Abstract
Humans are constantly inventing new technologies to fulfil their needs. Wireless sensor networks (WSNs) are a still developing technology consisting of multifunction sensor nodes that are small in size and communicate wirelessly over short distances. Sensor nodes incorporate properties for sensing the environment, data processing and communication with other sensors. The unique properties of WSNs increase flexibility and reduce user involvement in operational tasks such as in battlefields. Wireless sensor networks can perform an important role in many applications, such as patient health monitoring, environmental observation and building intrusion surveillance. In the future WSNs will become an integral part of our lives. However along with unique and different facilities, WSNs present unique and different challenges compared to traditional networks. In particular, wireless sensor nodes are battery operated, often having limited energy and bandwidth available for communications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Saraogi: Security in Wireless Sensor Networks, Department of Computer Science University of Tennessee (2005)
I.F. Akyildiz, Y.S.W. Su, E. Cayirci: A survey on sensor networks, IEEE Commun. Mag. 40(8), 102–116 (2002)
J. Rabaey, J. Ammer, J.L. da Silva Jr., D. Patel: Pico-Radio: Ad-Hoc Wireless Networking of Ubiquitous Low Energy Sensor/Monitor Nodes, IEEE Computer Society Annual Workshop on VLSI (WVLSI) 2000, Orlanda (2000) pp. 9–12
J.P. Walters, Z. Liang, W. Shi, V. Chaudhary: Wireless Sensor Networks Security: A Survey. In: Security in Distributed, Grid, and Pervasive Computing, ed. by Y. Xiao (Auerbach Publications, Boca Raton 2007) pp. 367–410
Xbow. Available at: http://www.xbow.com/wirelesshome.aspx (last accessed 12/07/2007)
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: The Performance of Dynamic Group-Based Key Establishment (DGKE) under Node Capture Attacks in Wireless Sensor Networks, 2nd Conference on Advances in Computer Security and Forensics (ACSF) 2007, Liverpool (2007) pp. 12–13
T. Gao, D. Greenspan, M. Welsh, R.R. Juang, A. Alm: Vital Signs Monitoring and Patient Tracking over a Wireless Network, 27th IEEE EMBS Annual Int. Conference 2005 (2005) pp. 102–105
A. Cerpa, D. Estrin: ASCENT: Adaptive Self-Configuring sEnsor Networks Topologies, IEEE Trans. Mob. Comput. 3(3), 272–285 (2004)
H. Song, S. Zhu, G. Cao: SVATS: A Sensor-network-based Vehicle Anti-Theft System, IEEE INFOCOM 2008 (2008) pp. 2128–2136
K. Piotrowski, P. Langendoerfer, S. Peter: How Public Key Cryptography Influences Wireless Sensor Node Lifetime, 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2006 (2006) pp. 169–176
A. Cerpa, J. Elson, M. Hamilton, J. Zhao: Habitat Monitoring: Application Driver for Wireless Communications Technology, ACM SIGCOMM 2001, Costa Rica (2001) pp. 20–41
B. Halweil: Study finds modern farming is costly, World Watch 14, 910 (2001)
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Modelling Node Capture Attacks in Wireless Sensor Networks Using Simulation, 23rd Annual UK Performance Engineering Workshop 2007, Edge Hill University (2007) pp. 9–10
T. He, S. Krishnamurthy, J.A. Stankovic, T. Abdelzaher, R.S.L. Luo, T. Yan, L. Gu, G. Zhou, J. Hui, B. Krogh: VigilNet: An integrated sensor network system for energy-efficient surveillance, ACM Trans. Sens. Netw. 2(1), 1–38 (2006)
J. Stankovic: Wireless Sensor Networks. In: Handbook of Real-Time and Embedded Systems, ed. by I. Lee, J.Y.-T. Leung, S.H. Son (CRC Press, Boca Raton 2007)
VigilNet. Available at: http://www.cs.virginia.edu/wsn/vigilnet/ (last accessed 31/12/2006)
