Skip to main content

Securing Sensor Networks by Moderating Frequencies

  • Conference paper
  • First Online:
  • 755 Accesses

Abstract

Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bag, S., Dhar, A., Sarkar, P.: 100% connectivity for location aware code based KPD in clustered WSN: merging blocks. In: Gollmann, D., Freiling, F.C. (eds.) ISC 2012. LNCS, vol. 7483, pp. 136–150. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Bera, S.C., Chakrabarty, S.: Study of magneto-optic element as a displacement sensor. Measurement 44(9), 1747–1752 (2011)

    Article  Google Scholar 

  3. Chakrabarty, S., Bera, S.C.: Magneto-optic over-current detection with null optical tuning. Sens. Transducers 87(1), 52–62 (2008)

    Google Scholar 

  4. Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Technical report, Rensselaer Polytechnic Institute, Rensselaer Polytechnic Institute, Lally 310110, 8th Street, Troy, NY 12180–3590 (2005). http://www.cs.rpi.edu/research/pdf/05-07.pdf. Last Accessed: July 14, 2014

  6. Chakrabarti, D., Seberry, J.: Combinatorial structures for design of wireless sensor networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 365–374. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Lee, J.-Y., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: WCNC, pp. 1200–1205 (2005)

    Google Scholar 

  9. Mahish, P., Chakrabarty, S.: Study of magneto optic sensor using TDG element. Int. J. Innovative Res. Electr. Electron. Instrum. Control Eng. (IJIREEICE) 1(6), 254–258 (2013)

    Google Scholar 

  10. Moteiv Corporation. Tmote sky: Datasheet (2006). http://www.eecs.harvard.edu/konrad/projects/shimmer/references/tmote-sky-datasheet.pdf, Last Accessed: July 14, 2014

  11. Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Cryptography 71(3), 433–457 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  12. Ren, K., Lou, W., Zhang, Y.: LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 7(5), 585–598 (2008)

    Article  Google Scholar 

  13. Rohde and Schwarz. R&S\(^{\textregistered }\) CMW500 Wideband Radio Communication Tester (2009). http://d3fdwrtpsinh7j.cloudfront.net/Docs/datasheet/rs_cmw500_overview.pdf, Last Accessed: July 14, 2014

  14. Sarkar, P., Chowdhury, M.U.: Key predistribution scheme using finite fields and reed muller codes. In: Lee, R. (ed.) Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2011. SCI, vol. 368, pp. 67–79. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Sarkar, P., Saha, A., Chowdhury, M.U.: Secure connectivity model in wireless sensor networks (WSN) using first order Reed-Muller codes. In: MASS, pp. 507–512 (2010)

    Google Scholar 

  16. Simonova, K., Ling, A.C.H., Wang, X.S.: Location-aware key predistribution scheme for wide area wireless sensor networks. In: SASN, pp. 157–168 (2006)

    Google Scholar 

  17. Wei, R., Wu, J.: Product construction of key distribution schemes for sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 280–293. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Acknowledgement

This work is partially done during Morshed Chowdhury’s visit at Kouichi Sakurai’s laboratory in Kyushu University-Ito Campus, Fukuoka, Japan, in June 2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pinaki Sarkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Sarkar, P., Mahish, P., Chowdhury, M.U., Sakurai, K. (2015). Securing Sensor Networks by Moderating Frequencies. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 153. Springer, Cham. https://doi.org/10.1007/978-3-319-23802-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23802-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23801-2

  • Online ISBN: 978-3-319-23802-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics