Abstract

SECURITY PROBLEMS AND VARIOUS SECURITY SCHEMES IN WIRELESS SENSOR NETWORKS

Pinkey, Dr. D.B. Ojha

061-071

Vol: 2, Issue: 1, 2012

Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks

Download PDF

    References

  1. Culler, D. E and Hong, W., ―Wireless Sensor Networks‖, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33.
  2. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., ―Wireless Sensor Networks: A Survey‖, Computer Networks, 38, 2002, pp. 393-422.
  3. Dai, S, Jing, X, and Li, L, ―Research and analysis on routing protocols for wireless sensor networks‖, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411.
  4. Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., ―A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks‖, to appear in IEEE ICNEWS 2006.
  5. Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., ―Security for Sensor Networks‖, CADIP Research Symposium, 2002, available at, http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf
  6. Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., ―SPINS: Security Protocols for Sensor Networks‖, Wireless Networks, vol. 8, no. 5, 2002, pp. 521-534.
  7. Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., ―A Low-Energy Key Management Protocol for Wireless Sensor Networks‖, Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 - 340.
  8. Rabaey, J.M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M., and Tuan, T., PicoRadios for wireless sensor networks: the next challenge in ultra-low power design‖ 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7
  9. Feb. 2002, pp. 200 – 201.
  10. Hollar, S, ―COTS Dust‖, Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley, 2000.
  11. Saleh, M. and Khatib, I. A., ―Throughput Analysis of WEP Security in Ad Hoc Sensor Networks‖, Proc. The Second International Conference on Innovations in Information Technology (IIT’05), September 26-28, Dubai, 2005.
  12. Kurak, C and McHugh, J, ―A Cautionary Note on Image Downgrading in Computer Security Applications‖, Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, 1992, pp. 153-159.
  13. Mokowitz, I. S., Longdon, G. E., and Chang, L., ―A New Paradigm Hidden in Steganography‖, Proc. of the 2000 workshop on New security paradigms, Ballycotton, County Cork, Ireland, 2001, pp. 41 – 50.
  14. Kim, C. H., O, S. C., Lee, S., Yang, W. I., and Lee, H-W., ―Steganalysis on BPCS Steganography‖, Pacific Rim Workshop on Digital Steganography (STEG’03), July 3-4, Japan , 2003.
  15. Younis, M., Akkaya, K., Eltoweissy, M., and Wadaa, A., ―On handling QoS traffic in wireless sensor networks‖, Proc. of the 37th Annual Hawaii International Conference on System Sciences, 2004, 5-8 January, 2004, pp. 292 – 301.
  16. Orihashi, M., Nakagawa, Y., Murakami, Y., and Kobayashi, K., ―Channel synthesized modulation employing singular vector for secured access on physical layer‖,IEEE GLOBECOM 2003, Volume 3, 1-5 December, 2003, pp. 1226 – 1230.
  17. Zhou, L. and Haas, Z. J., ―Securing ad hoc networks‖, IEEE Network, Volume 13, Issue 6, Nov.-Dec. 1999, pp. 24 – 30.
  18. Strulo, B., Farr, J., and Smith, A., ―Securing Mobile Ad hoc Networks — A Motivational Approach‖, BT Technology Journal, Volume 21, Issue 3, 2003, pp. 81 – 89.
  19. Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., ―Security in Mobile Ad Hoc Networks: Challenges and Solutions‖, IEEE Wireless Communications, Volume 11, Issue 1, February 2004, pp. 38 – 47. [19] Pathan, A-S. K., Alam, M., Monowar, M., and Rabbi, F., ―An Efficient Routing Protocol for Mobile Ad Hoc Networks with Neighbor Awareness and Multicasting‖, Proc. IEEE E-Tech, Karachi, 31 July, 2004, pp. 97-100.
  20. Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst, R.M., Analyzing interaction between distributed denial of service attacks and mitigation technologies‖, Proc. DARPA Information Survivability Conference and Exposition, Volume 1, 22-24 April, 2003, pp. 26 – 36.
  21. Wang, B-T. and Schulzrinne, H., ―An IP traceback mechanism for reflective DoS attacks‖, Canadian Conference on Electrical and Computer Engineering, Volume 2, 2-5 May 2004, pp. 901 – 904.
