Abstract
Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to aid in the design of secure WSN protocols. Therefore, building upon both the established and the new concepts, envisioned applications, and the experience garnered from the WSNs research, we first review the desired security services (i.e., confidentiality, authentication, integrity, access control, availability, and nonrepudiation) from WSNs perspective. Then, we question which services would be necessary for resource-constrained WSNs and when it would be most reasonable to implement them for a WSN application.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks (Elsevier) Journal 38(4), 393–422 (2002)
Xbow, Crossbow technology (2008), http://www.xbow.com/
Akyildiz, I.F., Vuran, M.C., Akan, O.B.: A cross layer protocol for wireless sensor networks. In: Proc. CISS 2006, Princeton, NJ (March 2006)
Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Englewood Cliffs (2003)
Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks. In: The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam (December 2006)
Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6), 38–43 (2004)
ITU. X. 800, Security architecture for open systems interconnection for ccitt applications (1991)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS 2002, pp. 41–47 (2002)
Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw. 2(1), 65–93 (2006)
Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine 44(4), 122–130 (2006)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireles Networks 8(5), 521–534 (2002)
Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: ACM SenSys 2004 (November 2004)
Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Elsevier’s AdHoc Networks Journal 5(1), 3–13 (2007)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)
Pietro, R.D., Mancini, L., Mei, A., Panconesi, A., Radhakrishnan, J.: How to design connected sensor networks that are provably secure. Securecomm, 89–100 (2006)
Hou, H., Corbett, C., Li, Y., Beyah, R.: Dynamic energy-based encoding and filtering in sensor networks. In: Proc. of the IEEE MILCOM (October 2007)
Vu, C., Beyah, R., Li, Y.: A composite event detection in wireless sensor networks. In: Proc. of the IEEE IPCCC (April 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Uluagac, A.S., Lee, C.P., Beyah, R.A., Copeland, J.A. (2008). Designing Secure Protocols for Wireless Sensor Networks. In: Li, Y., Huynh, D.T., Das, S.K., Du, DZ. (eds) Wireless Algorithms, Systems, and Applications. WASA 2008. Lecture Notes in Computer Science, vol 5258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88582-5_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-88582-5_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88581-8
Online ISBN: 978-3-540-88582-5
eBook Packages: Computer ScienceComputer Science (R0)