Providing end-to-end secure communications in wireless sensor networks

被引:24
作者
Gu W. [1 ]
Dutta N. [2 ]
Chellappan S. [2 ]
Bai X. [3 ]
机构
[1] Department of Computer Science, Missouri University of Science and Technology, Rolla
[2] Department of Computer and Information Science, University of Massachusetts, Dartmouth, MA
来源
IEEE Transactions on Network and Service Management | 2011年 / 8卷 / 03期
基金
中国国家自然科学基金;
关键词
key management; security; Sensor networks;
D O I
10.1109/TNSM.2011.072611.100080
中图分类号
学科分类号
摘要
In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack. © 2011 IEEE.
引用
收藏
页码:205 / 218
页数:13
相关论文
共 56 条
[41]  
Dutertre B., Cheung S., Levy J., Lightweight key management in wireless sensor networks by leveraging initial trust, SRI International, SDL Technical Report SRI-SDL-04-02, (2004)
[42]  
Sencun Z., Sanjeev S., Sushi J., LEAP: Efficient security mechanisms for large-scale distributed sensor networks, Proc. ACM Conf. Comput. Commun. Security, pp. 62-72, (2003)
[43]  
Karlof C., Wagner D., Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier's AdHoc Netw. J., 1, pp. 293-315, (2003)
[44]  
Spencer J., The Strange logic of Random Graph, (2001)
[45]  
Karp B., Kung H., GPSR: Greedy perimeter stateless routing for wireless networks, Proc. ACM International Conf. Mobile Comput. Netw., (2000)
[46]  
Intanagonviwat C., Govindan R., Estrin D., Directed diffusion: A scalable and robust communication paradigm for sensor networks, Proc. ACM International Conf. Mobile Comput. Netw., (2000)
[47]  
Heinzelman W., Chandrakasan A., Balakrishnan H., Energyefficient communication protocols for wireless microsensor networks (leach), Proc. 33rd Hawaii International Conf. Syst. Science, (2000)
[48]  
Tanachaiwiwat S., Dave P., Bhindwale R., Helmy A., Secure locations: Routing on trust and isolating compromised sensors in locationaware sensor networks, Proc. 1st. ACM Conf. Embedded Netw. Sensor Syst., (2003)
[49]  
Wood A.D., Fang L., Stankovic J.A., He T., SIGF: A family of configurable, secure routing protocols for wireless sensor networks, Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw., (2006)
[50]  
Schugers C., Srivastava M., Energy efficient routing in wireless sensor networks, Proc. Milcom, (2001)