Skip to main content
Top
Published in: Annals of Telecommunications 11-12/2009

01-12-2009

Energy conserving security mechanisms for wireless sensor networks

Authors: Md. Abdul Hamid, Choong Seon Hong

Published in: Annals of Telecommunications | Issue 11-12/2009

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their deployment. An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption. We develop a security mechanism to detect energy-consuming useless packets, assuming that a sensor node is able to generate multiple message authentication codes (MAC) using preshared secrets. The forwarding nodes along the path verify the validity of the packet by checking the authenticity of the attached MACs. This mechanism performs well when a malicious node does not have all the cryptographic keys. However, packets, generated by the malicious node having all the keys, would be considered as legitimate, and thus, the forwarding nodes become unable to detect and discard them. To deal with this problem, we devise another mechanism in which each forwarding node is capable of checking such suspicious nodes. We have quantified the security strength through analysis and simulations to show that the proposed mechanisms make the entire network energy conserving.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Kulkarni SS, Gouda MG, Arora A (2006) Secret instantiation in ad-hoc networks. Comput Commun 29(2):200–215CrossRef Kulkarni SS, Gouda MG, Arora A (2006) Secret instantiation in ad-hoc networks. Comput Commun 29(2):200–215CrossRef
3.
go back to reference Hamid MA, Rahman M, Hong CS (2006) Energy conserving security mechanism for wireless sensor network. In: ICCSA (2), Glasgow, 8–11 May 2006, pp 866–875 Hamid MA, Rahman M, Hong CS (2006) Energy conserving security mechanism for wireless sensor network. In: ICCSA (2), Glasgow, 8–11 May 2006, pp 866–875
4.
go back to reference Gui C, Mohapatra P (2004) Power conservation and quality of surveillance in target tracking sensor networks. In: MobiCom ’04: Proceedings of the 10th annual international conference on mobile computing and networking. ACM, New York, pp 129–143. doi:http://doi.acm.org/10.1145/1023720.1023734 Gui C, Mohapatra P (2004) Power conservation and quality of surveillance in target tracking sensor networks. In: MobiCom ’04: Proceedings of the 10th annual international conference on mobile computing and networking. ACM, New York, pp 129–143. doi:http://​doi.​acm.​org/​10.​1145/​1023720.​1023734
5.
go back to reference Wang N, Chang CH (2007) Performance evaluation of geographic probabilistic flow-based spreading routing in wireless sensor networks. In: PE-WASUN ’07: Proceedings of the 4th ACM workshop on performance evaluation of wireless ad hoc, sensor,and ubiquitous networks. ACM, New York, pp 32–38. doi:http://doi.acm.org/10.1145/1298197.1298204 Wang N, Chang CH (2007) Performance evaluation of geographic probabilistic flow-based spreading routing in wireless sensor networks. In: PE-WASUN ’07: Proceedings of the 4th ACM workshop on performance evaluation of wireless ad hoc, sensor,and ubiquitous networks. ACM, New York, pp 32–38. doi:http://​doi.​acm.​org/​10.​1145/​1298197.​1298204
6.
go back to reference Ye W, Heidemann J, Estrin D (2002) An energy-efficient mac protocol for wireless sensor networks. INFOCOM 2002. In: Twenty-first annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1567–1576. doi:10.1109/INFCOM.2002.1019408 Ye W, Heidemann J, Estrin D (2002) An energy-efficient mac protocol for wireless sensor networks. INFOCOM 2002. In: Twenty-first annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1567–1576. doi:10.​1109/​INFCOM.​2002.​1019408
8.
go back to reference Cerpa A, Estrin D (2002) ASCENT: Adaptive self-configuring sensor networks topologies. In: INFOCOM 2002. Twenty-First annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1278–1287. doi:10.1109/INFCOM.2002.1019378 Cerpa A, Estrin D (2002) ASCENT: Adaptive self-configuring sensor networks topologies. In: INFOCOM 2002. Twenty-First annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1278–1287. doi:10.​1109/​INFCOM.​2002.​1019378
9.
go back to reference Bandyopadhyay S, Coyle E (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE 3:1713–1723 Bandyopadhyay S, Coyle E (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE 3:1713–1723
10.
go back to reference Bandyopadhyay S, Coyle EJ (2004) Minimizing communication costs in hierarchically-clustered networks of wireless sensors. Comput Netw 44(1):1–16CrossRef Bandyopadhyay S, Coyle EJ (2004) Minimizing communication costs in hierarchically-clustered networks of wireless sensors. Comput Netw 44(1):1–16CrossRef
11.
go back to reference Manjeshwar A, Agrawal D (2001) TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: Parallel and distributed processing symposium. Proceedings 15th international, San Francisco, 23–27 April 2001, pp 2009–2015 Manjeshwar A, Agrawal D (2001) TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: Parallel and distributed processing symposium. Proceedings 15th international, San Francisco, 23–27 April 2001, pp 2009–2015
12.
go back to reference Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315CrossRef Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315CrossRef
13.
go back to reference Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks. In: ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 299–302CrossRef Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks. In: ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 299–302CrossRef
15.
go back to reference Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, 11–14 May 2003, pp 197–213 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, 11–14 May 2003, pp 197–213
16.
go back to reference Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM conference on computer and communications security (CCS). ACM, New York, pp 42–51 Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM conference on computer and communications security (CCS). ACM, New York, pp 42–51
17.
go back to reference Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton
19.
go back to reference Barrett CL, Marathe MV, Engelhart DC, Sivasubramaniam A (2002) Analyzing the short-term fairness of ieee 802.11 in wireless multi-hop radio networks. In: MASCOTS ’02: proceedings of the 10th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOTS’02). IEEE Computer Society, Washington, DC, p 137 Barrett CL, Marathe MV, Engelhart DC, Sivasubramaniam A (2002) Analyzing the short-term fairness of ieee 802.11 in wireless multi-hop radio networks. In: MASCOTS ’02: proceedings of the 10th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOTS’02). IEEE Computer Society, Washington, DC, p 137
20.
go back to reference C. T. Inc. (2005) MPR400/410/420 mica2 mote. Datasheet 2005 C. T. Inc. (2005) MPR400/410/420 mica2 mote. Datasheet 2005
23.
go back to reference Denes J, Keedwell AD (1974) Latin squares and their applications. Academic, New YorkMATH Denes J, Keedwell AD (1974) Latin squares and their applications. Academic, New YorkMATH
Metadata
Title
Energy conserving security mechanisms for wireless sensor networks
Authors
Md. Abdul Hamid
Choong Seon Hong
Publication date
01-12-2009
Publisher
Springer-Verlag
Published in
Annals of Telecommunications / Issue 11-12/2009
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-009-0088-z

Other articles of this Issue 11-12/2009

Annals of Telecommunications 11-12/2009 Go to the issue

Acknowledgments

Analytical index

Premium Partner