E. Biagioni, K. Bridges: The application of remote sensor technology to assist the recovery of rare and endangered species, Int. J. High Perform. Comput. Appl. 16(3), 315–324 (2002)
ALERT. Available at: http://www.alertsystems.org (last accessed 01/01/2007)
G. Werner-Allen, K. Lorincz, J. Johnson, J. Lees, M. Welsh: Fidelity and Yield in a Volcano Monitoring Sensor Network, 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI) 2006, Seattle (2006) pp. 381–396
G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Welsh: Deploying a wireless sensor network on an active volcano, IEEE Internet Comput. 10(2), 18–25 (2006)
Volcano monitoring. Available at: http://www.eecs.harvard.edu/Â mdw/proj/volcano/ (last accessed 10/1/2007)
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, D. Rubenstein: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet, 10th Int. Conference on Architectural Support for Programming Languages and Operating Systems 2002, San Jose (2002) pp. 96–107
ZebraNet. Available at: http://www.princeton.edu/Â mrm/zebranet.html (last accessed 3/11/2006)
C. Hartung, S. Holbrook, R. Han, C. Seielstad: FireWxNet: A Multi-Tiered Portable Wireless System for Monitoring Weather Conditions in Wildland Fire Environments, 4th Int. Conference on Mobile Systems, Applications and Services (MobiSys), 2006 (2006) pp. 28–41
S. Patel, K. Lorincz, R. Hughes, N. Huggins, J.H. Growdon, M. Welsh, P. Bonato: Analysis of Feature Space for Monitoring Persons with Parkinson’s Disease with Application to a Wireless Wearable Sensor System, 29th IEEE EMBS Annual Int. Conference 2007, Lyon (2007) pp. 6290–6293
T. Gao, T. Massey, L. Selavo, M. Welsh, M. Sarrafzadeh: Participatory User Centered Design Techniques for a Large Scale Ad-Hoc Health Information System, 1st Int. Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments (HealthNet) 2007, San Juan (2007) pp. 43–48
T. Gao, D. Greenspan, M. Welsh: Improving Patient Monitoring and Tracking in Emergency Response, Int. Conference on Information Communication Technologies in Health 2005 (2005)
D. Malan, T.R.F. Fulford-Jones, M. Welsh, S. Moulton: CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care, MobiSys Workshop on Applications of Mobile Embedded Systems (WAMES) 2004, Boston (2004) pp. 12–14
N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron: Monitoring behaviour in home using a smart fall sensor, IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology 2000 (2000) pp. 607–610
E. Jovanov, A. Milenkovic, C. Otto, P.C. de Groen: A wireless body area network of intelligent motion sensors for computer assisted physical rehabilitation, J. Neuro Eng. Rehabil. 2(6), 18–29 (2005)
J. Welch, F. Guilak, S.D. Baker: A Wireless ECG Smart Sensor for Broad Application in Life Threatening Event Detection, 26th Annual Int. Conference of the IEEE Engineering in Medicine and Biology Society 2004, San Francisco (2004) pp. 3447–3449
A. Milenkovic, C. Otto, E. Jovanov: Wireless sensor networks for personal health monitoring: issues and an implementation, Comput. Commun. 29(13/14), 2521–2533 (2006)
A. Wood, G. Virone, T. Doan, Q. Cao, L. Selavo, Y. Wu, L. Fang, Z. He, S. Lin, J. Stankovic: ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring, Department of Computer Science, University of Virginia (2006)
G. Virone, T. Doan, A. Wood, J.A. Stankovic: Dynamic Privacy in Assisted Living and Home Health Care, Joint Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability 2007 (2007)
AlarmNet. Available at: http://www.cs.virginia.edu/wsn/medical/ (last accessed 10/1/2007)
H. Callaway: Wireless Sensor Networks: Architectures and Protocols, 0849318238, 9780849318238 (CRC Press, Boca Raton 2003)
