Results 1 - 10
of
80
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
, 2007
"... ..."
A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes.
- Journal of Mobile Networks and Applications,
, 2007
"... Abstract In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as ..."
Abstract
-
Cited by 23 (0 self)
- Add to MetaCart
(Show Context)
Abstract In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost. Nevertheless, these nodes must be able to run cryptographic operations based on primitives such as hash functions, symmetric encryption and public key cryptography in order to allow the creation of secure services. Our objective in this paper is to survey how the existing research-based and commercial-based sensor nodes are suitable for this purpose, analyzing how the hardware can influence the provision of the primitives and how software implementations tackles the task of implementing instances of those primitives. As a result, it will be possible to evaluate the influence of provision of security in the protocols and applications/scenarios where sensors can be used.
Maximum Damage Malware Attack in Mobile Wireless Networks
"... Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this security threat, we seek to quantify the maximum damage inflicted on the system owing to such outbreaks and identify the most ..."
Abstract
-
Cited by 14 (2 self)
- Add to MetaCart
(Show Context)
Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this security threat, we seek to quantify the maximum damage inflicted on the system owing to such outbreaks and identify the most vicious attacks. We represent the propagation of malware in a battery-constrained mobile wireless network by an epidemic model in which the worm can dynamically control the rate at which it kills the infected node and also the transmission range and/or the media scanning rate. At each moment of time, the worm at each node faces the following trade-offs: (i) using larger transmission range and media scanning rate to accelerate its spread at the cost of exhausting the battery and thereby reducing the overall infection propagation rate in the long run or (ii) killing the node to inflict a large cost on the network, however at the expense of loosing the chance of infecting more susceptible nodes at later times. We mathematically formulate the decision problems and utilize Pontryagin Maximum Principle from optimal control theory to quantify the damage that the malware can inflict on the network by deploying optimum decision rules. Next, we establish structural properties of the optimal strategy of the attacker over time. Specifically, we prove that it is optimal for the attacker to defer killing of the infective nodes in the propagation phase until reaching a certain time and then start the slaughter with maximum effort. We also show that in the optimal attack policy, the battery resources are used according to a decreasing function of time, i.e., mostly during the initial phase of the outbreak. Finally, our numerical investigations reveal a framework for identifying intelligent defense strategies that can limit the damage by appropriately selecting network parameters.
A survey on network security and attack defense mechanism for wireless sensor networks.
- Int. J. Comput. Trends Tech,
, 2011
"... Abstract: The severe constraints and demanding deployment environments of wireless sensor networks make security for these systems more challenging than for conventional networks. However, several properties of sensor networks may help address the challenge of building secure networks. The unique a ..."
Abstract
-
Cited by 10 (0 self)
- Add to MetaCart
(Show Context)
Abstract: The severe constraints and demanding deployment environments of wireless sensor networks make security for these systems more challenging than for conventional networks. However, several properties of sensor networks may help address the challenge of building secure networks. The unique aspects of sensor networks may allow novel defenses not available in conventional networks. In this paper, we investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks.
Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives
, 2010
"... future internet ..."
(Show Context)
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
"... This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
This paper introduces the security and trust concepts in wireless sensor networks and explains the difference between them, stating that even though both terms are used interchangeably when defining a secure system, they are not the same. The difference between reputation and trust is also explained, highlighting that reputation partially affects trust. A survey of trust and reputation systems in various domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely related to each other and to our research interests. The methodologies used to model trust and their references are presented. The factors affecting trust updating are summarised and some examples of the systems in which these factors have been implemented are given. The survey states that, even though researchers have started to explore the issue of trust in wireless sensor networks, they are still examining the trust associated with routing messages between nodes (binary events). However, wireless sensor networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads to the development of new trust models addressing the continuous data issue and also to combine the data trust and the communication trust to infer the total trust.
Situation Awareness Mechanisms for Wireless Sensor Networks
- IEEE Commun. Mag
"... Abstract A wireless sensor network is supposed to be able to operate for long periods of time with little or no external management. There is a requirement for this autonomy: the sensor nodes must be able to configure themselves in presence of adverse situations. Therefore, the nodes should make us ..."
Abstract
-
Cited by 8 (1 self)
- Add to MetaCart
(Show Context)
Abstract A wireless sensor network is supposed to be able to operate for long periods of time with little or no external management. There is a requirement for this autonomy: the sensor nodes must be able to configure themselves in presence of adverse situations. Therefore, the nodes should make use of situation awareness mechanisms in order to determine the existence of abnormal events in their surroundings. This work approaches the problem by considering the possible abnormal events as diseases, thus making possible to diagnose them through their symptoms, i.e. their side effects. Considering these awareness mechanisms as a foundation for high-level monitoring services, this article also shows how these mechanisms are included into the blueprint of an intrusion detection system.
Featuring trust and reputation management systems for constrained hardware devices
- In: Proceedings of the 1st international
, 2007
"... Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the topic general features of how these systems should be are not clearly identified. In this paper we try to identify the ma ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
(Show Context)
Research on trust management systems for wireless sensor networks is still at a very early stage and few works have done so far. It seems that for those works which deal with the topic general features of how these systems should be are not clearly identified. In this paper we try to identify the main features that a trust management system should have and justify their importance for future developments.
Robust time-based localization for asynchronous networks
- IEEE Trans. Signal Process
"... Abstract—Localization is indispensable for the successful de-ployment of wireless sensor networks (WSNs). Time-based lo-calization approaches attract a lot of interest due to their high accuracy and potentially low cost. However, time-based localization is intensively coupled with clock synchronizat ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
Abstract—Localization is indispensable for the successful de-ployment of wireless sensor networks (WSNs). Time-based lo-calization approaches attract a lot of interest due to their high accuracy and potentially low cost. However, time-based localization is intensively coupled with clock synchronization. Thus, the reliability of timestamps in the time-based localization becomes an important yet challenging task to deal with. In this paper, we propose a robust time-based localization approach to locate a target node with the assistance of anchors (nodes with known positions) in an asynchronous network with clock offsets. We employ the asymmetric trip ranging (ATR) protocol to obtain time-of-arrival (TOA) measurements and facilitate clock offset cancellation. Regardless of the reliability of the timestamp report from the target node, closed-form least-squares (LS) and weighted LS estimators are derived to accurately estimate the target node position. As a result, we counter the uncertainties caused by the target node by ignoring the timestamps from this node. Furthermore, Cramér-Rao Bounds (CRBs) and simulation results corroborate the efficiency of our localization scheme. Index Terms—Localization, synchronization, clock offset, least squares, two-way ranging I.
SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY
"... Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the relate ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the related security issues. In this paper we have explored general security threats in wireless sensor network and made an extensive study to categorize available data gathering protocols and analyze possible security threats on them.