Skip to main content
Erschienen in: Annals of Telecommunications 11-12/2009

01.12.2009

Energy conserving security mechanisms for wireless sensor networks

verfasst von: Md. Abdul Hamid, Choong Seon Hong

Erschienen in: Annals of Telecommunications | Ausgabe 11-12/2009

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their deployment. An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption. We develop a security mechanism to detect energy-consuming useless packets, assuming that a sensor node is able to generate multiple message authentication codes (MAC) using preshared secrets. The forwarding nodes along the path verify the validity of the packet by checking the authenticity of the attached MACs. This mechanism performs well when a malicious node does not have all the cryptographic keys. However, packets, generated by the malicious node having all the keys, would be considered as legitimate, and thus, the forwarding nodes become unable to detect and discard them. To deal with this problem, we devise another mechanism in which each forwarding node is capable of checking such suspicious nodes. We have quantified the security strength through analysis and simulations to show that the proposed mechanisms make the entire network energy conserving.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Kulkarni SS, Gouda MG, Arora A (2006) Secret instantiation in ad-hoc networks. Comput Commun 29(2):200–215CrossRef Kulkarni SS, Gouda MG, Arora A (2006) Secret instantiation in ad-hoc networks. Comput Commun 29(2):200–215CrossRef
3.
Zurück zum Zitat Hamid MA, Rahman M, Hong CS (2006) Energy conserving security mechanism for wireless sensor network. In: ICCSA (2), Glasgow, 8–11 May 2006, pp 866–875 Hamid MA, Rahman M, Hong CS (2006) Energy conserving security mechanism for wireless sensor network. In: ICCSA (2), Glasgow, 8–11 May 2006, pp 866–875
4.
Zurück zum Zitat Gui C, Mohapatra P (2004) Power conservation and quality of surveillance in target tracking sensor networks. In: MobiCom ’04: Proceedings of the 10th annual international conference on mobile computing and networking. ACM, New York, pp 129–143. doi:http://doi.acm.org/10.1145/1023720.1023734 Gui C, Mohapatra P (2004) Power conservation and quality of surveillance in target tracking sensor networks. In: MobiCom ’04: Proceedings of the 10th annual international conference on mobile computing and networking. ACM, New York, pp 129–143. doi:http://​doi.​acm.​org/​10.​1145/​1023720.​1023734
5.
Zurück zum Zitat Wang N, Chang CH (2007) Performance evaluation of geographic probabilistic flow-based spreading routing in wireless sensor networks. In: PE-WASUN ’07: Proceedings of the 4th ACM workshop on performance evaluation of wireless ad hoc, sensor,and ubiquitous networks. ACM, New York, pp 32–38. doi:http://doi.acm.org/10.1145/1298197.1298204 Wang N, Chang CH (2007) Performance evaluation of geographic probabilistic flow-based spreading routing in wireless sensor networks. In: PE-WASUN ’07: Proceedings of the 4th ACM workshop on performance evaluation of wireless ad hoc, sensor,and ubiquitous networks. ACM, New York, pp 32–38. doi:http://​doi.​acm.​org/​10.​1145/​1298197.​1298204
6.
Zurück zum Zitat Ye W, Heidemann J, Estrin D (2002) An energy-efficient mac protocol for wireless sensor networks. INFOCOM 2002. In: Twenty-first annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1567–1576. doi:10.1109/INFCOM.2002.1019408 Ye W, Heidemann J, Estrin D (2002) An energy-efficient mac protocol for wireless sensor networks. INFOCOM 2002. In: Twenty-first annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1567–1576. doi:10.​1109/​INFCOM.​2002.​1019408
8.
Zurück zum Zitat Cerpa A, Estrin D (2002) ASCENT: Adaptive self-configuring sensor networks topologies. In: INFOCOM 2002. Twenty-First annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1278–1287. doi:10.1109/INFCOM.2002.1019378 Cerpa A, Estrin D (2002) ASCENT: Adaptive self-configuring sensor networks topologies. In: INFOCOM 2002. Twenty-First annual joint conference of the IEEE computer and communications societies, vol 3. IEEE, Piscataway, pp 1278–1287. doi:10.​1109/​INFCOM.​2002.​1019378
