Abstract
A wireless sensor network (WSN) is an ad-hoc wireless network composed of small sensor nodes deployed in large numbers. Sensor nodes are usually severely resource limited and power constrained. Security enforcement in WSNs is thus a challenging task. In this paper we propose a clustered heterogeneous architecture for WSNs, where high-end cluster heads are incorporated, and they are further equipped with trusted computing technology (TC). As such, the cluster heads act as trusted parties, and are expected to help effectively address privacy issues in WSNs. As concrete examples, we discuss in details how user query privacy and source location privacy can be better protected.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arnold, T., Doorn, L.V.: The IBM PCIXCC: A New Cryptographic Coprocessor for the IBM EServer. IBM Journal of Research and Development 48 (May 2004)
Banerjee, S., Khuller, S.: A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks. In: Proc. IEEE INFOCOM 2001 (2001)
Basagni, S.: Distributed Clustering Algorithm for Ad-Hoc Networks. In: Proc. International Symposium on Parallel Architectures, Algorithms, and Networks (1999)
Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In: Proc. ACM workshop on Wireless security, WiSE 2003, pp. 79–87 (2003)
Chan, H., Perrig, A., Song, D.: Random Key Pre-distribution Schemes for Sensor Networks. In: Proc. IEEE Symposium on Security and Privacy, pp. 197–213 (2003)
Chan, H., Perrig, A., Song, D.: Secure Hierarchical In-Network Aggregation in Sensor Networks. In: Proc. ACM Conference on Computer and Communications Security, CCS 2006 (2006)
Carbunar, B., Yu, Y., Shi, L., Pearce, M., Vasudevan, V.: Query Privacy in Wireless Sensor Networks. In: Proc. 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2007, pp. 203–212 (2007)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003, pp. 42–51 (2003)
Das, S., Perkins, C., Royer, E.: Performance Comparison of Two On-demand Routing Procotols for Ad Hoc Networks. In: Proc. of IEEE INFOCOM 2000, vol. 1, pp. 3–12. IEEE Press, Los Alamitos (2000)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. ACM Conference on Computer and Communication Security, CCS 2002 (2002)
Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next Century Challenges: Scalable Coordination in Sensor Networks. In: Proc. ACM/IEEE International Conference on Mobile Computing and Networking, MOBICOM 1999 (1999)
Gupta, P., Kumar, P.: The Capacity of Wireless Networks. IEEE Transactions on Information Theory 46(2), 388–404 (2000)
Ganeriwal, S., Ravi, S., Raghunathan, A.: Trusted Platform Based Key Establishment and Management for Sensor Networks (Under Review)
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proc. 2003 Symposium on Applications and the Internet Workshops, SAINT 2003, pp. 384–394 (2003)
Hu, Y., Johnson, D., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks Journal 1(1), 175–192 (2003)
Hu, Y., Perrig, A., Johnson, D.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. Wireless Networks Journal 11(1) (2005)
Ibriq, J., Mahgoub, I.: A Hierarchical Key Establishment Scheme for Wireless Sensor Networks. In: Proc. 21st International Conference on Advanced Networking and Application, AINA 2007 (2007)
Jain, N., Agrawal, D.P.: Current Trends in Wireless Sensor Network Design. International Journal of Distributed Sensor Networks 1(1), 101–122 (2005)
Krauß, C., Stumpf, F., Eckert, C.: Detecting node compromise in hybrid wireless sensor networks using attestation techniques. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 203–217. Springer, Heidelberg (2007)
Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasurements. In: Proc. 1st IEEE International Workshop on Sensor Network Protocols and Applications (2003)
Kamat, P., Xu, W., Trappe, W., Zhang, Y.: Temporal Privacy in Wireless Sensor Networks. In: Proc. 27th International Conference on Distributed Computing Systems, ICDCS 2007, pp. 23–30 (2007)
Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing Source-Location Privacy in Sensor Network Routing. In: Proc. 25th IEEE International Conference on Distributed Computing Systems, ICDCS 2005, pp. 599–608 (2005)
Liu, D., Ning, P.: Location-based Pairwise Key Establishement for Relatively Static Sensor Networks. In: Proc. ACM Workshop on Security of Ad hoc and Sensor Networks (2003)
Liu, D., Ning, P., Sun, K.: Efficient Self-Healing Group Key Distribution with revocation Capability. In: Proc. ACM Conference on Computer and Communication Security, CCS 2003 (2003)
Madden, S.R., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proc. 5th Annual Symposium on Operating Systems Design and Implementation, OSDI 2002 (2002)
Mehta, K., Liu, D., Wright, M.: Location Privacy in Sensor Networks Against a Global Eavesdropper. In: Proc. IEEE International Conference on Network Protocols, ICNP 2007, pp. 314–323 (2007)
Ouyang, Y., Le, Z., Chen, G., Ford, J., Makedon, F.: Entrapping Adversaries for Source Protection in Sensor Networks. In: Proc. International Symposium on World of Wireless, Mobile and Multimedia Network, WoWMoM 2006, pp. 23–34 (2006)
Oliveira, L.B., Wong, H.C., Loureiro, A.A.: LHA-SP: Secure Protocols for Hierarchical Wireless Sensor Networks. In: Proc. IFIP/IEEE International Symposium on Integrated Network Management, pp. 31–44 (2005)
Ozturk, C., Zhang, Y., Trappe, W.: Source-location Privacy in Energy-contained Sensor Network Routing. In: Proc. 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004, pp. 88–93 (2004)
Patwardhan, A., Parker, J., Joshi, A., Iorga, M., Karygiannis, T.: Secure Routing and Intrusion Detection in Ad Hoc Networks. In: Proc. 3rd International Conference on Pervasive Computing and Communications. IEEE, Los Alamitos (2005)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: Proc. ACM SenSys (2003)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks Journal (WINE) (September 2002)
Trusted Computing Group, www.trustedcomputinggroup.org
Yarvis, M., et al.: Exploiting Heterogeneity in Sensor Networks. In: Proc. IEEE INFOCOM 2005 (2005)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: Proc. ACM Conferenc on Computer and Communication Security, CCS 2003, pp. 62–72 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, Y., Deng, R.H., Zhou, J., Qiu, Y. (2009). Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. In: Bao, F., Li, H., Wang, G. (eds) Information Security Practice and Experience. ISPEC 2009. Lecture Notes in Computer Science, vol 5451. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00843-6_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-00843-6_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00842-9
Online ISBN: 978-3-642-00843-6
eBook Packages: Computer ScienceComputer Science (R0)