M. Demirbas: Scalable design of fault-tolerance for wireless sensor networks, Ph.D. Thesis (Ohio State University, Columbus, OH 2004)
F. Koushanfar, M. Potkonjak, A. Sangiovanni-Vincentelli: Fault-Tolerance in Sensor Networks. In: Handbook of Sensor Networks, Vol. 36, ed. by I. Mahgoub, M. Ilyas (CRC Press, Boca Raton 2004)
E. Shih, S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan: Physical layer driven protocol and algorithm design for energy-efficient Wireless Sensor Networks, ACM MobiCom 2001, Rome (2001) pp. 272–286
J.N. Al-Karaki, A.E. Kamal: Routing techniques in wireless sensor networks: A survey, IEEE Wirel. Commun. 11(6), 6–28 (2004)
F. Ye, H. Luo, J. Cheng, S. Lu, L. Zhang: A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Networks, ACM/IEEE MOBICOM 2002 (2002) pp. 148–159
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Security in Mobile Wireless Sensor Networks, 8th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet) 2007, Liverpool (2007) pp. 28–29
N. Bulusu, D. Estrin, L. Girod, J. Heidemann: Scalable coordination for Wireless Sensor Networks: self- configuring localization systems, in International Symposium on Communication Theory and Applications 2001, Ambleside (2001)
G.J. Pottie, W.J. Kaiser: Wireless integrated network sensors, Commun. ACM 43(5), 551–558 (2000)
J.M. Kahn, R.H. Katz, K.S.J. Pister: Next Century Challenges: Mobile Networking For Smart Dust, ACM MobiCom 1999, Washington (1999) pp. 271–278
A. Rowe, R. Mangharam, R. Rajkumar: RT-Link: A global time-synchronized link protocol for sensor networks, Elsevier Ad hoc Netw. 6(8), 1201–1220 (2008)
E. Farrugia, R. Simon: An efficient and secure protocol for sensor network time synchronization, J. Syst. Softw. 79(2), 147–162 (2006)
S. Wu, K.S. Candan: Demand-scalable geographic multicasting in wireless sensor networks, Comput. Commun. 33(14–15), 2931–2953 (2007)
Y. Wang, J. Gao, J.S.B. Mitchell: Boundary Recognition in Sensor Networks by Topological Methods, 12th Annual Int. Conference on Mobile Computing and Networking (MobiCom) 2006 (2006) pp. 122–133
E. Shi, A. Perrig: Designing secure sensor networks, Wirel. Commun. Mag. 11(6), 38–43 (2004)
D. W. Carman, P.S. Krus, B.J. Matt: Constraints and Approaches for Distributed Sensor Network Security, Technical Report 00-010, NAI Labs, Network Associates, Inc, Glenwood, MD, Iss., 2000.
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler: Spins: Security protocols for sensor networks, Wirel. Netw. 8(5), 521–534 (2002)
D. Liu, P. Ning, S. Zhu, S. Jajodia: Practical Broadcast Authentication in Sensor Networks, 2nd Annual Int. Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous) 2005 (2005) pp. 118–129
D. Liu, P. Ning: Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks, 10th Annual Network and Distributed System Security Symposium 2003 (2003) pp. 263–276
D. Liu, P. Ning: Multilevel μTesla: broadcast authentication for distributed sensor networks, Trans. Embed. Comput. Syst. 3(4), 800–836 (2004)
N. Engelbrecht, W.T. Penzhorn: Secure Authentication Protocols Used for Low Power Wireless Sensor Networks, IEEE International Symposiumon 2005 (2005) pp. 1777–1782
Z. Benenson, N. Gedicke, O. Raivio: Realizing Robust User Authentication in Sensor Networks, Workshop on Real-World Wireless Sensor Networks (REALWSN) 2005 (2005) pp. 20–21
P. Nicopolitidis, M.S. Obaidat, G.I. Papadimitriou, A.S. Pomportsis: Wireless Networks, Vol. 2 (Wiley, West Sussex, UK 2003)
FunctionX. Computer Networks. Available at: http://www.functionx.com/networking/Lesson01.htm (last accessed 9/8/2005)
Y. Xu, J. Heidemann, D. Estrin: Geography-informed Energy Conservation for Ad Hoc Routing, Mobicom 2001 (2001) pp. 70–84