9.
Zurück zum Zitat Bandyopadhyay S, Coyle E (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE 3:1713–1723 Bandyopadhyay S, Coyle E (2003) An energy efficient hierarchical clustering algorithm for wireless sensor networks. INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications societies. IEEE 3:1713–1723
10.
Zurück zum Zitat Bandyopadhyay S, Coyle EJ (2004) Minimizing communication costs in hierarchically-clustered networks of wireless sensors. Comput Netw 44(1):1–16CrossRef Bandyopadhyay S, Coyle EJ (2004) Minimizing communication costs in hierarchically-clustered networks of wireless sensors. Comput Netw 44(1):1–16CrossRef
11.
Zurück zum Zitat Manjeshwar A, Agrawal D (2001) TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: Parallel and distributed processing symposium. Proceedings 15th international, San Francisco, 23–27 April 2001, pp 2009–2015 Manjeshwar A, Agrawal D (2001) TEEN: a routing protocol for enhanced efficiency in wireless sensor networks. In: Parallel and distributed processing symposium. Proceedings 15th international, San Francisco, 23–27 April 2001, pp 2009–2015
12.
Zurück zum Zitat Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315CrossRef Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw 1(2–3):293–315CrossRef
13.
Zurück zum Zitat Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks. In: ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 299–302CrossRef Yi S, Naldurg P, Kravets R (2001) Security-aware ad hoc routing for wireless networks. In: ACM international symposium on mobile ad hoc networking and computing. ACM, New York, pp 299–302CrossRef
15.
Zurück zum Zitat Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, 11–14 May 2003, pp 197–213 Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: IEEE symposium on security and privacy, Berkeley, 11–14 May 2003, pp 197–213
16.
Zurück zum Zitat Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM conference on computer and communications security (CCS). ACM, New York, pp 42–51 Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM conference on computer and communications security (CCS). ACM, New York, pp 42–51
17.
Zurück zum Zitat Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton Menezes AJ, Vanstone SA, Oorschot PCV (1996) Handbook of applied cryptography. CRC, Boca Raton
19.
Zurück zum Zitat Barrett CL, Marathe MV, Engelhart DC, Sivasubramaniam A (2002) Analyzing the short-term fairness of ieee 802.11 in wireless multi-hop radio networks. In: MASCOTS ’02: proceedings of the 10th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOTS’02). IEEE Computer Society, Washington, DC, p 137 Barrett CL, Marathe MV, Engelhart DC, Sivasubramaniam A (2002) Analyzing the short-term fairness of ieee 802.11 in wireless multi-hop radio networks. In: MASCOTS ’02: proceedings of the 10th IEEE international symposium on modeling, analysis, and simulation of computer and telecommunications systems (MASCOTS’02). IEEE Computer Society, Washington, DC, p 137
20.
Zurück zum Zitat C. T. Inc. (2005) MPR400/410/420 mica2 mote. Datasheet 2005 C. T. Inc. (2005) MPR400/410/420 mica2 mote. Datasheet 2005
23.
Zurück zum Zitat Denes J, Keedwell AD (1974) Latin squares and their applications. Academic, New YorkMATH Denes J, Keedwell AD (1974) Latin squares and their applications. Academic, New YorkMATH
Metadaten
Titel
Energy conserving security mechanisms for wireless sensor networks
verfasst von
Md. Abdul Hamid
Choong Seon Hong
Publikationsdatum
01.12.2009
Verlag
Springer-Verlag
Erschienen in
Annals of Telecommunications / Ausgabe 11-12/2009
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-009-0088-z

Weitere Artikel der Ausgabe 11-12/2009

Annals of Telecommunications 11-12/2009 Zur Ausgabe