Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/986858.986870acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Security support for in-network processing in Wireless Sensor Networks

Published: 31 October 2003 Publication History

Abstract

The benefits of in-network processing for wireless sensor networks include improved scalability, prolonged lifetime, and increased versatility. This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes. Security mechanisms are proposed to address the downstream requirement that sensor nodes authenticate commands disseminated from parent aggregators. Conversely, security mechanisms are also proposed to address the upstream requirement that aggregators authenticate data produced by sensors before aggregating. Simulation results in ns2 of the proposed mechanisms for secure in-network processing are presented, as well as implementation on a mote testbed.

References

[1]
H. Abrach, S. Bhatti, J. Carlson, H. Dui, J. Rose, A. Sheth, B. Shucker, J. Deng, R. Han, "MANTIS: System Support for Multimodal Networks of In-Situ Sensors", In Proc. of 2nd ACM Workshop on Wireless Sensor Networks and Applications (WSNA'03), San Diego, CA, Sep, 2003.
[2]
ARGUS Advanced Remote Ground Unattended Sensor Systems, Department of Defense, U.S. Air Force, http://www.globalsecurity.org/intell/systems/arguss.htm.
[3]
B. J. Bonfils, P. Bonnet, "Adaptive and Decentralized Operator Placement for In-Network Query Processing", IPSN'03, Apri1, 2003.
[4]
N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", ACM MobiCom 2001, pp. 180--188.
[5]
H. Chan, A. Perrig, D. Song, "Random Key Predistribution Schemes for Sensor Networks", Appears in IEEE Symposium on Security and Privacy 2003.
[6]
Cougar Project: http://cougar.cs.cornell.edu
[7]
J. Deng, R. Han and S. Mishra, "The Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks", In Proc. of IEEE 2nd International Workshop on Information Processing in Sensor Networks, IPSN'03, LNCS 2634.
[8]
J. Douceur, "the Sybil Attack," In Proc. of the IPTPS02 Workshop, Cambridge, MA (USA), March 2002.
[9]
L. Eschenauer, V. D. Gigor, "A Key-Management Scheme for Distributed Sensor Networks", Conference on Computer and Communications Security, CCS'O2, Washington DC, USA, November, 2002.
[10]
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Cullar, K. Pister, "System architecture directions for network sensors", ASPLOS 2000, Cambridge, November 2000.
[11]
Y. C. Hu, A. Perrig, D. B. Johnson, "Efficient Security Mechanisms for Routing Protocols", In Proc. of the Tenth Annual Network and Distributed System Security Symposium, NDSS'O3, San Diego, CA, February 2003.
[12]
Y. C. Hu, A. Perrig, D. B. Johnson, " Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols". In Proc. of 2nd ACM Workshop on Wireless Security (WiSe'03), San Diego, CA, Sep, 2003.
[13]
C. Intanagonwiwat, R. Govindan, D. Estrin, "Directed Diffusion: A Scalable and Robuts Communication Paradigm for Sensor Networks," 6th Conf. on Mobile Computing and Networking, August, 2000, USA.
[14]
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures", First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.
[15]
J. Kong, H. Luo, K. Xu. D. Gu, M. Gerla and S. Lu, "Adaptive Security for Multi-layer Ad Hoc Networks," Special Issue of Wireless Communications and Mobile Computing". August, 2002.
[16]
R. Kumar, V. Tsiatsis, M. Srivastava. "Computation Hierarchy for In-network Processing", In Proc. of 2nd ACM International Workshop on Wireless Sensor Networks & Applications (WSNA'03), San Diego, CA. Sep, 2003.
[17]
L. Lamport, "Constructing digital signatures from one-way function", technical report SRI-CSL-98, SRI International, Oct 1979.
[18]
L. Lamport, "Password Authentication with Insecure Communication", Communication of the ACM, 24:11, Nov 1981.
[19]
J. Liu, J. E. Riech, and F. Zhao. "Collaborative in-network processing for target tracking", EURASIP, Journal on Applied Signal Processing, March, 2003.
[20]
D. Liu and P. Ning, "Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks", The 10th Annual Network and Distributed System Security Symposium. San Diego, California. February 2003.
[21]
L. Lazos, R. Poovendran. "Energy-aware secure multicast communication in ad-hoc networks using geographic location information", ICASSP 2003, Hong Kong, China, April 2003.
[22]
H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang, "Self-securing Ad Hoc Wireless Networks." IEEE ISCC 2002, Italy, July 2002.
[23]
S. Madden. M. Franklin, J. Hellerstein, and W. Hong. "TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks", OSDI, December 2002.
[24]
F. Martin, B. Mikhak, and B. Silverman, "MetaCricket: A designer's kit for making computational devices", IBM Systems Journal, vol. 39, 2000.
[25]
A. Mainwaring, J. Polastre, R. Szewczyk D. Culler, J. Anderson, "Wireless Sensor Networks for Habitat Monitoring", First ACM Workshop on Wireless Sensor Networks and Applications (WSNA) 2002. pp. 88--97.
[26]
A. J. Menezes, P. C. Oorschot, S. A. Vanstone, "Handbook of Applied Cryptography", CRC Press LLC, 1996.
[27]
NAI Lab Report, http://www.nai.com/nai_labs/asp_set/crypto/crypt_senseit.asp.
[28]
R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM 21(12), December 1978.
[29]
NS2 web site, http://www.isi.edu/nsnam/ns
[30]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, "SPINS: Security Protocols for Sensor Networks", Wireless Networks Journal(WINET), 8(5):521--534, Sep 2002.
[31]
B. Przydatek, D. Song and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks", To Appear in ACM SenSys'03, Los Angeles, CA, Nov, 2003.
[32]
K. Sanzgiri. B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks", In Proc. of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002.
[33]
S. Slijepcevic, V. Tsiatsis, S. Zimbeck, "On Communication Security in Wireless Ad-Hoc Sensor Networks", Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'02). June 2002, USA.
[34]
TinyOS: http://www.cs.berkeley.edu/tos
[35]
TinySec: http://www.cs.berkeley.edu/~nks/tinysec/
[36]
A. Wood, J. A. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer, 35(10):54--62, October 2002.
[37]
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, vol. 13, no.6, November/December 1999.
[38]
D. Bruschi, E. Rosti, "Secure multicast in wireless networks of mobile hosts: protocols and issue", ACM/Baltzer Mobile networks and applications, special issue on Multipoint Communication in Wireless Mobile Networks, Vol. 6, No. 7, December 2002.
[39]
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein, "Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with zebranet", ASPLOS-X conference, Oct. 2002.
[40]
H. Wang, J. Elson, L. Girod, D. Estrin, and K. Yao, "Target Classification and Localization in Habitat Monitoring", In Proc. of IEEE international Conference on Acoustics, Speech, and Signal Processing(ICASSP 2003), Hong Kong, China, April 2003.
[41]
Y. J. Zhao, R. Govindan, and D. Estrin, "Computing Aggregates for Monitoring Wireless Sensor Networks", The First IEEE International Workshop on Sensor Network Protocols and Applications (SNPA'03), Anchorage, AK, USA. May 11, 2003

