava, M.B., Estrin, D.: Intelligent fluid infrastructure for embedded networks. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 111–124 (2004)

    Google Scholar 

  31. Amundson, I., Koutsoukos, X.D.: A survey on localization for mobile wireless sensor networks. In: Proceedings of 2nd International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT), pp. 235–254 (2009)

    Google Scholar 

  32. Sakarindr, P., Ansari, N.: Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wirel. Commun. 14(5), 8–20 (2007)

    Article  Google Scholar 

  33. Conti, M., Pietro, R.D., Mancini, L.V., Mei, A.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of 1st ACM Conference on Wireless Network Security (WiSec), pp. 214–219 (2008)

    Google Scholar 

  34. Ren, Y., Oleshchuk, V., Li, F.Y., Sulistyo, S.: SCARKER: a sensor capture resistance and key refreshing scheme for mobile WSNs. In: Proceedings of 36th IEEE International Conference on Local Computer Networks (LCN), pp. 271–274 (2011)

    Google Scholar 

  35. Mostarda, L., Navarra, A.: Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. Int. J. Distrib. Sens. Netw. 4(2), 83–109 (2008)

    Article  Google Scholar 

  36. Zheng, X., Huang, C.T., Matthews, M.: In: Chinese remainder theorem based group key management. In: Proceedings of 45th ACM Annual Southeast Regional Conference (ACM-SE), pp. 266–271 (2007)

    Google Scholar 

  37. Sun Microsystems, Inc., Sun SPOT. http://www.sunspotworld.com/

  38. Ho, J.W., Wright, M., Das, S.K.: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: Proceedings of 28th IEEE INFOCOM, pp. 1773–1781 (2009)

    Google Scholar 

  39. Ho, J.W., Wright, M., Das, S.K.: Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Mob. Comput. 10(6), 767–782 (2011)

    Article  Google Scholar 

  40. Conti, M., Pietro, R.D., Spognardi, A.: Clone wars: distributed detection of clone attacks in mobile wsns. J. Comput. Syst. Sci. 80(3), 654–669 (2014)

    Article  MATH  Google Scholar 

  41. Zhu, W.T., Zhou, J., Deng, R.H., Bao, F.: Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Netw. 5(5), 496–507 (2012)

    Article  Google Scholar 

  42. Yu, C.M., Lu, C.S., Kuo, S.Y.: Efficient and distributed detection of node replication attacks in mobile sensor networks. In: Proceedings of 70th International Vehicular Technology Conference Fall (VTC 2009-Fall), pp. 1–5 (2009)

    Google Scholar 

  43. Lou, Y., Zhang, Y., Liu, S.: Single hop detection of node clone attacks in mobile wireless sensor networks. In: Proceedings of International Workshop on Information and Electronics Engineering, PE-29, pp. 2798–2803 (2012)

    Google Scholar 

  44. Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks. In: Proceedings of 5th International Confernational on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 597–599 (2008)

    Google Scholar 

  45. Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)

    Article  Google Scholar 

  46. Schmidt, S., Krahn, H., Fischer, S., Wätjen, D.: A security architecture for mobile wireless sensor networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS), LNCS-3313, pp. 166–177 (2005)

    Google Scholar 

  47. Blundo, C., Santis, A.D., Herzberg, A., Kutton, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proceedings of 12th International Cryptology Conference (CRYPTO), LNCS-740, pp. 471–486 (1993)

    Google Scholar 

  48. Blom, R.: An optimal class of symmetric key generation systems. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT), LNCS-209, pp. 335–338 (1985)

    Google Scholar 

  49. Dworkin, M.: NIST Special Publication 800–38A: Recommendation for Block Cipher Modes of Operation. http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf. (2001)

  50. Anderson, R., Biham, E., Knudsen, L.: Serpent: A proposal for the advanced encryption standard. NIST AES Proposal 174 (1998)

    Google Scholar 

  51. Bairaktaris, K., Chatzigiannakis, I., Liagkou, V., Spirakis, P.G.: Adaptive probabilistic secure routing in mobile wireless sensor networks. In: Proceedings of 16th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 208–212 (2008)

    Google Scholar 

  52. Fotouhi, H., Zuniga, M., Alves, M., Koubaa, A., Marron, P.: Smart-HOP: a reliable handoff mechanism for mobile wireless sensor networks. In: Proceedings of 9th European Conference on Wireless Sensor Networks (EWSN), LNCS 7158, pp. 131–146 (2012)

    Google Scholar 

  53. Stavrou, E., Pitsillides, A., Hadjichristofi, G., Hadjicostis, C.: Security in future mobile sensor networks issues and challenges. In: Proceedings of International Conference on Security and Cryptography (SECRYPT), pp. 1–9 (2010)

    Google Scholar 

  54. Luo, J., Hubaux, J.P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: Proceedings of 24th IEEE INFOCOM, pp. 1735–1746 (2005)

    Google Scholar 

  55. Wang, F., Liu, J.: Networked wireless sensor data collection: issues, challenges, and approaches. IEEE Commun. Surv. Tutorials 13(4), 673–687 (2011)

    Article  Google Scholar 

  56. Marron, P.J., Minder, D., Karnouskos, S.: The Emerging Domain of Cooperating Objects: Definitions and Concepts. Springer Publishing, New York (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amrita Ghosal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ghosal, A., Halder, S. (2015). Security in Mobile Wireless Sensor Networks: Attacks and Defenses. In: Koubâa, A., Martínez-de Dios, J. (eds) Cooperative Robots and Sensor Networks 2015. Studies in Computational Intelligence, vol 604. Springer, Cham. https://doi.org/10.1007/978-3-319-18299-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18299-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18298-8

  • Online ISBN: 978-3-319-18299-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics