Abstract
Wireless sensor network is one of the fundamental components of the Internet of Things. With the growing use of wireless sensor networks in commercial and military, data security is a critical problem in these applications. Considerable security works have been studied. However, the majority of these works based on the scenarios that the sensitivities of data in the networks are in the same. In this paper, we present a cluster-based multilevel security model that enforces information flow from low security level to high security level. The design of the model is motivated by the observation that sensor nodes in numerous applications have different security clearances. In these scenarios, it is not enough for just protecting the data at a single level. The multilevel security mechanism is needed to prevent the information flow from high level nodes to low level nodes. We give the formal description of the model and present a scheme to achieve it. In our model, sensor nodes are grouped into different clusters. In each cluster, the security clearance of sensor nodes must not be higher than the security clearance of the cluster head. We use cryptography techniques to enforce the information flow policy of this model. The higher level nodes can derive the keys of lower level nodes and use the derived key to get the information from lower-level nodes. abstract environment.
Chapter PDF
Similar content being viewed by others
References
Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Computer Networks 54, 2787–2805 (2010)
Weber, R.H.: Internet of Things C New security and privacy challenges. Computer Law & Security Review 26, 23–30 (2010)
Zhao, F., Guibas, L.J.: Wireless Sensor Networks: An Information Processing Approach. Morgan Kaufmann, San Francisco (2004)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials 8, 2–23 (2006)
Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications 30, 2314–2341 (2007)
Simplicio Jr., M.A., Barreto, P.S.L.M., Margi, C.B., Carvalho, T.C.M.B.: A Survey on Key Management Mechanisms for Distributed Wireless Sensor Networks. Computer Networks 54(15), 2591–2612 (2010)
Bell, D.E., LaPadula, L.J.: Secure computer systems: mathematical foundations and model.Technical Report M74-244, MTR (1973)
Lu, W.-P., Sundareshan, M.K.: A Model for Multilevel Security in Computer Networks. IEEE Trans. Softw. Eng. 16(6), 647–659 (1990)
Winjum, E., Berg, T.J.: Multilevel security for ip routing. In: Military Communications Conference 2008, pp. 1–8. IEEE Press, New York (2008)
Teng, P.-Y., Huang, S.-I., Perrig, A.: Multi-layer Encryption for Multi-level Access Control in Wireless Sensor Networks. In: Proceedings of The IFIP TC 11 23rd International Information Security Conference, pp. 705–709 (2008)
Panja, B., Madria, S.K., Bhargava, B.: A Role-based Access in a Hierarchical Sensor Network Architecture to Provide Multilevel Security. Comput. Commun. 31, 793–806 (2008)
Lee, J., Son, S.H., Singhal, M.: Design of an Architecture For Multiple Security Levels in Wireless Sensor Networks. In: 7th International Conference on Networked Sensing Systems (INSS), pp. 107–114. IEEE Press, New York (2010)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lee, C., Yin, L., Guo, Y. (2012). A Cluster-Based Multilevel Security Model for Wireless Sensor Networks. In: Shi, Z., Leake, D., Vadera, S. (eds) Intelligent Information Processing VI. IIP 2012. IFIP Advances in Information and Communication Technology, vol 385. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32891-6_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-32891-6_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32890-9
Online ISBN: 978-3-642-32891-6
eBook Packages: Computer ScienceComputer Science (R0)