Adaptive Security Modules in Incrementally Deployed Sensor Networks

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering, Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

4
Reader(s)
9
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 1 , ISSUE 1 (March 2008) > List of articles

Adaptive Security Modules in Incrementally Deployed Sensor Networks

Meng-Yen Hsieh * / Yueh-Min Huang *

Keywords : sensor network, authentication, security, incremental deployment, hierarchical architecture

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 1, Issue 1, Pages 70-86, DOI: https://doi.org/10.21307/ijssis-2017-279

License : (CC BY-NC-ND 4.0)

Published Online: 13-December-2017

ARTICLE

ABSTRACT

Distributed wireless sensor networks often suffer problems on detecting malicious nodes, which always bring destructive threats. Thus, sensor networks have to supply authentication services for sensor identity and data communication. As matter of fact, intrusion detection and prevention schemes are always integrated in sensor security appliances so that they can enhance network security by discovering malicious or compromised nodes. This paper provides adaptive security modules to improve secure communication in distributed sensor networks. The primary security module provides online identity authentication services to new incoming sensor nodes which being distributed after initial deployment. The advanced security module addresses compromised node detection issues to exclude internal compromised nodes. The proposed schemes can accomplish secure communications in the sensor networks when the network lifetime is divided into multiple time intervals. The network security and network performance are evaluated with the adaptive security modules, which shows efficient protection and sensible overheads to sensor nodes can be achieved.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no. 5, pp. 521-534 (2002).
[2] B. Doyle, S. Bell, A. F. Smeaton, K. McCusker, and N. O'Connor., “Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks”, The Computer Journal, vol. 49, no. 4, pp. 443-453 (2006).
[3] L.B. Oliveira, H.C. Wong, Antonio A. F. Loureiro, and Ricardo Dahab, “On the Design of Secure Protocols for Hierarchical Sensor Networks”, International Journal of Security and Networks, vol. 2, no.3/4, pp. 216-227 (2007).
[4] Y. P. Chen, A. L. Liestman, and J. Liu, “Clustering algorithms for ad hoc wireless networks”, Ad Hoc and Sensor Networks 2004.
[5] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks”, Proc. of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. (2000).
[6] C.C. Su, K.M. Chang, M.F. Horng, and Y.H. Kuo, “The New Intrusion Prevention and Detection Approaches for Clustering-based Sensor Networks”, IEEE Wireless Communications and Networking Conference, Mar. 2005.
[7] S. Sanyal el etc, “Security Scheme for Distributed DoS in Mobile Ad Hoc Networks”, Lecture Notes in Computer Science, vol. 3326, pp.541 (2004).
[8] I. Khalil, S. Bagchi, and N.B. Shroff, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Network”, International Conference on Dependable Systems and Networks (2005).
[9] K. Akkaya and M. Younis, “A Survey of Routing Protocols in Wireless Sensor Networks”, Elsevier Ad Hoc Network Journal, vol. 3/3 pp. 325-349 (2005).
[10] Q. Xue, and A. Ganz, "Runtime Security Composition for Sensor Networks", Proc. of IEEE Vehicular Technology Conference, Oct. (2003).
[11] M. Boghe, and W. Trappe, “An Authentication Framework for Hierarchical Ad Hoc Sensor Networks”, Proc. of the 2003 ACM Workshop on Wireless Security, pp. 79-87 (2003).

EXTRA FILES

COMMENTS