T. Karygiannis, L. Owens: Wireless Network Security: 802.11, Bluetooth, and Handheld Devices, NIST (2002)
M. Langheinrich: A Privacy Awareness System for Ubiquitous Computing Environments, 4th Int. Conference on Ubiquitous Computing 2002 (2002)
E. Snekkenes: Concepts for Personal Location Privacy Policies, 3rd ACM Conference on Electronic Commerce 2001 (ACM Press, New York, USA 2001) pp. 48–57
S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, J. Tang: Framework for Security And Privacy In Automotive Telematics, 2nd ACM Int. Workshop on Mobile Commerce 2002 (2002) pp. 25–32
L. Sweeney: Achieving k-anonymity privacy protection using generalization and suppression, Int. J. Uncertain. Fuzziness Knowl.-based Syst. 10(5), 571–588 (2002)
M. Gruteser, G. Schelle, A. Jain, R. Han, D. Grunwald: Privacy-Aware Location Sensor Networks, 9th Conference on Hot Topics in Operating Systems 2003 (2003) pp. 28–28
C. Karlof, D. Wagner: Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s Ad Hoc Net. J. 1(1), 293–315 (2003)
I. Ahmed: Efficient key management for wireless sensor networks, M.Sc. Thesis (Hope University, Liverpool, 2006)
W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan: Energy Efficient Communication Protocol for Wireless Microsensor Networks, Hawaiian Int. Conference On Systems Science 2000 (2000)
M. Saxena: Security in Wireless Sensor Networks – A Layer based Classification, CERIAS Technical Report (2007)
H. Alzaid, E. Foo, J.M.G. Nieto: Secure data aggregation in wireless sensor network: A survey, Proc. 6th Australasian conference on Information security 2008, Wollongong (2008) pp. 93–105
C.Y. Wen, W.A. Sethares: Adaptive Decentralized Re-Clustering For Wireless Sensor Networks, SMC 2006, Taipei (2006) pp. 2709–2716
S. Vasudevan, B. DeCleene, N. Immerman, J.F. Kurose, D.F. Towsley: Leader Election Algorithms for Wireless Ad Hoc Networks, DISCEX 2003 (2003) pp. 261–272
IDs. Available at: http://searchsecurity.techtarget.com (last accessed 10/12/2006)
F. Freiling, I. Krontiris, T. Dimitriou: Towards Intrusion Detection in Wireless Sensor Networks, 13th European Wireless Conference 2007, Paris (2007)
C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann: Impact of Network Density on Data Aggregation in Wireless Sensor Networks, 22nd Int. Conference on Distributed Computing Systems, Vienna, Austria, 2002 (2002) pp. 457–458
S. Madden, M.J. Franklin, J.M. Hellerstein, W. Hong: TAG: A tiny aggregation service for ad-hoc sensor networks, SIGOPS Oper. Syst. Rev. 36(SI), 131–146 (2002)
Y. Yao, J. Gehrke: The COUGAR approach to in-network query processing in sensor networks, SIGMOD Rec. 31(3), 9–18 (2002)
H. Chan, A. Perrig, D. Song: Secure Hierarchical In-Network Aggregation in Sensor Networks, 13th ACM Conference on Computer and communications Security 2006, Alexandria (2006) pp. 278–287
A. Deshpande, S. Nath, P.B. Gibbons, S. Seshan: Cache-and-Query for Wide Area Sensor Databases, Int. Conference on Management of Data SIGMOD 2003, San Diego (2003) pp. 503–514
C. Castelluccia, E. Mykletun, G. Tsudik: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks, 2nd Annual Int. Conference on Mobile and Ubiquitous Systems 2005 (2005) pp. 109–117
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Applying Secure Data Aggregation Techniques for a Structure and Density Independent Group Based Key Management Protocol, 3rd IEEE Int. Symposium on Information Assurance and Security (IAS) 2007, Manchester (2007) pp. 44–49
L. Hu, D. Evans: Secure Aggregation for Wireless Networks, Workshop on Security and Assurance in Ad hoc Networks 2003 (2003) pp. 384–391
