Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Designing Secure Protocols for Wireless Sensor Networks

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5258))

Abstract

Over the years, a myriad of protocols have been proposed for resource-limited Wireless Sensor Networks (WSNs). Similarly, security research for WSNs has also evolved over the years. Although fundamental notions of WSN research are well established, optimization of the limited resources has motivated new research directions in the field. In this paper, we seek to present general principles to aid in the design of secure WSN protocols. Therefore, building upon both the established and the new concepts, envisioned applications, and the experience garnered from the WSNs research, we first review the desired security services (i.e., confidentiality, authentication, integrity, access control, availability, and nonrepudiation) from WSNs perspective. Then, we question which services would be necessary for resource-constrained WSNs and when it would be most reasonable to implement them for a WSN application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: A survey. Computer Networks (Elsevier) Journal 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Xbow, Crossbow technology (2008), http://www.xbow.com/

  3. Akyildiz, I.F., Vuran, M.C., Akan, O.B.: A cross layer protocol for wireless sensor networks. In: Proc. CISS 2006, Princeton, NJ (March 2006)

    Google Scholar 

  4. Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Prentice Hall, Englewood Cliffs (2003)

    Google Scholar 

  5. Roosta, T., Shieh, S., Sastry, S.: Taxonomy of security attacks in sensor networks. In: The First IEEE International Conference on System Integration and Reliability Improvements, Hanoi, Vietnam (December 2006)

    Google Scholar 

  6. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Wireless Communications 11(6), 38–43 (2004)

    Article  Google Scholar 

  7. ITU. X. 800, Security architecture for open systems interconnection for ccitt applications (1991)

    Google Scholar 

  8. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS 2002, pp. 41–47 (2002)

    Google Scholar 

  9. Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw. 2(1), 65–93 (2006)

    Article  Google Scholar 

  10. Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine 44(4), 122–130 (2006)

    Article  Google Scholar 

  11. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: Spins: security protocols for sensor networks. Wireles Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  12. Karlof, C., Sastry, N., Wagner, D.: Tinysec: A link layer security architecture for wireless sensor networks. In: ACM SenSys 2004 (November 2004)

    Google Scholar 

  13. Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Elsevier’s AdHoc Networks Journal 5(1), 3–13 (2007)

    Article  Google Scholar 

  14. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  15. Pietro, R.D., Mancini, L., Mei, A., Panconesi, A., Radhakrishnan, J.: How to design connected sensor networks that are provably secure. Securecomm, 89–100 (2006)

    Google Scholar 

  16. Hou, H., Corbett, C., Li, Y., Beyah, R.: Dynamic energy-based encoding and filtering in sensor networks. In: Proc. of the IEEE MILCOM (October 2007)

    Google Scholar 

  17. Vu, C., Beyah, R., Li, Y.: A composite event detection in wireless sensor networks. In: Proc. of the IEEE IPCCC (April 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Uluagac, A.S., Lee, C.P., Beyah, R.A., Copeland, J.A. (2008). Designing Secure Protocols for Wireless Sensor Networks. In: Li, Y., Huynh, D.T., Das, S.K., Du, DZ. (eds) Wireless Algorithms, Systems, and Applications. WASA 2008. Lecture Notes in Computer Science, vol 5258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88582-5_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88582-5_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88581-8

  • Online ISBN: 978-3-540-88582-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics