ABSTRACT

Contents 10.1 Abstract. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 10.2 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 10.3 Security Goals and Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

10.3.1 Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 10.3.2 Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 10.3.3 Challenges. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240

10.4 Key Establishment and Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242 10.4.1 Pair-wise Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 10.4.2 Group Key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

10.5 Secure Location Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 10.5.1 Secure Location/Position Computation . . . . . . . . . . . . . . . . . 252 10.5.2 Location Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

10.6 Secure Routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 10.7 Broadcast Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 10.8 Secure Aggregation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 10.9 Other Security Issues: Reliability and Fault Tolerance. . . . . . . . . . . 264 10.10 Conclusion and Open Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

10.1 Abstract Wireless sensor networks have been rapidly emerging recently and the applications range widely. To protect the networks from different kinds of attacks, security in wireless sensor networks plays a crucial role and has received increased attention in the applications, especially those deployed in hostile environment such as battlefield monitoring and home security. However, the stringent resource constraints, such as energy, communication and computation capability, and memory, etc., pose many new challenges in security design. In this chapter we discuss the security issues in wireless sensor networks and present a comprehensive survey of the approaches published in recent literature. Some ongoing research work as well as open problems are also discussed.