Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/986655.986672acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Towards a new paradigm for securing wireless sensor networks

Published: 13 August 2003 Publication History

Abstract

The network model assumed in this paper consists of tiny, energy-constrained, commodity sensors massively deployed alongside with one or more sink nodes that provide the interface to the outside world. The sensors in the network are initially anonymous and unaware of their location. Our main contribution is to propose a new robust and energy-efficient solution for secure operation of wireless sensor networks. The paper motivates a new paradigm where security is based upon using parameterized frequency hopping and cryptographic keys in a unified framework to provide differential security services for wireless sensor networks.

References

[1]
I. F. Akyildiz, W. Su, Y. Sankarasubrarnanian, and E. Cayirci, Wireless sensor networks: A survey, Computer Networks, Elsevier Science, vol. 38, no. 4, 2002, 393--422.
[2]
P. Bahl, W. Russell, Y.-M. Wang, A. Balachandran, G. M. Voelker, and A. Miu, PAWNs: satisfying the need for ubiquitous secure connectivity and location services, IEEE Wireless Communications, vol 9, no. 1, February 2002, 40--48.
[3]
A. Ephremides, J. Wieselthier and D. Baker, A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling, Proceedings of the IEEE, 1987.
[4]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, System architecture directions for networked sensors, Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, Cambridge, Massachusetts, November 2000.
[5]
J.-P. Hubaux, L. Buttyan, and S. Capkun, The quest for security in mobile ad-hoc networks, Proc. MOBIHOC, Long Beach, CA, 2001.
[6]
J. M. Kahn, R. H. Katz and K. S. J. Pister, Mobile networking for Smart Dust, Proc. MOBICOM'99, Seattle, WA, August 17--19, 1999.
[7]
J. Kong et al., Providing robust and ubiquitous security support for mobile ad-hoc networks, Proc. 9th International Conference on Network Protocols, IEEE CS Press, Los Alamitos, California, 2001, 251--260.
[8]
C. Kurak and J. McHugh, A Cautionary Note on Image Downgrading in Computer Security Applications, San Antonio, pp. 153--159, Dec. 1992.
[9]
S. Marti et al., Mitigating routing misbehavior in mobile ad-hoc networks, Proc. MOBICOM'2000, Boston, August 6--11, 2000.
[10]
I. S. Mokowitz, G. E. Longdon, and L. Chang, A New Paradigm Hidden in Steganography, Proc. NSPW, Ballycotton, County Cork, Ireland, pp 12 ACM, Sept 2000.
[11]
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, SPINS: Security protocols for sensor networks, Proc. MOBICOM'2001, Rome, Italy, August 2001.
[12]
A. Pfitzmann, B. Pfitzmann and M. Waidner, Trusting mobile user devices and security modules, IEEE Computer, February 1997.
[13]
TinySec http://www.cs.berkeley.edu/~nks/tinysec/
[14]
A. Wadaa, S. Olariu, L. Wilson, K. Jones, and Q. Xu, On training wireless sensor networks, Proc. 3-rd International Workshop on Wireless, Mobile and Ad Hoc Networks, Nice, France, April 2003.
[15]
B. Warneke, M. Last, B. Leibowitz, and K. Pister, SmartDust: communicating with a cubic-millimeter computer, IEEE Computer, vol. 34, no. 1, January 2001, 44--51.
[16]
A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, IEEE Computer, October 2002, 54--62.
[17]
Y. Zhang and W. Lee, Intrusion detection in ad-hoc networks, Proc of MOBICOM'2000, Boston, August 6--11, 2000.
[18]
L. Zhou and Z. J. Haas, Securing ad-hoc networks, IEEE Network, vol. 13, no. 6, 1999, 24--30.
[19]
J. Zyren, T. Godfrey and D. Eaton, Does frequency hopping enhance security? http://www.packetnexus.com/docs/20010419_frequency Hopping.pdf

Cited By

View all
  • (2021)Enhancing Reliability and Availability through Redundancy in Vehicular CloudsIEEE Transactions on Cloud Computing10.1109/TCC.2019.29055909:3(1061-1074)Online publication date: 1-Jul-2021
  • (2020)A Survey of Enabling Technologies for Smart CommunitiesSmart Cities10.3390/smartcities40100044:1(54-77)Online publication date: 31-Dec-2020
  • (2020)A Survey of Vehicular Cloud Research: Trends, Applications and ChallengesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2019.295974321:6(2648-2663)Online publication date: Jun-2020
  • Show More Cited By
  1. Towards a new paradigm for securing wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      NSPW '03: Proceedings of the 2003 workshop on New security paradigms
      August 2003
      127 pages
      ISBN:1581138806
      DOI:10.1145/986655
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 August 2003

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. energy-efficient protocols
      2. frequency hopping
      3. security
      4. wireless sensor networks

      Qualifiers

      • Article

      Conference

      NSPW03
      Sponsor:
      NSPW03: New Security Paradigms and Workshop
      August 18 - 21, 2003
      Ascona, Switzerland

      Acceptance Rates

      Overall Acceptance Rate 98 of 265 submissions, 37%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Enhancing Reliability and Availability through Redundancy in Vehicular CloudsIEEE Transactions on Cloud Computing10.1109/TCC.2019.29055909:3(1061-1074)Online publication date: 1-Jul-2021
      • (2020)A Survey of Enabling Technologies for Smart CommunitiesSmart Cities10.3390/smartcities40100044:1(54-77)Online publication date: 31-Dec-2020
      • (2020)A Survey of Vehicular Cloud Research: Trends, Applications and ChallengesIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2019.295974321:6(2648-2663)Online publication date: Jun-2020
      • (2019)Toward Approximating Job Completion Time in Vehicular CloudsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2018.287399820:8(3168-3177)Online publication date: Aug-2019
      • (2018)DISHACM Transactions on Sensor Networks10.1145/324105215:1(1-28)Online publication date: 15-Dec-2018
      • (2018)Towards Approximating the Mean Time to Failure in Vehicular CloudsIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2017.271035319:7(2045-2054)Online publication date: Jul-2018
      • (2018)Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular CloudIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2018.2797190(1-1)Online publication date: 2018
      • (2016)A hybrid technique for data embedding over wireless sensor networks based on cover generation through variance2016 2nd International Conference on Next Generation Computing Technologies (NGCT)10.1109/NGCT.2016.7877530(854-860)Online publication date: Oct-2016
      • (2014)Security Architecture for Multihop Wireless Sensor NetworksSecurity for Multihop Wireless Networks10.1201/b16754-10(157-178)Online publication date: 25-Mar-2014
      • (2013)Optimal Antenna Configurations for Digital Oilfield ImplementationsAdvanced Materials Research10.4028/www.scientific.net/AMR.824.187824(187-192)Online publication date: Sep-2013
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media