Abstract
Wireless Sensor Networks are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource-constrained nodes and lack of tamper-resistant packages. As a result, security must be an important factor to have in mind when designing the infrastructure and protocols of sensor networks. In this paper we survey the “state-of-the-art” security issues in sensor networks and highlight the open areas of research.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
- Sensor Network
- Sensor Node
- Wireless Sensor Network
- Message Authentication Code
- Elliptic Curve Cryptography
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4) (March 2002)
Crossbow Technology, Inc. MICA2 and MICAz, Wireless Measurement Systems., http://www.xbow.com
IEEE Standard, 802.15.4-2003. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks, ISBN 0-7381-3677-5 (May 2003)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of 2nd International Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)
Sastry, N., Wagner, D.: Security considerations for IEEE 802.15.4 networks. In: Proceedings of 2004 ACM Workshop on Wireless security (Wise 2004) (October 2004)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (Secon 2004) (October 2004)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of 9th ACM Conference on Computer and Communications Security (CCS 2002) (November 2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 IEEE Symposium on Security and Privacy (S&P 2003) (May 2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM conference on Computer and communications Security (CCS 2003) (October 2003)
Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)
Wei, R., Wu, J.: Product construction of key distribution schemes for sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 280–293. Springer, Heidelberg (2004)
Yener, B., Camtepe, S.A.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM 2004 (March 2004)
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of 7th International Conference on Mobile Computing and Networking (MOBICOM 2001) (July 2001)
Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: Proceedings of 12th IEEE International Conference on Network Protocols (ICNP 2004) (October 2004)
Zachari, J.: A decentralized approach to secure group membership testing in distributed sensor networks. In: Proceedings of 2003 Military Communications Conference (MILCOM 2003) (October 2003)
Law, Y.W., Corin, R., Etalle, S., Hartel, P.H.: A formally verified decentralized key management architecture for wireless sensor networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 27–39. Springer, Heidelberg (2003)
Al-Karaki, J.N., Kamal, A.E.: Routing techniques in wireless sensor networks: a survey. To appear in IEEE Wireless Communications
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications (May 2003)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of 3rd IEEE International Workshop on Information Processing in Sensor Networks (IPSN 2004) (April 2004)
Di Pietro, R., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.: LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: Proceedings of 32nd International Conference on Parallel Processing Workshops (ICPP 2003) (October 2003)
Deng, J., Han, R., Mishra, S.: A performance evaluation of intrusion-tolerant routing in wireless sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol. 2634, pp. 349–364. Springer, Heidelberg (2003)
Fang, Q., Gao, J., Guibas, L.J.: Locating and bypassing routing holes in sensor networks. In: Proceedings of IEEE INFOCOM 2004 (March 2004)
Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of 2nd ACM workshop on Security of Ad Hoc and Sensor Networks (SANS 2004) (October 2004)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proceedings of 1st International Conference on Embedded Networked Sensor Systems (SenSys 2003) (November 2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of GLOBECOM 2003 (December 2003)
Ye, F., Luo, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: Proceedings of IEEE INFOCOM 2004 (March 2004)
Zhang, Y., Lee, W.: Intrusion detection techniques for mobile wireless networks. ACM/Kluwer Wireless Networks Journal 9(5), 545–556 (2003)
Hsin, C., Liu, M.: A Distributed monitoring mechanism for wireless sensor networks. In: Proceedings of 2002 ACM Workshop on Wireless Security (WiSe 2002) (September 2002)
Doumit, S.S., Agrawal, D.P.: Self-organized criticaly & stochastic learning based intrusion detection system for wireless sensor networks. In: Proceedings of 2003 Military Communications Conference (MILCOM 2003) (October 2003)
Seshandri, A., Perrig, A., Van Doorn, L., Khosla, P.: SWATT: software-based attestation for embedded devices. In: Proceedings of 2004 IEEE Symposium on Security and Privacy (S&P 2004) (May 2004)
Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In: Proceedings of 2nd IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems (WSTFEUS 2004) (May 2004)
Qi, H., Xu, Y., Wang, X.: Mobile-agent-based collaborative signal and information processing in sensor networks. Proceedings of the IEEE 91(8), 1172–1183 (2003)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roman, R., Zhou, J., Lopez, J. (2005). On the Security of Wireless Sensor Networks. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_75
Download citation
DOI: https://doi.org/10.1007/11424857_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25862-9
Online ISBN: 978-3-540-32045-6
eBook Packages: Computer ScienceComputer Science (R0)