P. Jadia, A. Mathuria: Efficient Secure Aggregation In Sensor Networks, 11th Int. Conference on High Performance Computing 2004 (2004)
B. Przydatek, D. Song, A. Perrig: SIA: Secure Information Aggregation In Sensor Networks, 1st Int. Conference on Embedded Networked Sensor Systems 2003 (2003) pp. 255–265
Y. Yang, X. Wang, S. Zhu, G. Cao: SDAP: A secure hop-by-hop data aggregation protocol for sensor networks, ACM Trans. Inf. Syst. Secur. 11(4), 1–43 (2008)
J. Girao, M. Schneider, D. Westhoff: CDA: Concealed Data Aggregation in Wireless Sensor Networks, ACM Workshop on Wireless Security 2004 (2004)
H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli: Energy-efficient secure pattern based data aggregation for wireless sensor networks, Comput. Commun. 29, 446–455 (2006)
B. Krebs: A Short History of Computer Viruses and Attacks. Available at: http://www.washingtonpost.com/ac2/wp-dyn/A50636-2002Jun26 (last accessed 12/10/2007)
The History of Computer Viruses. Available at: http://www.virus-scan-software.com/virus-scan-help/answers/the-history-of-computer-viruses.shtml (last accessed 12/10/2007)
P. Innella: A Brief History of Network Security and the Need for Host Based Intrusion Detection. Available at: http://www.tdisecurity.com/resources/ (last accessed 01/10/2007)
T. Roosta, S. Shieh, S. Sastry: Taxonomy of Security Attacks in Sensor Networks, 1st IEEE Int. Conference on System Integration and Reliability Improvements 2006, Hanoi (2006) pp. 13–15
A. Becher, Z. Benenson, M. Dornseif: Tampering with Motes: Real-world Physical Attacks on Wireless Sensor Networks, Int. Conference on Security in Pervasive Computing (SPC) 2006 (2006) pp. 104–118
L. Eschenauer, V. Gligor: A Key Management Scheme for Distributed Sensor Networks, 9th ACM Conference on Computer and Communication Security 2002 (2002) pp. 41–47
A. Hac: Wireless Sensor Networks Design (Wiley, UK 2003)
D. Liu, P. Ning, W. Du: Group-Based Key Pre-Distribution in Wireless Sensor Networks, ACM Workshop on Wireless Security (WiSe) 2005 (2005) pp. 11–20
H. Chan, A. Perrig, D. Song: Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Research in Security and Privacy 2003 (2003) pp. 197–213
H. Chan, A. Perrig: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks, INFOCOM 2005 (2005) pp. 524–535
M. Eltoweissy, A. Wadaa, S. Olariu, L. Wilson: Group key management scheme for large-scale sensor networks, Elsevier Ad Hoc Netw. 3(5), 668–688 (2004)
W. Du, J. Deng, Y.S. Han, S. Chen, P. Varshney: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, IEEE INFOCOM 2004 (2004)
D. Huang, M. Mehta, D. Medhi, L. Harn: Location-Aware Key Management Scheme for Wireless Sensor Networks, 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) 2004 (2004) pp. 29–42
L. Zhou, J. Ni, C.V. Ravishankar: Efficient Key Establishment for Group-Based Wireless Sensor Deployments, WiSe 2005 (2005) pp. 1–10
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Application independent dynamic group-based key establishment for large-scale wireless sensor networks, China Commun. 4(1), 14–27 (2007)
C.C. Tiu: A new frequency-based side channel attack for embedded systems, M.Sc. Thesis (University of Waterloo, Waterloo, ON, Canada, 2005)
P. Kocher, J. Jaffe, B. Jun: Differential Power Analysis. In: Advances in Cryptography – CRYPTO’99, Lecture Notes in Computer Science, Vol. 1666, ed. by M. Wiener (Springer, Berlin Heidelberg 1999) pp. 388–397
D. Agrawal, B. Archambeault, J. R. Rao, P. Rohatgi: The EM Side-Channel (s): Attacks and Assessment Methodologies, IBM (2002)
K. Okeya, T. Iwata: Side channel attacks on message authentication codes, IPSJ Digit. Cour. 2, 478–488 (2006)
C. Karlof, N. Sastry, D. Wagner: Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks, 2nd ACM Conference on Embedded Networked Sensor Systems 2004 (2004) pp. 162–175
A. Perrig, D. Wagner, J. Stankovic: Security in wireless sensor networks, Commun. ACM 47(6), 53–57 (2004)
M. Krishnan: Intrusion Detection in Wireless Sensor Networks, Department of EECS, University of California at Berkeley (2006)
R. Muraleedharan, L.A. Osadciw: Cross Layer Protocols in Wireless Sensor Networks (Poster), IEEE Infocomm Student Workshop 2006 (2006)
A.D. Wood, J.A. Stankovic: Denial of service in sensor networks, IEEE Comput. 35(10), 54–62 (2002)
A.D. Wood, J.A. Stankovic: A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks. In: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, ed. by M. Ilyas, I. Mahgoub (CRC Press, Boca Raton, FL, USA 2005)
J. Regehr, N. Cooprider, W. Archer, E. Eide: Memory Safety and Untrusted Extensions for Tinyos, School of Computing, University of Utah (2006)
N. Cooprider, W. Archer, E. Eide, D. Gay, J. Regehr: Efficient Memory Safety for TinyOS, 5th ACM Conference on Embedded Networked Sensor Systems (SenSys) 2007, Sydney (2007) pp. 205–218
J. Hill, P. Bounadonna, D. Culler: Active Message Communication for Tiny Network Sensors, UC Berkeley, Berkeley (2001)
M. Shaneck, K. Mahadevan, V. Kher, Y. Kim: Remote Software-Based Attestation for Wireless Sensors, 2nd European Workshop on Security and Privacy in Ad Hoc and Sensor Networks 2005 (2005) pp. 27–41
A. Perrig, J. Newsome, E. Shi, D. Song: The Sybil Attack in Sensor Networks: Analysis and Defences, 3rd Int. Symposium on Information Processing in Sensor Networks 2004 (ACM Press, New York, USA 2004) pp. 259–268
D. Raffo: Security Schemes for the OLSR Protocol for Ad Hoc Networks, University of Paris (2005), Chap. 3
Y.-C. Hu, A. Perrig, D.B. Johnson: Adriane: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Annual ACM Int. Conference on Mobile Computing and Networking (MobiCom) 2002 (2002)
Y.-C. Hu, A. Perrig, D.B. Johnson: Packet Leashes: A Defence Against Wormhole Attacks in Wireless Ad Hoc Networks, 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 2003, San Francisco (2003) pp. 1976–1986
B. Yu, B. Xiao: Detecting Selective Forwarding Attacks in Wireless Sensor Networks, 20th Int. Parallel and Distributed Processing Symposium IPDPS 2006, Greece (2006) pp. 1–8
A.A. Pirzada, C. McDonald: Circumventing Sinkholes and Wormholes in Wireless Sensor Networks, Int. Workshop on Wireless Ad-hoc Networks 2005 (2005)
S. Datema: A case study of wireless sensor network attacks, M.Sc. Thesis (Delft University, Delft, The Netherlands 2005)
J. Deng, R. Han, S. Mishra: Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks, First IEEE/Cerate Net Conference on Security and Privacy in Communication Networks (SecureComm) 2005, Athens (2005) pp. 113–124
K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Group-based secure communication for large scale wireless sensor networks, J. Inf. Assur. Secur. 2(2), 139–147 (2007)
H. Yang, H.Y. Luo, F. Ye, S.W. Lu, L. Zhang: Security in mobile ad hoc networks: challenges and solutions, IEEE Wirel. Commun. 11(1), 38–47 (2004)
H. Fu, S. Kawamura, M. Zhang, L. Zhang: Replication attack on random key pre-distribution schemes for wireless sensor networks, Comput. Commun. 31(4), 842–857 (2008)
H. Fu, S. Kawamura, M. Zhang, L. Zhang: Replication Attack on Random Key Pre-Distribution Schemes for Wireless Sensor Networks, IEEE Workshop on Information Assurance and Security 2005, US Military Academy, West Point (2005) pp. 134–141
D. Liu, P. Ning: Establishing Pairwise Keys in Distributed Sensor Networks, 10th ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 52–61