Cited By

View all

Index Terms

  1. Security support for in-network processing in Wireless Sensor Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
      October 2003
      154 pages
      ISBN:1581137834
      DOI:10.1145/986858
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 31 October 2003

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. in-network processing
      2. security mechanisms
      3. sensor networks

      Qualifiers

      • Article

      Conference

      CCS03
      Sponsor:

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Security and privacy in the Internet of Things: threats and challengesService Oriented Computing and Applications10.1007/s11761-021-00327-zOnline publication date: 1-Oct-2021
      • (2016)Efficient Tag Path Authentication Protocol with Less Tag MemoryInformation Security Practice and Experience10.1007/978-3-319-49151-6_18(255-270)Online publication date: 5-Nov-2016
      • (2012)A survivability model in wireless sensor networksComputers & Mathematics with Applications10.1016/j.camwa.2012.02.02764:12(3666-3682)Online publication date: 1-Dec-2012
      • (2011)A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network EnvironmentProceedings of the 2011 International Conference on Ubiquitous Computing and Multimedia Applications10.1109/UCMA.2011.12(15-19)Online publication date: 13-Apr-2011
      • (2011)Security of Wireless Sensor NetworksProceedings of the 2011 Eighth International Conference on Information Technology: New Generations10.1109/ITNG.2011.62(315-320)Online publication date: 11-Apr-2011
      • (2011)Fine-grained data access control for distributed sensor networksWireless Networks10.1007/s11276-011-0345-817:5(1235-1249)Online publication date: 1-Jul-2011
      • (2011)Research on the Security Strategy for Wireless Sensor NetworksApplied Informatics and Communication10.1007/978-3-642-23223-7_20(157-164)Online publication date: 2011
      • (2011)Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network EnvironmentUbiquitous Computing and Multimedia Applications10.1007/978-3-642-20975-8_35(336-349)Online publication date: 2011
      • (2010)Privacy Preserving Data Aggregation in Wireless Sensor NetworksProceedings of the 2010 6th International Conference on Wireless and Mobile Communications10.1109/ICWMC.2010.77(435-440)Online publication date: 20-Sep-2010
      • (2009)Hiberarchy cluster model and key management in wireless sensor networkProceedings of the 5th International Conference on Wireless communications, networking and mobile computing10.5555/1737966.1738341(3590-3593)Online publication date: 24-Sep-2009
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media