Abstract
The ability to securely disseminate data in a timely manner is critical to military missions within a hostile environment. Tactical wireless sensor networks (WSN) consist of power-constrained devices spread throughout a region-of-interest to provide data extraction in real time. In this chapter, we discuss cyber security mechanisms to be implemented on a tactical WSN using the 6LoWPAN protocol for use by the United States Marine Corps (USMC). Specifically, we develop an architectural framework for tactical WSNs by studying cyber security gaps and vulnerabilities within the 6LoWPAN security sublayer, which is based on the IEEE 802.15.4 standard. We present a key management scheme and a centralized routing mechanism that is non-broadcast but feasible in an operational scenario. In addition, we modify the 6LoWPAN enabled IEEE 802.15.4 frame structure to facilitate the newly developed keying and centralized routing mechanisms. Methods to aid in deployment planning are also discussed. The tactical WSN architecture was tested against a variety of well-known network attacks. The attacks simulated were spoofing, man-in-the-middle, and denial-of-service. Through MATLAB simulations, we showed the effectiveness and efficiency of the developed cyber security mechanisms to provide integrity and reliability to a deployed tactical WSN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sensor Mobile Monitor System An/MSC-77 Technical Manual, TM 09856A-10/1A
Unattended Ground Sensor Set AN/GSQ-257 Technical Manual, TM 09632A-OI
Agency, N.S.: NSA suite B cryptography. https://www.nsa.gov/ia/programs/suiteb-cryptography
Callanan, A., Thulasiraman, P.: Achieving sink node anonymity under energy constraints in tactical wireless sensor networks. In: Proceedings of IEEE CogSIMA, pp. 186–192 (2015)
Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mobile Comput. J. (Elsevier) 2(2), 159–186 (2006)
Dulaney, E., Easttom, C.: Mastering TCP/IP-CompTIA Security+ Study Guide, 6 edn. Wiley
Goswami, S., Misra, S., Taneja, C., Mukherjee, A.: Securing intra-communication in 6LoWPAN: a PKI integrated scheme. In: Publication is IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS), pp. 1–5 (2014)
Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(Third Quarter), 1294–1312 (2015)
Hennebert, C., Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014)
Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. Technical Report 6282 (2011)
Krentz, K., Rafiee, H., Meinel, C.: 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer. In: Proceedings of ACM ASPI, pp. 1–10 (2013)
Lee, J., Kapitanova, K., Son, S.: The price of security in wireless sensor networks. Comput. Netw. (Elsevier) 54(17), 2967–2978 (2010)
Lee, S., Lee, S., Song, H., Lee, H.: Wireless sensor network design for tactical military applications: remote large scale environments. In: Proceedings of IEEE MilCom, pp. 911–917 (2009)
Lin, Y., Hwang, R., Baker, F.: Computer Networks: An Open Source Approach. McGraw Hill (2012)
Olsson, J.: 6LoWPAN demystified (2014). http://www.ti.com/lit/wp/swry013/swry0.13.pdf
Raza, S., Duquennoy, S., Selander, G.: Compression of IPsec AH and ESP headers for constrainteed environments (2013). https://tools.ietf.org/pdf/draft-raza-6lowpan-ipsec-00.pdf
Rghioui, A., Bouhorma, M., Benslimane, A.: Analytical study of security aspects in 6LoWPAN networks. In: 5th International Conference on Information and Communication Technology for the Muslim World, pp. 1–5 (2013)
Siekkinen, M., Hiienkari, M., Nurminen, J.K., Nieminen, J.: How low energy is bluetooth low energy? Comparative measures with zigbee/802.15.4. In: Proceedings of IEEE WCNC Workshop on Internet of Things Enabling Technologies, pp. 232–237 (2012)
Song, H., Lee, S., Lee, S., Lee., H.: 6LoWPAN based tactical wireless sensor network architecture for remote large-scale random deployment scenarios. In: Proceedings of IEEE MilCom, pp. 1–7 (2009)
Thulasiraman, P.: RPL routing for multigateway AMI networks under interference constraints. In: Proceedings of IEEE ICC, pp. 4477–4482 (2013)
Vidyarthi, D.: Technologies and Protocols for the Future of Internet Design: Reinventing the Web. IGI Global (2012)
White, K., Thulasiraman, P.: Energy efficient cross layer load balancing in tactical multigateway wireless sensor networks. In: Proceedings of IEEE CogSIMA, pp. 193–199 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Thulasiraman, P., Courtney, D.W. (2019). Implementation of Secure Communications for Tactical Wireless Sensor Networks. In: Ammari, H. (eds) Mission-Oriented Sensor Networks and Systems: Art and Science. Studies in Systems, Decision and Control, vol 163. Springer, Cham. https://doi.org/10.1007/978-3-319-91146-5_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-91146-5_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-91145-8
Online ISBN: 978-3-319-91146-5
eBook Packages: EngineeringEngineering (R0)