W. Du, J. Deng, Y. Han, P. Varshney: A Pairwise Key Pre-Distribution Scheme For Wireless Sensor Networks, 10th ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 42–51
W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, A. Khalili: A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)
B. Parno, A. Perrig, V. Gligor: Distributed Detection of Node Replication Attacks in Sensor Networks, IEEE Symposium on Security and Privacy 2005, Oakland (2005) pp. 49–63
Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, M. Galloway: A survey of key management schemes in wireless sensor Networks, Comput. Commun. 30(11–12), 2314–2341 (2007)
P. Ning, R. Li, D. Liu: Establishing pairwise keys in distributed sensor networks, ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)
F. Anjum: Location dependent key management using random key predistribution in sensor networks, WiSe 2006, 21–30 (2006)
X. Du, Y. Xiao, M. Guizani, H.H. Chen: An effective key management scheme for heterogeneous sensor networks, Elsevier Ad Hoc Netw. 5(1), 24–34 (2007)
B.C. Lai, S. Kim, I. Verbauwhede: Scalable Session Key Construction Protocol For Wireless Sensor Networks, IEEE Workshop on Large Scale Real-Time and Embedded Systems (LARTES) 2002 (2002)
RSA. Available at: http://www.rsasecurity.com/rsalabs/ (last accessed 2/2/2006)
R.D. Pietro, L.V. Mancini, S. Jajodia: Providing secrecy in key management protocols for large wireless sensors networks, Ad Hoc Netw. 1(4), 455–468 (2003)
S. Zhu, S. Setia, S. Jajodia: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, ACM Conference on Computer and Communications Security (CCS) 2003, Washington D.C. (2003) pp. 62–72
G. Jolly, M.C. Kuscu, P. Kokate, M. Younis: A Low-Energy Key Management Protocol for Wireless Sensor Networks, IEEE Symposium on Computers and Communications (ISCC) 2003, Kemer – Antalya (2003) pp. 335–340
M. Bohge, W. Trappe: An Authentication Framework for Hierarchical Ad Hoc Sensor Networks, 2nd ACM workshop on Wireless security (WiSe) 2003 (2003) pp. 79–87
M.F. Younis, K. Ghumman, M. Eltoweissy: Location-aware combinatorial key management scheme for clustered sensor networks, IEEE Trans. Parallel Distrib. Syst. 17(8), 865–882 (2006)
X. Du, M. Guizani, Y. Xiao, S. Ci, H.H. Chen: A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2007)
S. Hussain, F. Kausar, A. Masood: An Efficient Key Distribution Scheme for Heterogeneous Sensor Networks, ACM Int. Conference on Wireless communications and Mobile Computing (IWCMC) 2007 (2007) pp. 388–392
P. Traynor, H. Choi, G. Cao, S. Zhu, T. Porta: Establishing Pair-Wise Keys In Heterogeneous Sensor Networks, IEEE INFOCOM 2006 (2006) pp. 1–12
C.S. Raghavendra, K.M. Sivalingam, T. Znati: Wireless Sensor Networks (Springer, New York, USA 2004)
Homomorphic Encryption. Available at: http://en.wikipedia.org/wiki/Homomorphic_encryption (last accessed 01/03/2007)
B. Schneier: Secret and Lies, Digital Security in a Networked World (Wiley, UK 2000)
N. Wang, S. Fang: A hierarchical key management scheme for secure group communications in mobile ad hoc networks, J. Syst. Softw. 80(10), 1667–1677 (2007)
B. Wu, J. Wu, E.B. Fernandez, M. Ilyas, S. Magliveras: Secure and efficient key management in mobile ad hoc networks, J. Netw. Comput. Appl. 30(3), 937–954 (2007)
J. Cho, I. Chen, D. Wang: Performance optimization of region-based group key management in mobile ad hoc networks, Perform. Evaluation 65(5), 319–344 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kifayat, K., Merabti, M., Shi, Q., Llewellyn-Jones, D. (2010). Security in Wireless Sensor Networks. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)