Skip to main content

Implementation of Secure Communications for Tactical Wireless Sensor Networks

  • Chapter
  • First Online:
Mission-Oriented Sensor Networks and Systems: Art and Science

Part of the book series: Studies in Systems, Decision and Control ((SSDC,volume 163))

  • 473 Accesses

Abstract

The ability to securely disseminate data in a timely manner is critical to military missions within a hostile environment. Tactical wireless sensor networks (WSN) consist of power-constrained devices spread throughout a region-of-interest to provide data extraction in real time. In this chapter, we discuss cyber security mechanisms to be implemented on a tactical WSN using the 6LoWPAN protocol for use by the United States Marine Corps (USMC). Specifically, we develop an architectural framework for tactical WSNs by studying cyber security gaps and vulnerabilities within the 6LoWPAN security sublayer, which is based on the IEEE 802.15.4 standard. We present a key management scheme and a centralized routing mechanism that is non-broadcast but feasible in an operational scenario. In addition, we modify the 6LoWPAN enabled IEEE 802.15.4 frame structure to facilitate the newly developed keying and centralized routing mechanisms. Methods to aid in deployment planning are also discussed. The tactical WSN architecture was tested against a variety of well-known network attacks. The attacks simulated were spoofing, man-in-the-middle, and denial-of-service. Through MATLAB simulations, we showed the effectiveness and efficiency of the developed cyber security mechanisms to provide integrity and reliability to a deployed tactical WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sensor Mobile Monitor System An/MSC-77 Technical Manual, TM 09856A-10/1A

    Google Scholar 

  2. Unattended Ground Sensor Set AN/GSQ-257 Technical Manual, TM 09632A-OI

    Google Scholar 

  3. Agency, N.S.: NSA suite B cryptography. https://www.nsa.gov/ia/programs/suiteb-cryptography

  4. Callanan, A., Thulasiraman, P.: Achieving sink node anonymity under energy constraints in tactical wireless sensor networks. In: Proceedings of IEEE CogSIMA, pp. 186–192 (2015)

    Google Scholar 

  5. Deng, J., Han, R., Mishra, S.: Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks. Pervasive Mobile Comput. J. (Elsevier) 2(2), 159–186 (2006)

    Article  Google Scholar 

  6. Dulaney, E., Easttom, C.: Mastering TCP/IP-CompTIA Security+ Study Guide, 6 edn. Wiley

    Google Scholar 

  7. Goswami, S., Misra, S., Taneja, C., Mukherjee, A.: Securing intra-communication in 6LoWPAN: a PKI integrated scheme. In: Publication is IEEE International Conference on Advanced Networks and Telecommunication Systems (ANTS), pp. 1–5 (2014)

    Google Scholar 

  8. Granjal, J., Monteiro, E., Silva, J.S.: Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(Third Quarter), 1294–1312 (2015)

    Article  Google Scholar 

  9. Hennebert, C., Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384–398 (2014)

    Article  Google Scholar 

  10. Hui, J., Thubert, P.: Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. Technical Report 6282 (2011)

    Google Scholar 

  11. Krentz, K., Rafiee, H., Meinel, C.: 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer. In: Proceedings of ACM ASPI, pp. 1–10 (2013)

    Google Scholar 

  12. Lee, J., Kapitanova, K., Son, S.: The price of security in wireless sensor networks. Comput. Netw. (Elsevier) 54(17), 2967–2978 (2010)

    Article  Google Scholar 

  13. Lee, S., Lee, S., Song, H., Lee, H.: Wireless sensor network design for tactical military applications: remote large scale environments. In: Proceedings of IEEE MilCom, pp. 911–917 (2009)

    Google Scholar 

  14. Lin, Y., Hwang, R., Baker, F.: Computer Networks: An Open Source Approach. McGraw Hill (2012)

    Google Scholar 

  15. Olsson, J.: 6LoWPAN demystified (2014). http://www.ti.com/lit/wp/swry013/swry0.13.pdf

  16. Raza, S., Duquennoy, S., Selander, G.: Compression of IPsec AH and ESP headers for constrainteed environments (2013). https://tools.ietf.org/pdf/draft-raza-6lowpan-ipsec-00.pdf

  17. Rghioui, A., Bouhorma, M., Benslimane, A.: Analytical study of security aspects in 6LoWPAN networks. In: 5th International Conference on Information and Communication Technology for the Muslim World, pp. 1–5 (2013)

    Google Scholar 

  18. Siekkinen, M., Hiienkari, M., Nurminen, J.K., Nieminen, J.: How low energy is bluetooth low energy? Comparative measures with zigbee/802.15.4. In: Proceedings of IEEE WCNC Workshop on Internet of Things Enabling Technologies, pp. 232–237 (2012)

    Google Scholar 

  19. Song, H., Lee, S., Lee, S., Lee., H.: 6LoWPAN based tactical wireless sensor network architecture for remote large-scale random deployment scenarios. In: Proceedings of IEEE MilCom, pp. 1–7 (2009)

    Google Scholar 

  20. Thulasiraman, P.: RPL routing for multigateway AMI networks under interference constraints. In: Proceedings of IEEE ICC, pp. 4477–4482 (2013)

    Google Scholar 

  21. Vidyarthi, D.: Technologies and Protocols for the Future of Internet Design: Reinventing the Web. IGI Global (2012)

    Google Scholar 

  22. White, K., Thulasiraman, P.: Energy efficient cross layer load balancing in tactical multigateway wireless sensor networks. In: Proceedings of IEEE CogSIMA, pp. 193–199 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Preetha Thulasiraman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Thulasiraman, P., Courtney, D.W. (2019). Implementation of Secure Communications for Tactical Wireless Sensor Networks. In: Ammari, H. (eds) Mission-Oriented Sensor Networks and Systems: Art and Science. Studies in Systems, Decision and Control, vol 163. Springer, Cham. https://doi.org/10.1007/978-3-319-91146-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-91146-5_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-91145-8

  • Online ISBN: 978-3-319-91146-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics