Abstract
WSNs have recently emerged as an important means to study and interact with physical world. In previous era, castles were surrounded by moats (deep trenches, filled with water, and even alligators) to prevent or discourage intrusion attempts. Today one can replace such barriers with stealthy and wireless sensors. In this chapter, we develop mathematical foundations model using barriers concept to design secure wireless sensors nodes. Security becomes one of the major concerns when there are potential attacks against sensor network nodes. Thus we have designed fundamental security in disk shaped to provide basic security elements that can be implemented in various sensor nodes. The mathematical models introduced are flexible and efficient to be embedded in sensor nodes and can create a suitable nodes components security in hostile environments. We also demonstrate how these nodes can be deployed in wall and belt form to fulfill their tasks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Extreme scale wireless sensor networking. Technical Report. http://www.cse.ohio-state.edu/exscal/ (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 189–199 (2001)
Karlof, C., Sastry, N., Wagner, D.: TinySec: Link-layer encryption for tiny devices. In: Proceedings of the 2nd ACM SenSys Conference (2004)
Anderson, R., Kuhn, M.: Tamper resistance—A cautionary note. In: Proceedings of 2nd Usenix Workshop Electronic Commerce, Usenix, pp. 1–11 (1996)
Huang, C., Tseng, Y.: The coverage problem in a wireless sensor network. In: ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), pp. 115–121 (2003)
Kumar, S., Lai, T.H., Balogh, J.: On k-coverage in a mostly sleeping sensor network. In: International Conference on Mobile Computing and Networking, pp. 144–158 (2004)
Zhang, H., Hou, J.: On deriving the upper bound of α-lifetime for large sensor networks. In: International Symposium on Mobile Ad Hoc Networking and Computing, pp. 121–132 (2004)
Gui, C., Mohapatra, P.: Power conservation and quality of surveillance in target tracking sensor networks. In: International Conference on Mobile Computing and Networking, pp. 129–143 (2004)
Gage, D.W.: Command control for many-robot systems. In: Nineteenth Annual AUVS Technical Symposium, vol. 10(4), pp. 28–34 (1992)
Hynes, S.: Multi-agent simulations (mas) for assessing massive sensor coverage and deployment. Technical Report, Master’s Thesis, Naval Postgraduate School (2003)
Gay, D., Levis, P., Culler, D.: Software design patterns for TinyOs. In: Proceedings of the ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, pp. 40–49 (2005)
Kumar, S., Lai, T.H., Arora, A.: Barrier coverage with wireless sensors. In: MobiCom, pp. 284–298 (2005)
Niculescu, D., Nath, B.: Ad hoc positioning system (APS). In: INFOCOM 2003. IEEE Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1734–1743
Intanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, pp. 56–67 (2003)
Newsome, J., Song, D.: GEM: Graph embedding for routing and data-centric storage in sensor networks without geographical information. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, pp. 76–88 (2003)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Oreku, G.S., Pazynyuk, T. (2016). Mathematical Model for Wireless Sensor Nodes Security. In: Security in Wireless Sensor Networks. Risk Engineering. Springer, Cham. https://doi.org/10.1007/978-3-319-21269-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-21269-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21268-5
Online ISBN: 978-3-319-21269-2
eBook Packages: EngineeringEngineering (R0)