Advertisement

Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing

  • Yanjiang Yang
  • Robert H. Deng
  • Jianying Zhou
  • Ying Qiu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5451)

Abstract

A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneous architecture for WSNs, where high-end cluster heads are incorporated, and they are further equipped with trusted computing technology (TC). As such, the cluster heads act as trusted parties, and are expected to help effectively address privacy issues in WSNs. As concrete examples, we discuss in details how user query privacy and source location privacy can be better protected.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Access Point Cluster Head 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Arnold, T., Doorn, L.V.: The IBM PCIXCC: A New Cryptographic Coprocessor for the IBM EServer. IBM Journal of Research and Development 48 (May 2004)Google Scholar
  2. 2.
    Banerjee, S., Khuller, S.: A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks. In: Proc. IEEE INFOCOM 2001 (2001)Google Scholar
  3. 3.
    Basagni, S.: Distributed Clustering Algorithm for Ad-Hoc Networks. In: Proc. International Symposium on Parallel Architectures, Algorithms, and Networks (1999)Google Scholar
  4. 4.
    Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: Proc. ACM workshop on Wireless security, WiSE 2003, pp. 79–87 (2003)Google Scholar
  5. 5.
    Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–213 (2003)Google Scholar
  6. 6.
    Chan, H., Perrig, A., Song, D.: Secure Hierarchical In-Network Aggregation in Sensor Networks. In: Proc. ACM Conference on Computer and Communications Security, CCS 2006 (2006)Google Scholar
  7. 7.
    Carbunar, B., Yu, Y., Shi, L., Pearce, M., Vasudevan, V.: Query Privacy in Wireless Sensor Networks. In: Proc. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, pp. 203–212 (2007)Google Scholar
  8. 8.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003, pp. 42–51 (2003)Google Scholar
  9. 9.
    Das, S., Perkins, C., Royer, E.: Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks. In: Proc. of IEEE INFOCOM 2000, vol. 1, pp. 3–12. IEEE Press, Los Alamitos (2000)Google Scholar
  10. 10.
    Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2002 (2002)Google Scholar
  11. 11.
    Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proc. ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM 1999 (1999)Google Scholar
  12. 12.
    Gupta, P., Kumar, P.: The Capacity of Wireless Networks. IEEE Transactions on Information Theory 46(2), 388–404 (2000)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Ganeriwal, S., Ravi, S., Raghunathan, A.: Trusted Platform Based Key Establishment and Management for Sensor Networks (Under Review)Google Scholar
  14. 14.
    Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  15. 15.
    Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proc. 2003 Symposium on Applications and the Internet Workshops, SAINT 2003, pp. 384–394 (2003)Google Scholar
  16. 16.
    Hu, Y., Johnson, D., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks Journal 1(1), 175–192 (2003)CrossRefGoogle Scholar
  17. 17.
    Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks Journal 11(1) (2005)Google Scholar
  18. 18.
    Ibriq, J., Mahgoub, I.: A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. In: Proc. 21st International Conference on Advanced Networking and Application, AINA 2007 (2007)Google Scholar
  19. 19.
  20. 20.
    Jain, N., Agrawal, D.P.: Current Trends in Wireless Sensor Network Design. International Journal of Distributed Sensor Networks 1(1), 101–122 (2005)CrossRefGoogle Scholar
  21. 21.
    Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  22. 22.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasurements. In: Proc. 1st IEEE International Workshop on Sensor Network Protocols and Applications (2003)Google Scholar
  23. 23.
    Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. In: Proc. 27th International Conference on Distributed Computing Systems, ICDCS 2007, pp. 23–30 (2007)Google Scholar
  24. 24.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608 (2005)Google Scholar
  25. 25.
    Liu, D., Ning, P.: Location-based Pairwise Key Establishement for Relatively Static Sensor Networks. In: Proc. ACM Workshop on Security of Ad hoc and Sensor Networks (2003)Google Scholar
  26. 26.
    Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with revocation Capability. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003 (2003)Google Scholar
  27. 27.
    Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proc. 5th Annual Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)Google Scholar
  28. 28.
    Mehta, K., Liu, D., Wright, M.: Location Privacy in Sensor Networks Against a Global Eavesdropper. In: Proc. IEEE International Conference on Network Protocols, ICNP 2007, pp. 314–323 (2007)Google Scholar
  29. 29.
    Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping Adversaries for Source Protection in Sensor Networks. In: Proc. International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM 2006, pp. 23–34 (2006)Google Scholar
  30. 30.
    Oliveira, L.B., Wong, H.C., Loureiro, A.A.: LHA-SP: Secure Protocols for Hierarchical Wireless Sensor Networks. In: Proc. IFIP/IEEE International Symposium on Integrated Network Management, pp. 31–44 (2005)Google Scholar
  31. 31.
    Ozturk, C., Zhang, Y., Trappe, W.: Source-location Privacy in Energy-contained Sensor Network Routing. In: Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004, pp. 88–93 (2004)Google Scholar
  32. 32.
    Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. 3rd International Conference on Pervasive Computing and Communications. IEEE, Los Alamitos (2005)Google Scholar
  33. 33.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. ACM SenSys (2003)Google Scholar
  34. 34.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINE) (September 2002)Google Scholar
  35. 35.
    Trusted Computing Group, www.trustedcomputinggroup.org
  36. 36.
    Yarvis, M., et al.: Exploiting Heterogeneity in Sensor Networks. In: Proc. IEEE INFOCOM 2005 (2005)Google Scholar
  37. 37.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proc. ACM Conferenc on Computer and Communication Security, CCS 2003, pp. 62–72 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Yanjiang Yang
    • 1
  • Robert H. Deng
    • 2
  • Jianying Zhou
    • 1
  • Ying Qiu
    • 1
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.School of Information SystemsSingapore Management UniversitySingapore

Personalised recommendations