Abstract
In recent years wireless sensor networks (WSNs) are fast emerging as an important domain for both commercial and personal use. The advancement in robotics has enabled exploring another domain in WSNs i.e., mobile WSNs (MWSNs). A MWSN consists of a collection of nodes that can move on their own and interact with the physical environment. Several applications demand the need for mobility in nodes which, in general are static. Due to the nature of deployment of the nodes coupled with their resource constraints, providing security to such MWSNs have gained a prime importance. Also, they can be deployed in physically inaccessible environment as well as critical areas, and therefore the need to make them secure is very important. Mobility of nodes in MWSNs makes them more vulnerable to attacks by adversaries. Many works have been conducted in recent past where various promising solutions have been provided for detecting the attack, diagnosing the adversary nodes, and nullifying their capabilities for further damage in MWSNs. To start with, this chapter presents the need for MWSNs followed by security objectives, key issues and inherent challenges faced by these networks. Existing works dealing with basic security features and the different attacks faced by MWSNs are discussed. Finally, we give an insight into the possible directions for future work in securing MWSNs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sara, G.S., Sridharan, D.: Routing in mobile wireless sensor network: a survey. Telecommun. Syst. 57(1), 51–79 (2014)
Anastasi, G., Conti, M., Francesco, M.D., Passarella, A.: Energy conservation in wireless sensor networks: a survey. Ad Hoc Netw. 7(3), 537–568 (2009)
Chellappan, S., Bai, X., Ma, B., Xuan, D., Xu, C.: Mobility limited flip-based sensor networks deployment. IEEE Trans. Parallel Distrib. Syst. 18(2), 199–211 (2007)
Yang, Y., Fonoage, M.I., Cardei, M.: Improving network lifetime with mobile wireless sensor networks. Comput. Commun. 33(4), 409–419 (2010)
Dantu, K., Rahimi, M.H., Shah, H., Babel, S., Dhariwal, A., Sukhatme, G.S.: Robomote: enabling mobility in sensor networks. In: Proceedings of 4th International Symposium on Information Processing in Sensor Networks (IPSN), article no. 55 (2005)
Lee, U., Magistretti, E.O. Zhou, B.O., Gerla, M., Bellavista, P., Corradi, A.: Efficient data harvesting in mobile sensor platforms. In: Proceedings of 4th PerCom Workshops, pp. 352–356 (2006)
Munir, S.A., Ren, B., Jiao, W., Wang, B., Xie, D., Ma, J.: Mobile wireless sensor network: architecture and enabling technologies for ubiquitous computing. In: Proceedings of 21st AINA Workshops, vol. 2, pp. 113–120 (2007)
Ekici, E., Gu, Y., Bozdag, D.: Mobility-based communication in wireless sensor networks. IEEE Commun. Mag. 44(7), 56–62 (2006)
Tilak, S., Kolar, V., Ghazaleh, N.B.A., Kang, K.D.: Dynamic localization control for mobile sensor networks. In: Proceedings of 24th IEEE International Performance, Computing and Communications Conference (IPCCC), pp. 587–592 (2005)
Kweon, K., Ghim, H., Hong, J., Yoon, H.: Grid-based energy efficient routing from multiple sources to multiple mobile sinks in wireless sensor networks. In: Proceedings of 4th International Conference on Wireless Pervasive Computing, pp. 185–189 (2009)
Yu, F., Park, S., Lee, E., Kim, S.H.: Elastic routing: a novel geographic routing for mobile sinks in wireless sensor networks. IET Commun. 4(6), 716–727 (2010)
Mir, Z.H., Ko, Y.B.: A quadtree-based hierarchical data dissemination for mobile sensor networks. Telecommun. Syst. 36(1–3), 117–128 (2007)
Cao, G., Kesidis, G., Porta, T.L., Yao, B., Phoha, S.: Purposeful Mobility in Tactical Sensor Networks. Sensor Network Operations. Wiley-IEEE Press (2006)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)
Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 10(3), 6–28 (2008)
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2), 52–73 (2009)
Zin, S.M., Anuar, N.B., Kiah, M.L.M., Pathan, A.S.K.: Routing protocol design for secure wsn: review and open research issues. J. Netw. Comput. Appl. 41, 517–530 (2014)
Xu, J., Zhu, W.T., Feng, D.G.: An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks. Comput. Commun. 34(3), 319–325 (2011)
Park, J.H.: An authentication protocol offering service anonymity of mobile device in ubiquitous environment. J. Supercomputing 62(1), 105–117 (2012)
Wang, D., Wang, P., Liu, J.: Improved privacy-preserving authentication scheme for roaming service in mobile networks. In: Proceedings of 15th IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2014)
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with zebranet. ACM Sigplan Not. 37(10), 96–107 (2002)
Friedman, J., Lee, D.C., Tsigkogiannis, I., Wong, S., Chao, D., Levin, D., Kaisera, W.J. Srivastava, M.B.: Ragobot: a new platform for wireless mobile sensor networks. In: Proceedings of International Conference on Distributed Computing in Sensor Systems (DCOSS), LNCS-3560, p. 412 (2005)
Shah, C.R., Roy, S., Jain, S., Brunette, W.: Data mules: modeling and analysis of a three-tier architecture for sparse sensor networks. Ad Hoc Netw. 1(2), 215–233 (2003)
Wang, G., Cao, G., Porta, T., Zhang, W.: Sensor relocation in mobile sensor networks. In: Proceedings of 24th IEEE INFOCOM, vol. 4, pp. 2302–2312 (2005)
Amundson, I., Koutsoukos, X., Sallai, J.: Mobile sensor localization and navigation using RF doppler shifts. In: Proceedings of 1st International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT), pp. 97–102 (2008)
Fang, L., Antsaklis, P.J., Montestruque, L., Mcmickell, M.B., Lemmon, M., Sun, Y., Fang, H., Koutroulis, I., Haenggi, M., Xie, M., Xie, X.: Design of a wireless assisted pedestrian dead reckoning system-the navmote experience. IEEE Trans. Instrum. Measur. 54(6), 2342–2358 (2005)
Chen, C., Ma, J., Yu, K.: Designing energy efficient wireless sensor networks with mobile sinks. In: Proceedings of Workshop on World-Sensor-Web (WSW) at ACM SenSys, pp. 1–6 (2006)
Wang, Q., Hempstead, M., Yang, W.: A realistic power consumption model for wireless sensor network devices. In: Proceedings of 3rd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), vol. 1, pp. 286–295 (2006)
Natalizio, E., Loscri, V.: Controlled mobility in mobile sensor networks: advantages, issues and challenges. Telecommun. Syst. 52(4), 2411–2418 (2013)
Kansal, A., Somasundara, A.A., Jea, D.D., Srivastava, M.B., Estrin, D.: Intelligent fluid infrastructure for embedded networks. In: Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 111–124 (2004)
Amundson, I., Koutsoukos, X.D.: A survey on localization for mobile wireless sensor networks. In: Proceedings of 2nd International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments (MELT), pp. 235–254 (2009)
Sakarindr, P., Ansari, N.: Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks. IEEE Wirel. Commun. 14(5), 8–20 (2007)
Conti, M., Pietro, R.D., Mancini, L.V., Mei, A.: Emergent properties: detection of the node-capture attack in mobile wireless sensor networks. In: Proceedings of 1st ACM Conference on Wireless Network Security (WiSec), pp. 214–219 (2008)
Ren, Y., Oleshchuk, V., Li, F.Y., Sulistyo, S.: SCARKER: a sensor capture resistance and key refreshing scheme for mobile WSNs. In: Proceedings of 36th IEEE International Conference on Local Computer Networks (LCN), pp. 271–274 (2011)
Mostarda, L., Navarra, A.: Distributed intrusion detection systems for enhancing security in mobile wireless sensor networks. Int. J. Distrib. Sens. Netw. 4(2), 83–109 (2008)
Zheng, X., Huang, C.T., Matthews, M.: In: Chinese remainder theorem based group key management. In: Proceedings of 45th ACM Annual Southeast Regional Conference (ACM-SE), pp. 266–271 (2007)
Sun Microsystems, Inc., Sun SPOT. http://www.sunspotworld.com/
