ABSTRACT
The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.
- H. Abrach, S. Bhatti, J. Carlson, H. Dui, J. Rose, A. Sheth, B. Shucker, J. Deng, R. Han, "MANTIS: System Support for Multimodal Networks of In-Situ Sensors", In Proc. of 2nd ACM Workshop on Wireless Sensor Networks and Applications (WSNA'03), San Diego, CA, Sep, 2003. Google ScholarDigital Library
- ARGUS Advanced Remote Ground Unattended Sensor Systems, Department of Defense, U.S. Air Force, http://www.globalsecurity.org/intell/systems/arguss.htm.Google Scholar
- B. J. Bonfils, P. Bonnet, "Adaptive and Decentralized Operator Placement for In-Network Query Processing", IPSN'03, Apri1, 2003. Google ScholarDigital Library
- N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", ACM MobiCom 2001, pp. 180--188. Google ScholarDigital Library
- H. Chan, A. Perrig, D. Song, "Random Key Predistribution Schemes for Sensor Networks", Appears in IEEE Symposium on Security and Privacy 2003. Google ScholarDigital Library
- Cougar Project: http://cougar.cs.cornell.eduGoogle Scholar
- J. Deng, R. Han and S. Mishra, "The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks", In Proc. of IEEE 2nd International Workshop on Information Processing in Sensor Networks, IPSN'03, LNCS 2634. Google ScholarDigital Library
- J. Douceur, "the Sybil Attack," In Proc. of the IPTPS02 Workshop, Cambridge, MA (USA), March 2002. Google ScholarDigital Library
- L. Eschenauer, V. D. Gigor, "A Key-Management Scheme for Distributed Sensor Networks", Conference on Computer and Communications Security, CCS'O2, Washington DC, USA, November, 2002. Google ScholarDigital Library
- J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Cullar, K. Pister, "System architecture directions for network sensors", ASPLOS 2000, Cambridge, November 2000. Google ScholarDigital Library
- Y. C. Hu, A. Perrig, D. B. Johnson, "Efficient Security Mechanisms for Routing Protocols", In Proc. of the Tenth Annual Network and Distributed System Security Symposium, NDSS'O3, San Diego, CA, February 2003.Google Scholar
- Y. C. Hu, A. Perrig, D. B. Johnson, " Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols". In Proc. of 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, Sep, 2003. Google ScholarDigital Library
- C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed Diffusion: A Scalable and Robuts Communication Paradigm for Sensor Networks," 6th Conf. on Mobile Computing and Networking, August, 2000, USA. Google ScholarDigital Library
- C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.Google ScholarCross Ref
- J. Kong, H. Luo, K. Xu. D. Gu, M. Gerla and S. Lu, "Adaptive Security for Multi-layer Ad Hoc Networks," Special Issue of Wireless Communications and Mobile Computing". August, 2002.Google Scholar
- R. Kumar, V. Tsiatsis, M. Srivastava. "Computation Hierarchy for In-network Processing", In Proc. of 2nd ACM International Workshop on Wireless Sensor Networks & Applications (WSNA'03), San Diego, CA. Sep, 2003. Google ScholarDigital Library
- L. Lamport, "Constructing digital signatures from one-way function", technical report SRI-CSL-98, SRI International, Oct 1979.Google Scholar
- L. Lamport, "Password Authentication with Insecure Communication", Communication of the ACM, 24:11, Nov 1981. Google ScholarDigital Library
- J. Liu, J. E. Riech, and F. Zhao. "Collaborative in-network processing for target tracking", EURASIP, Journal on Applied Signal Processing, March, 2003. Google ScholarDigital Library
- D. Liu and P. Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks", The 10th Annual Network and Distributed System Security Symposium. San Diego, California. February 2003.Google Scholar
- L. Lazos, R. Poovendran. "Energy-aware secure multicast communication in ad-hoc networks using geographic location information", ICASSP 2003, Hong Kong, China, April 2003.Google ScholarCross Ref
- H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang, "Self-securing Ad Hoc Wireless Networks." IEEE ISCC 2002, Italy, July 2002. Google ScholarDigital Library
- S. Madden. M. Franklin, J. Hellerstein, and W. Hong. "TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks", OSDI, December 2002. Google ScholarDigital Library
- F. Martin, B. Mikhak, and B. Silverman, "MetaCricket: A designer's kit for making computational devices", IBM Systems Journal, vol. 39, 2000. Google ScholarDigital Library
- A. Mainwaring, J. Polastre, R. Szewczyk D. Culler, J. Anderson, "Wireless Sensor Networks for Habitat Monitoring", First ACM Workshop on Wireless Sensor Networks and Applications (WSNA) 2002. pp. 88--97. Google ScholarDigital Library
- A. J. Menezes, P. C. Oorschot, S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press LLC, 1996. Google ScholarDigital Library
- NAI Lab Report, http://www.nai.com/nai_labs/asp_set/crypto/crypt_senseit.asp.Google Scholar
- R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM 21(12), December 1978. Google ScholarDigital Library
- NS2 web site, http://www.isi.edu/nsnam/nsGoogle Scholar
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Wireless Networks Journal(WINET), 8(5):521--534, Sep 2002. Google ScholarDigital Library
- B. Przydatek, D. Song and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks", To Appear in ACM SenSys'03, Los Angeles, CA, Nov, 2003. Google ScholarDigital Library
- K. Sanzgiri. B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", In Proc. of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002. Google ScholarDigital Library
- S. Slijepcevic, V. Tsiatsis, S. Zimbeck, "On Communication Security in Wireless Ad-Hoc Sensor Networks", Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02). June 2002, USA. Google ScholarDigital Library
- TinyOS: http://www.cs.berkeley.edu/tosGoogle Scholar
- TinySec: http://www.cs.berkeley.edu/~nks/tinysec/Google Scholar
- A. Wood, J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54--62, October 2002. Google ScholarDigital Library
- L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, vol. 13, no.6, November/December 1999.Google Scholar
- D. Bruschi, E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issue", ACM/Baltzer Mobile networks and applications, special issue on Multipoint Communication in Wireless Mobile Networks, Vol. 6, No. 7, December 2002. Google ScholarDigital Library
- P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein, "Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet", ASPLOS-X conference, Oct. 2002. Google ScholarDigital Library
- H. Wang, J. Elson, L. Girod, D. Estrin, and K. Yao, "Target Classification and Localization in Habitat Monitoring", In Proc. of IEEE international Conference on Acoustics, Speech, and Signal Processing(ICASSP 2003), Hong Kong, China, April 2003.Google Scholar
- Y. J. Zhao, R. Govindan, and D. Estrin, "Computing Aggregates for Monitoring Wireless Sensor Networks", The First IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03), Anchorage, AK, USA. May 11, 2003Google ScholarCross Ref
Index Terms
- Security support for in-network processing in Wireless Sensor Networks
Recommendations
Complex query processing in wireless sensor networks
PM2HW2N '07: Proceedings of the 2nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networksGreater availability and affordability of wireless technology has led to an increase in the number of wireless sensor network (WSN) applications where sense data is collected at a central user point, commonly outside the network (geographically and ...
Lifetime Enhancement of Wireless Multimedia Sensor Networks Using Data Compression
Wireless Sensor Network WSN has limited resources such as energy, computation and transmission capacity. These resources are not sufficient for transmitting large amount of data collected by the sensor nodes. Wireless Multimedia Sensor Network WMSN ...
An efficient cluster-based communication protocol for wireless sensor networks
A wireless sensor network is a network of large numbers of sensor nodes, where each sensor node is a tiny device that is equipped with a processing, sensing subsystem and a communication subsystem. The critical issue in wireless sensor networks is how ...
Comments