A security framework for wireless sensor networks

@article{Zia2006ASF,
  title={A security framework for wireless sensor networks},
  author={Tanveer A. Zia and Albert Y. Zomaya},
  journal={Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006.},
  year={2006},
  pages={49-53}
}
  • T. Zia, Albert Y. Zomaya
  • Published 27 December 2013
  • Computer Science
  • Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006.
Wireless sensor networks are result of developments in micro electro mechanical systems and wireless networks. These networks are made of tiny nodes which are becoming future of many applications where sensor networks are deployed in hostile environments. The deployment nature where sensor networks are prone to physical interaction with environment and resource limitations raises some serious questions to secure these nodes against adversaries. The traditional security measures are not enough… 

Figures from this paper

A Lightweight Security Framework for Wireless Sensor Networks

TLDR
Experimental results prove that the proposed framework can achieve high degree of security with negligible overheads and takes into consideration the communication and computation limitations of sensor networks.

Overview of Security Issues in Wireless Sensor Networks

TLDR
This paper will focus on security of Wireless Sensor Network, which is composed of large number of tiny sensor nodes, running separately, and in various cases, with none access to renewable energy resources.

A lightweight secure architecture for wireless sensor networks

TLDR
A secure lightweight architecture that takes account of the constraints of sensor networks is proposed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary and supports the detection and isolation of aberrant nodes.

A Framework for Secure and Survivable Wireless Sensor Networks

TLDR
This paper proposes a framework for secure and survivable WSNs and presents a key management scheme as a case study to prevent the sensor networks being compromised by an adversary and considers survivability strategies for the sensor network against a variety of threats.

A Survey on Wireless Sensor Network Security and its Countermeasures: An Overview

TLDR
It becomes essential to be familiar with the security aspects of WSN before designing WSN system, because these tiny wireless devices are often deployed in unattended environment with limited capabilities and are vulnerable to different types of malicious attacks.

A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks

TLDR
The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks, and identify the security threats, review proposed security mechanisms and discuss the holistic view of security for ensuring layered and robust security in wireless Sensor networks.

ESF: an efficient security framework for wireless sensor network

  • S. Tripathy
  • Computer Science, Mathematics
    Int. J. Commun. Networks Distributed Syst.
  • 2013
TLDR
Analysis of ESF shows that the framework provides a secure environment and resistant against the wireless threats using simple bit-wise operations and cryptographic hash functions.

Complete Security Framework for Wireless Sensor Networks

TLDR
This paper has proposed an integrated comprehensive security framework that will provide security services for all services of sensor network and added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions.

Threat Models and Security Issues in Wireless Sensor Networks

TLDR
This paper has corroborated well known security issues and provided the direction of research towards effective countermeasures against the threats posed by these issues.

Securing Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs

TLDR
A secure lightweight architecture (ASLAN) that takes account of the constraints of sensor networks is proposed, allowing end-to-end communication between sensor nodes and also supports identifying and isolating aberrant sensor nodes.
...

References

SHOWING 1-10 OF 18 REFERENCES

Secure routing in wireless sensor networks: attacks and countermeasures

  • Chris KarlofD. Wagner
  • Computer Science
    Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • 2003
TLDR
This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.

Energy efficient security protocol for wireless sensor networks

TLDR
The energy-efficient security protocol proposed in this paper uses symmetric cryptographic algorithms to support security, and the session key is changed dynamically, in addition to employing code-hopping technique in non-blocking OVSF codes.

Security for Sensor Networks

TLDR
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.

Random key-assignment for secure Wireless Sensor Networks

TLDR
A probabilistic model and two protocols to establish a secure pair-wise communication channel between any pair of sensors in the WSN, by assigning a small set of random keys to each sensor, are described.

A key management scheme for wireless sensor networks using deployment knowledge

TLDR
It is shown that the performance of sensor networks can be substantially improved with the use of the proposed random key pre-distribution scheme, which exploits deployment knowledge and avoids unnecessary key assignments.

A pairwise key pre-distribution scheme for wireless sensor networks

TLDR
This paper proposes a new key pre-distribution scheme, which substantially improves the resilience of the network compared to the existing schemes, and exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that any nodes other than these compromised nodes are affected is close to zero.

A key-management scheme for distributed sensor networks

TLDR
A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.

Analyzing and modeling encryption overhead for sensor network nodes

TLDR
A survey investigating the computational requirements for a number of popular cryptographic algorithms and embedded architectures and methods to derive the computational overhead of embedded architectures in general for encryption algorithms are developed to assess the feasibility of encryption schemes for existing embedded architectures.

Random key predistribution schemes for sensor networks

TLDR
The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.

Establishing pairwise keys in distributed sensor networks

TLDR
A general framework for establishing pairwise keys between sensor nodes using bivariate polynomials is developed and an optimization technique for polynomial evaluation is presented, which can be applied efficiently in resource-constrained sensor networks.