Skip to main content

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing

  • Conference paper
Information Security Practice and Experience (ISPEC 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5451))

Abstract

A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneous architecture for WSNs, where high-end cluster heads are incorporated, and they are further equipped with trusted computing technology (TC). As such, the cluster heads act as trusted parties, and are expected to help effectively address privacy issues in WSNs. As concrete examples, we discuss in details how user query privacy and source location privacy can be better protected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arnold, T., Doorn, L.V.: The IBM PCIXCC: A New Cryptographic Coprocessor for the IBM EServer. IBM Journal of Research and Development 48 (May 2004)

    Google Scholar 

  2. Banerjee, S., Khuller, S.: A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks. In: Proc. IEEE INFOCOM 2001 (2001)

    Google Scholar 

  3. Basagni, S.: Distributed Clustering Algorithm for Ad-Hoc Networks. In: Proc. International Symposium on Parallel Architectures, Algorithms, and Networks (1999)

    Google Scholar 

  4. Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: Proc. ACM workshop on Wireless security, WiSE 2003, pp. 79–87 (2003)

    Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  6. Chan, H., Perrig, A., Song, D.: Secure Hierarchical In-Network Aggregation in Sensor Networks. In: Proc. ACM Conference on Computer and Communications Security, CCS 2006 (2006)

    Google Scholar 

  7. Carbunar, B., Yu, Y., Shi, L., Pearce, M., Vasudevan, V.: Query Privacy in Wireless Sensor Networks. In: Proc. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, pp. 203–212 (2007)

    Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003, pp. 42–51 (2003)

    Google Scholar 

  9. Das, S., Perkins, C., Royer, E.: Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks. In: Proc. of IEEE INFOCOM 2000, vol. 1, pp. 3–12. IEEE Press, Los Alamitos (2000)

    Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2002 (2002)

    Google Scholar 

  11. Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proc. ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM 1999 (1999)

    Google Scholar 

  12. Gupta, P., Kumar, P.: The Capacity of Wireless Networks. IEEE Transactions on Information Theory 46(2), 388–404 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  13. Ganeriwal, S., Ravi, S., Raghunathan, A.: Trusted Platform Based Key Establishment and Management for Sensor Networks (Under Review)

    Google Scholar 

  14. Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  15. Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proc. 2003 Symposium on Applications and the Internet Workshops, SAINT 2003, pp. 384–394 (2003)

    Google Scholar 

  16. Hu, Y., Johnson, D., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks Journal 1(1), 175–192 (2003)

    Article  Google Scholar 

  17. Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks Journal 11(1) (2005)

    Google Scholar 

  18. Ibriq, J., Mahgoub, I.: A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. In: Proc. 21st International Conference on Advanced Networking and Application, AINA 2007 (2007)

    Google Scholar 

  19. http://www.intel.com/research/exploratory/heterogeneous.htm

  20. Jain, N., Agrawal, D.P.: Current Trends in Wireless Sensor Network Design. International Journal of Distributed Sensor Networks 1(1), 101–122 (2005)

    Article  Google Scholar 

  21. Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  22. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasurements. In: Proc. 1st IEEE International Workshop on Sensor Network Protocols and Applications (2003)

    Google Scholar 

  23. Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. In: Proc. 27th International Conference on Distributed Computing Systems, ICDCS 2007, pp. 23–30 (2007)

    Google Scholar 

  24. Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608 (2005)

    Google Scholar 

  25. Liu, D., Ning, P.: Location-based Pairwise Key Establishement for Relatively Static Sensor Networks. In: Proc. ACM Workshop on Security of Ad hoc and Sensor Networks (2003)

    Google Scholar 

  26. Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with revocation Capability. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003 (2003)

    Google Scholar 

  27. Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proc. 5th Annual Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)

    Google Scholar 

  28. Mehta, K., Liu, D., Wright, M.: Location Privacy in Sensor Networks Against a Global Eavesdropper. In: Proc. IEEE International Conference on Network Protocols, ICNP 2007, pp. 314–323 (2007)

    Google Scholar 

  29. Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping Adversaries for Source Protection in Sensor Networks. In: Proc. International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM 2006, pp. 23–34 (2006)

    Google Scholar 

  30. Oliveira, L.B., Wong, H.C., Loureiro, A.A.: LHA-SP: Secure Protocols for Hierarchical Wireless Sensor Networks. In: Proc. IFIP/IEEE International Symposium on Integrated Network Management, pp. 31–44 (2005)

    Google Scholar 

  31. Ozturk, C., Zhang, Y., Trappe, W.: Source-location Privacy in Energy-contained Sensor Network Routing. In: Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004, pp. 88–93 (2004)

    Google Scholar 

  32. Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. 3rd International Conference on Pervasive Computing and Communications. IEEE, Los Alamitos (2005)

    Google Scholar 

  33. Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. ACM SenSys (2003)

    Google Scholar 

  34. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINE) (September 2002)

    Google Scholar 

  35. Trusted Computing Group, www.trustedcomputinggroup.org

  36. Yarvis, M., et al.: Exploiting Heterogeneity in Sensor Networks. In: Proc. IEEE INFOCOM 2005 (2005)

    Google Scholar 

  37. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proc. ACM Conferenc on Computer and Communication Security, CCS 2003, pp. 62–72 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, Y., Deng, R.H., Zhou, J., Qiu, Y. (2009). Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. In: Bao, F., Li, H., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol 5451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00843-6_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00843-6_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00842-9

  • Online ISBN: 978-3-642-00843-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics