Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Securing Topology Maintenance Protocols for Sensor Networks

Published: 01 May 2011 Publication History

Abstract

We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes that the sensor nodes will be deployed in a trusted, nonadversarial environment, and does not take into account the impact of attacks launched by malicious insider or outsider nodes. We propose a metaprotocol (Meta-TMP) to represent the class of topology maintenance protocols. The Meta-TMP provides us with a better understanding of the characteristics and of how a specific TMP works, and it can be used to study the vulnerabilities of a specific TMP. We describe various types of malicious behavior and actions that can be carried out by an adversary to attack a wireless sensor network by exploiting the TMP being used in the network. We describe three attacks against these protocols that may be used to reduce the lifetime of the sensor network, or to degrade the functionality of the sensor application by reducing the network connectivity and the sensing coverage that can be achieved. Further, we describe countermeasures that can be taken to increase the robustness of the protocols and make them resilient to such attacks.

Cited By

View all
  • (2018)Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor NetworkWireless Personal Communications: An International Journal10.1007/s11277-018-5755-9101:2(1177-1199)Online publication date: 1-Jul-2018
  • (2016)Secured Energy Conserving Slot-Based Topology Maintenance Protocol for Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-015-3103-x87:2(527-550)Online publication date: 1-Mar-2016

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing  Volume 8, Issue 3
May 2011
160 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 May 2011

Author Tags

  1. Mobile applications
  2. pervasive computing
  3. reliability
  4. security and privacy protection.
  5. wireless sensor networks

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor NetworkWireless Personal Communications: An International Journal10.1007/s11277-018-5755-9101:2(1177-1199)Online publication date: 1-Jul-2018
  • (2016)Secured Energy Conserving Slot-Based Topology Maintenance Protocol for Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-015-3103-x87:2(527-550)Online publication date: 1-Mar-2016

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media