Skip to main content

Mathematical Model for Wireless Sensor Nodes Security

  • Chapter
  • First Online:
Security in Wireless Sensor Networks

Part of the book series: Risk Engineering ((RISK))

  • 1426 Accesses

Abstract

WSNs have recently emerged as an important means to study and interact with physical world. In previous era, castles were surrounded by moats (deep trenches, filled with water, and even alligators) to prevent or discourage intrusion attempts. Today one can replace such barriers with stealthy and wireless sensors. In this chapter, we develop mathematical foundations model using barriers concept to design secure wireless sensors nodes. Security becomes one of the major concerns when there are potential attacks against sensor network nodes. Thus we have designed fundamental security in disk shaped to provide basic security elements that can be implemented in various sensor nodes. The mathematical models introduced are flexible and efficient to be embedded in sensor nodes and can create a suitable nodes components security in hostile environments. We also demonstrate how these nodes can be deployed in wall and belt form to fulfill their tasks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Extreme scale wireless sensor networking. Technical Report. http://www.cse.ohio-state.edu/exscal/ (2004)

  2. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189–199 (2001)

    Google Scholar 

  3. Karlof, C., Sastry, N., Wagner, D.: TinySec: Link-layer encryption for tiny devices. In: Proceedings of the 2nd ACM SenSys Conference (2004)

    Google Scholar 

  4. Anderson, R., Kuhn, M.: Tamper resistance—A cautionary note. In: Proceedings of 2nd Usenix Workshop Electronic Commerce, Usenix, pp. 1–11 (1996)

    Google Scholar 

  5. Huang, C., Tseng, Y.: The coverage problem in a wireless sensor network. In: ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), pp. 115–121 (2003)

    Google Scholar 

  6. Kumar, S., Lai, T.H., Balogh, J.: On k-coverage in a mostly sleeping sensor network. In: International Conference on Mobile Computing and Networking, pp. 144–158 (2004)

    Google Scholar 

  7. Zhang, H., Hou, J.: On deriving the upper bound of α-lifetime for large sensor networks. In: International Symposium on Mobile Ad Hoc Networking and Computing, pp. 121–132 (2004)

    Google Scholar 

  8. Gui, C., Mohapatra, P.: Power conservation and quality of surveillance in target tracking sensor networks. In: International Conference on Mobile Computing and Networking, pp. 129–143 (2004)

    Google Scholar 

  9. Gage, D.W.: Command control for many-robot systems. In: Nineteenth Annual AUVS Technical Symposium, vol. 10(4), pp. 28–34 (1992)

    Google Scholar 

  10. Hynes, S.: Multi-agent simulations (mas) for assessing massive sensor coverage and deployment. Technical Report, Master’s Thesis, Naval Postgraduate School (2003)

    Google Scholar 

  11. Gay, D., Levis, P., Culler, D.: Software design patterns for TinyOs. In: Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp. 40–49 (2005)

    Google Scholar 

  12. Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. In: MobiCom, pp. 284–298 (2005)

    Google Scholar 

  13. Niculescu, D., Nath, B.: Ad hoc positioning system (APS). In: INFOCOM 2003. IEEE Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1734–1743

    Google Scholar 

  14. Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 56–67 (2003)

    Google Scholar 

  15. Newsome, J., Song, D.: GEM: Graph embedding for routing and data-centric storage in sensor networks without geographical information. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, pp. 76–88 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to George S. Oreku .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Oreku, G.S., Pazynyuk, T. (2016). Mathematical Model for Wireless Sensor Nodes Security. In: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-21269-2_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-21269-2_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-21268-5

  • Online ISBN: 978-3-319-21269-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics