• Corpus ID: 394340

Chapter 17 Wireless Sensor Network Security : A Survey

@inproceedings{Walters2006Chapter1W,
  title={Chapter 17 Wireless Sensor Network Security : A Survey},
  author={John Paul Walters and Zhengqiang Liang and Weisong Shi and Vipin Chaudhary},
  year={2006}
}
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. There is currently enormous… 

Figures and Tables from this paper

Key management for wireless sensor network security
TLDR
This thesis is an effort to develop a key management framework and specific schemes for WSNs by which different types of keys can be established and also can be distributed in a self-healing manner; explicit/implicit authentication can be integrated according to the security requirements of expected applications.
Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms
TLDR
A lightweight ID system, called LIDeA, is developed, which follows an intelligent agent-based architecture, and it is demonstrated how such a system can be implemented, which components and interfaces are needed, and what is the resulting overhead imposed.
Authentication in Wireless Sensor Networks
TLDR
Wireless Sensor Networking is a developing field of research that presents analysts with testing objectives under tight outline imperatives, since current security instruments are excessively asset serious as far as power, memory and preparing capacities of sensor organize hubs.
Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility
TLDR
This article describes the development of a novel access control system for WSN based on a distributed threshold scheme that gives support for mobility and limits the needed communication and consequent energy drain, which is a fundamental parameter for the lifetime of WSN.
An Energy-Efficient and Secure Hybrid Algorithm for Wireless Sensor Networks Using a Mobile Data
TLDR
A new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches, is proposed to save energy of sensor nodes in a wireless sensor network (WSN) as these sensor nodes have limited energy.
An energy-efficient and secure hybrid algorithm for wireless sensor networks using a mobile data collector
TLDR
A new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches, is proposed to save energy of sensor nodes in a wireless sensor network (WSN) as these sensor nodes have limited energy.
Security in Monitoring Schemes: A Survey
TLDR
This paper has discussed the components of monitoring, multiple monitoring schemes, their security parameters and various types of attacks possible on these monitoring components by manipulating assumptions of monitoring schemes.
A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication
TLDR
A monitoring based approach for securing upper layer communications of WSN (Wireless Sensor Networks), the latter using IEEE802.15.4/6LowPAN and DTLS communication is feasible.
On Denial of Service Attacks for Wireless Sensor Networks
TLDR
The simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802.15.4 based OPNET simulative model for WSN under constant and varying intensity ofJamming attacks.
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference
TLDR
This survey presents the current state of affairs in the formulation of theoretical models for adversarial interference in sensor networks and the different algorithmic remedies developed by the research community, with a particular focus on jamming adversaries and Byzantine faults.
...
...

References

SHOWING 1-10 OF 92 REFERENCES
Security in wireless sensor networks
TLDR
This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05
TLDR
The ease with which nodes can be compromised is demonstrated as well as exactly what information can be obtained and how it can be used to disrupt, falsify data within, or eavesdrop on sensor networks.
Denial of Service in Sensor Networks
TLDR
To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.
Security and Privacy in Sensor Networks
TLDR
The miniature wireless sensor nodes developed from low-cost off-the-shelf components at the University of California, Berkeley, as part of its smart dust projects, establish a self-organizing sensor network when dispersed into an environment.
TinySec: a link layer security architecture for wireless sensor networks
TLDR
TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Security for Sensor Networks
TLDR
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Secure aggregation for wireless networks
  • Lingxuan Hu, David Evans
  • Computer Science
    2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
  • 2003
TLDR
This work presents a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises, and takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
TLDR
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.
The Sybil attack in sensor networks: analysis & defenses
TLDR
It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
...
...