Ho, J.W., Wright, M., Das, S.K.: Fast detection of replica node attacks in mobile sensor networks using sequential analysis. In: Proceedings of 28th IEEE INFOCOM, pp. 1773–1781 (2009)
Ho, J.W., Wright, M., Das, S.K.: Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing. IEEE Trans. Mob. Comput. 10(6), 767–782 (2011)
Conti, M., Pietro, R.D., Spognardi, A.: Clone wars: distributed detection of clone attacks in mobile wsns. J. Comput. Syst. Sci. 80(3), 654–669 (2014)
Zhu, W.T., Zhou, J., Deng, R.H., Bao, F.: Detecting node replication attacks in mobile sensor networks: theory and approaches. Secur. Commun. Netw. 5(5), 496–507 (2012)
Yu, C.M., Lu, C.S., Kuo, S.Y.: Efficient and distributed detection of node replication attacks in mobile sensor networks. In: Proceedings of 70th International Vehicular Technology Conference Fall (VTC 2009-Fall), pp. 1–5 (2009)
Lou, Y., Zhang, Y., Liu, S.: Single hop detection of node clone attacks in mobile wireless sensor networks. In: Proceedings of International Workshop on Information and Electronics Engineering, PE-29, pp. 2798–2803 (2012)
Yu, C.M., Lu, C.S., Kuo, S.Y.: Mobile sensor network resilient against node replication attacks. In: Proceedings of 5th International Confernational on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 597–599 (2008)
Khalil, I., Bagchi, S., Shroff, N.B.: Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)
Schmidt, S., Krahn, H., Fischer, S., Wätjen, D.: A security architecture for mobile wireless sensor networks. In: Proceedings of 1st European Workshop on Security in Ad-hoc and Sensor Networks (ESAS), LNCS-3313, pp. 166–177 (2005)
Blundo, C., Santis, A.D., Herzberg, A., Kutton, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proceedings of 12th International Cryptology Conference (CRYPTO), LNCS-740, pp. 471–486 (1993)
Blom, R.: An optimal class of symmetric key generation systems. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT), LNCS-209, pp. 335–338 (1985)
Dworkin, M.: NIST Special Publication 800–38A: Recommendation for Block Cipher Modes of Operation. http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf. (2001)
Anderson, R., Biham, E., Knudsen, L.: Serpent: A proposal for the advanced encryption standard. NIST AES Proposal 174 (1998)
Bairaktaris, K., Chatzigiannakis, I., Liagkou, V., Spirakis, P.G.: Adaptive probabilistic secure routing in mobile wireless sensor networks. In: Proceedings of 16th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 208–212 (2008)
Fotouhi, H., Zuniga, M., Alves, M., Koubaa, A., Marron, P.: Smart-HOP: a reliable handoff mechanism for mobile wireless sensor networks. In: Proceedings of 9th European Conference on Wireless Sensor Networks (EWSN), LNCS 7158, pp. 131–146 (2012)
Stavrou, E., Pitsillides, A., Hadjichristofi, G., Hadjicostis, C.: Security in future mobile sensor networks issues and challenges. In: Proceedings of International Conference on Security and Cryptography (SECRYPT), pp. 1–9 (2010)
Luo, J., Hubaux, J.P.: Joint mobility and routing for lifetime elongation in wireless sensor networks. In: Proceedings of 24th IEEE INFOCOM, pp. 1735–1746 (2005)
Wang, F., Liu, J.: Networked wireless sensor data collection: issues, challenges, and approaches. IEEE Commun. Surv. Tutorials 13(4), 673–687 (2011)
Marron, P.J., Minder, D., Karnouskos, S.: The Emerging Domain of Cooperating Objects: Definitions and Concepts. Springer Publishing, New York (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ghosal, A., Halder, S. (2015). Security in Mobile Wireless Sensor Networks: Attacks and Defenses. In: Koubâa, A., MartÃnez-de Dios, J. (eds) Cooperative Robots and Sensor Networks 2015. Studies in Computational Intelligence, vol 604. Springer, Cham. https://doi.org/10.1007/978-3-319-18299-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-18299-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18298-8
Online ISBN: 978-3-319-18299-5
eBook Packages: EngineeringEngineering (R0)