Skip to main content
Erschienen in: Journal of Network and Systems Management 3/2012

01.09.2012

Configuration Tool for a Wireless Sensor Network Integrated Security Framework

verfasst von: Victor Cionca, Thomas Newe, Vasile Teodor Dădârlat

Erschienen in: Journal of Network and Systems Management | Ausgabe 3/2012

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless Sensor Networks (WSNs) will benefit from security frameworks that provide easy to use security while hiding inherent complexity. In comparison to traditional networks, the hardware constraints of wireless sensors demand that network security be configured based on application parameters, in order to provide the desired level of security while efficiently using available resources. Such a security framework is discussed in this paper, with special focus on security configuration, where a configuration methodology is presented in detail. The methodology is implemented as a Java tool with SQLite database backing, and to prove its validity, a sample application is presented and tested. Also, experimental proofs are provided to support the methodology, and the general necessity of configuring security for WSN applications.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhu, S., Setia, S., and Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM, New York, NY, USA (2003) Zhu, S., Setia, S., and Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 62–72. ACM, New York, NY, USA (2003)
2.
Zurück zum Zitat Prasad, N.R., Alam, M.: Security framework for wireless sensor networks. Wirel. Pers. Commun. 37, 455–469 (2006)CrossRef Prasad, N.R., Alam, M.: Security framework for wireless sensor networks. Wirel. Pers. Commun. 37, 455–469 (2006)CrossRef
3.
Zurück zum Zitat Law, Y.W., Havinga, P.J.M.: How to secure a wireless sensor network. Intelligent sensors, sensor networks and information processing conference, 2005. In: Proceedings of the 2005 International Conference on Dec., pp. 89–95 (2005) Law, Y.W., Havinga, P.J.M.: How to secure a wireless sensor network. Intelligent sensors, sensor networks and information processing conference, 2005. In: Proceedings of the 2005 International Conference on Dec., pp. 89–95 (2005)
4.
Zurück zum Zitat Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible security synthesis for wireless sensor networks. In: MidSens ’08: Proceedings of the 3rd International Workshop on Middleware for Sensor Networks, pp. 19–24. ACM, New York, NY, USA (2008) Ransom, S., Pfisterer, D., Fischer, S.: Comprehensible security synthesis for wireless sensor networks. In: MidSens ’08: Proceedings of the 3rd International Workshop on Middleware for Sensor Networks, pp. 19–24. ACM, New York, NY, USA (2008)
5.
Zurück zum Zitat Peter, S., Piotrowski, K., Langendorfer, P.: In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. In: Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, pp. 778–785 (2008) Peter, S., Piotrowski, K., Langendorfer, P.: In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networks. In: Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on, pp. 778–785 (2008)
6.
Zurück zum Zitat Jinwala, D., Patel, D., Dasgupta, K.: Configurable link layer security architecture for wireless sensor networks. J. Inform. Assur. Sec. 4(4), 582–603 (2009) Jinwala, D., Patel, D., Dasgupta, K.: Configurable link layer security architecture for wireless sensor networks. J. Inform. Assur. Sec. 4(4), 582–603 (2009)
7.
Zurück zum Zitat de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: Integrated Network Management, 2009. IM’09. IFIP/IEEE International Symposium, pp. 315–318 (2009) de Oliveira, S., de Oliveira, T.R., Nogueira, J.M.: A policy based security management architecture for sensor networks. In: Integrated Network Management, 2009. IM’09. IFIP/IEEE International Symposium, pp. 315–318 (2009)
8.
Zurück zum Zitat Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, Chap. 6, pp. 142–163. IOS Press (2008) Krontiris, I., Dimitriou, T., Soroush, H., Salajegheh, M.: WSN link-layer security frameworks. In: Lopez, J., Zhou, J. (eds.) Wireless Sensor Network Security, Chap. 6, pp. 142–163. IOS Press (2008)
9.
Zurück zum Zitat Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security (final). DARPA Project report (cryptographic technologies group, trusted information system, NAI Labs) (2000) Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security (final). DARPA Project report (cryptographic technologies group, trusted information system, NAI Labs) (2000)
10.
Zurück zum Zitat Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162–175. ACM, New York, NY, USA (2004) Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: SenSys ’04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 162–175. ACM, New York, NY, USA (2004)
11.
Zurück zum Zitat Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: IPSN ’07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 479–488. ACM, New York, NY, USA (2007) Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: IPSN ’07: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 479–488. ACM, New York, NY, USA (2007)
12.
Zurück zum Zitat Singh, K., Muthukkumarasamy, V.: Analysis of proposed key establishment protocols in multi–tiered sensor networks. J. Netw. 3, 13 (2008)CrossRef Singh, K., Muthukkumarasamy, V.: Analysis of proposed key establishment protocols in multi–tiered sensor networks. J. Netw. 3, 13 (2008)CrossRef
13.
Zurück zum Zitat Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey, pp. 05–07. Rensselaer Polytechnic Institute, Troy, New York (2005) (technical report) Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey, pp. 05–07. Rensselaer Polytechnic Institute, Troy, New York (2005) (technical report)
14.
Zurück zum Zitat Chipcon, CC2420 datasheet rev 1.2. Tech. rep. (2004) Chipcon, CC2420 datasheet rev 1.2. Tech. rep. (2004)
15.
Zurück zum Zitat Hu, W., Corke, P., Shih, W., Overs, L.: secfleck: A public key technology platform for wireless sensor networks. Wireless Sensor Networks Book Series. Lecture Notes in Computer Science, vol. 5432, pp. 296–311. Springer, Berlin/Heidelberg (2009). ISBN: 978-3-642-00223-6 Hu, W., Corke, P., Shih, W., Overs, L.: secfleck: A public key technology platform for wireless sensor networks. Wireless Sensor Networks Book Series. Lecture Notes in Computer Science, vol. 5432, pp. 296–311. Springer, Berlin/Heidelberg (2009). ISBN: 978-3-642-00223-6
16.
Zurück zum Zitat Becher, E., Benenson, Z., Dornseif, M.: Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC), pp. 104–118 (2006) Becher, E., Benenson, Z., Dornseif, M.: Tampering with motes: real-world physical attacks on wireless sensor networks. In: Proceeding of the 3rd International Conference on Security in Pervasive Computing (SPC), pp. 104–118 (2006)
17.
Zurück zum Zitat Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of 2003 IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska, pp. 113–127 (2003) Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of 2003 IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska, pp. 113–127 (2003)
18.
Zurück zum Zitat Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8, 521–534 (2002)MATHCrossRef Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8, 521–534 (2002)MATHCrossRef
19.
Zurück zum Zitat Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Information Processing in Sensor Networks, 2008. IPSN ’08. International Conference, pp. 245–256 (2008) Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Information Processing in Sensor Networks, 2008. IPSN ’08. International Conference, pp. 245–256 (2008)
20.
Zurück zum Zitat Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S. C.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. In: Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference, pp. 247–256 (8–12 March 2005) Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S. C.: Sizzle: a standards-based end-to-end security architecture for the embedded internet. In: Pervasive Computing and Communications, 2005. PerCom 2005. Third IEEE International Conference, pp. 247–256 (8–12 March 2005)
21.
Zurück zum Zitat Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS ’02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York, NY, USA (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS ’02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York, NY, USA (2002)
22.
Zurück zum Zitat Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP ’03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC, USA (2003) Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: SP ’03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Washington, DC, USA (2003)
23.
Zurück zum Zitat Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM, New York, NY, USA (2003) Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61. ACM, New York, NY, USA (2003)
24.
Zurück zum Zitat ZigBee Alliance, Zigbee specification v1.0 (2004) ZigBee Alliance, Zigbee specification v1.0 (2004)
25.
Zurück zum Zitat Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Cryptogr. 28(2), 119–134 (2003)MathSciNetMATHCrossRef Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Des. Codes Cryptogr. 28(2), 119–134 (2003)MathSciNetMATHCrossRef
28.
Zurück zum Zitat Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw 2, 65–93 (2006)CrossRef Law, Y.W., Doumen, J., Hartel, P.: Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw 2, 65–93 (2006)CrossRef
29.
Zurück zum Zitat Levis, P., Gay, D., Handziski, V., Hauer, J.-H., Greenstein, B., Turon, M., Hui, J., Klues, K., Sharp, C., Szewczyk, R., Polastre, J., Buonadonna, P., Nachman, L., Tolle, G., Culler, D., Wolisz, A.: Berlin, Technische Universität, Crossbow Inc., Arched Rock Corporation, T2: A second generation OS for embedded sensor networks. Tech. rep. (2005) Levis, P., Gay, D., Handziski, V., Hauer, J.-H., Greenstein, B., Turon, M., Hui, J., Klues, K., Sharp, C., Szewczyk, R., Polastre, J., Buonadonna, P., Nachman, L., Tolle, G., Culler, D., Wolisz, A.: Berlin, Technische Universität, Crossbow Inc., Arched Rock Corporation, T2: A second generation OS for embedded sensor networks. Tech. rep. (2005)
31.
Zurück zum Zitat Dishongh, T.J., McGrath, M.: Wireless sensor networks for healthcare applications, chap. 7. Artech House Publishers (2010) Dishongh, T.J., McGrath, M.: Wireless sensor networks for healthcare applications, chap. 7. Artech House Publishers (2010)
32.
Zurück zum Zitat Burrows, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)CrossRef Burrows, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18–36 (1990)CrossRef
33.
Zurück zum Zitat De Decker, B., Piessens, F.: Cryptolog: a theorem prover for cryptographic protocols. In; DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, USA, September (1997) De Decker, B., Piessens, F.: Cryptolog: a theorem prover for cryptographic protocols. In; DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, USA, September (1997)
34.
Zurück zum Zitat Thouvenin, R.: Implementing and Evaluating the Dynamic Manet On-demand Protocol in Wireless Sensor Networks. Master’s thesis, University of Aarhaus (2007) Thouvenin, R.: Implementing and Evaluating the Dynamic Manet On-demand Protocol in Wireless Sensor Networks. Master’s thesis, University of Aarhaus (2007)
35.
Zurück zum Zitat Ganesan, D., Krishnamachari, B., Woo, A., Culler, D., Estrin, D., Wicker, S.: Complex behavior at scale: an experimental study of low-power wireless sensor networks. UCLA Computer Science Technical Report UCLA/CSD-TR 02-0013 (2002) Ganesan, D., Krishnamachari, B., Woo, A., Culler, D., Estrin, D., Wicker, S.: Complex behavior at scale: an experimental study of low-power wireless sensor networks. UCLA Computer Science Technical Report UCLA/CSD-TR 02-0013 (2002)
36.
Zurück zum Zitat NIST (National Institute of Standards and Technology), Special publication 800-57 part1. Tech. rep. (2007) NIST (National Institute of Standards and Technology), Special publication 800-57 part1. Tech. rep. (2007)
Metadaten
Titel
Configuration Tool for a Wireless Sensor Network Integrated Security Framework
verfasst von
Victor Cionca
Thomas Newe
Vasile Teodor Dădârlat
Publikationsdatum
01.09.2012
Verlag
Springer US
Erschienen in
Journal of Network and Systems Management / Ausgabe 3/2012
Print ISSN: 1064-7570
Elektronische ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-011-9219-8

Weitere Artikel der Ausgabe 3/2012

Journal of Network and Systems Management 3/2012 Zur Ausgabe