  22. Pfleeger, C. P. and Pfleeger, S. L., ―Security in Computing‖, 3rd edition, Prentice Hall 2003.
  23. Douceur, J. ―The Sybil Attack‖, 1st International Workshop on Peer-to-Peer Systems (2002).
  24. Newsome, J., Shi, E., Song, D, and Perrig, A, ―The sybil attack in sensor networks: analysis & defenses‖, Proc. of the third international symposium on Information processing in sensor networks, ACM, 2004, pp. 259 – 268.
  25. Culpepper, B.J. and Tseng, H.C., ―Sinkhole intrusion indicators in DSR MANETs‖, Proc. First International Conference on Broad band Networks, 2004, pp. 681 – 688.
  26. Karlof, C. and Wagner, D., ―Secure routing in wireless sensor networks: Attacks and countermeasures‖, Elsevier's Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, September 2003, pp. 293-315.
  27. Hu, Y.-C., Perrig, A., and Johnson, D.B., ―Packet leashes: a defense against wormhole attacks in wireless networks‖, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, 30 March-3 April 2003, pp. 1976 – 1986.
  28. Kulkarni, S. S., Gouda, M. G., and Arora, A., ―Secret instantiation in adhoc networks,‖ Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, May 2005, pp. 1–15.
  29. Du, W., Deng, J., Han, Y. S., and Varshney, P. K., ―A pairwise key pre-distribution scheme for wireless sensor networks‖, Proc. of the 10th ACM conference on Computer and communications security, 2003, pp. 42-51.
  30. Oniz, C. C, Tasci, S. E, Savas, E., Ercetin, O., and Levi, A, ―SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks‖, from http://people.sabanciuniv.edu/~levi/SeFER_EWSN.pdf
  31. Wood, A. D. and Stankovic, J. A., ―Denial of Service in Sensor Networks‖, Computer, Volume 35, Issue 10, Oct. 2002 pp. 54 - 62.
  32. Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., and Srivastava, M.B., ―On communication security in wireless ad-hoc sensor networks‖, 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002, 10-12 June 2002, pp. 139 – 144.
  33. Ye, F., Luo, H., Lu, S, and Zhang, L, ―Statistical en-route filtering of injected false data in sensor networks‖, IEEE Journal on Selected Areas in Communications, Volume 23, Issue 4, April 2005, pp. 839 – 850.
  34. Yuan, L. and Qu, G., ―Design space exploration for energy-efficient secure sensor network‖, Proc. The IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2002, 17-19 July 2002, pp. 88 – 97.
  35. Karlof, C., Sastry, N., and Wagner, D., ―TinySec: a link layer security architecture for wireless sensor networks‖, Proc. of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, 2004, pp. 162 – 175.Karlof, C., Sastry, N., and Wagner, D., ―TinySec: a link layer security architecture for wireless sensor networks‖, Proc. of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, 2004, pp. 162 – 175.
  36. Younis, M., Youssef, M., and Arisha, K., ―Energy-aware routing in cluster-based sensor networks‖ Proc. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 1-16 Oct. 2002 pp. 129 – 136.
  37. Avancha, S, ―A Holistic Approach to Secure Sensor Networks‖, PhD Dissertition, University of Maryland, 2005.
  38. Wood, A.D., Stankovic, J.A., and Son, S.H., ―JAM: A Jammed-Area Mapping Service for Sensor Networks‖, 24th IEEE Real-Time Systems Symposium, RTSS 2003, pp. 286- 297.
  39. Cagalj, M., Capkun, S., and Hubaux, J-P., ―Wormhole-based Anti-Jamming Techniques in Sensor Networks‖ from http://lcawww.epfl.ch/Publications/Cagalj/CagaljCH05- worm.pdf
  40. Hamid, M. A., Rashid, M-O., and Hong, C. S., ―Routing Security in Sensor Network: Hello Flood Attack and Defense‖, to appear in IEEE ICNEWS 2006, 2-4 January, Dhaka.
  41. Chan, H, Perrig, A., and Song, D., 'Random key predistribution schemes for sensor networks', In IEEE Symposium on Security and Privacy, Berkeley, California, May 11- 14 2003, pp. 197–213.
  42. Eschenauer, L. and Gligor, V. D., 'A key-management scheme for distributed sensor networks', Proc. ACM CCS'02, 18-22 November 2002, pp. 41-47.
  43. Karakehayov, Z., 'Using REWARD to detect team black-hole attacks in wireless sensor networks', in Workshop on Real-World Wireless Sensor Networks (REALWSN'05), 20- 21June, 2005, Stockholm, Sweden.
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.