A group-based security scheme for wireless sensor networks

被引:1
作者
Hamid, Md. Abdul [1 ]
Sarkar, A. M. Jehad [2 ]
机构
[1] Hankuk Univ Foreign Studies, Dept Informat & Commun Engn, Yongin 449791, Kyounggi Do, South Korea
[2] Hankuk Univ Foreign Studies, Dept Digital Informat Engn, Yongin 449791, Kyounggi Do, South Korea
关键词
Wireless sensor networks; Security; Group-based data aggregation; Gaussian distribution; Node capture attack;
D O I
10.1007/s12243-011-0278-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In recent years, wireless sensor networks have been a very popular research topic, offering a treasure trove of systems, networking, hardware, security, and application-related problems. Distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. The problem is more critical if its purpose is for some mission-critical applications such as in a tactical battlefield. This paper presents a security scheme for group-based distributed wireless sensor networks. Our first goal is to devise a group-based secure wireless sensor network. We exploit the multi-line version of matrix key distribution technique and Gaussian distribution to achieve this goal. Secondly, security mechanisms are proposed for such a group-based network architecture in which sensed data collected at numerous, inexpensive sensor nodes are filtered by local processing on its way through more capable and compromise-tolerant reporting nodes. We address the upstream requirement that reporting nodes authenticate data produced by sensors before aggregating and the downstream requirement that sensors authenticates commands disseminated from reporting nodes. Security analysis is presented to quantify the strength of the proposed scheme against security threats. Through simulations, we validate the analytical results.
引用
收藏
页码:455 / 469
页数:15
相关论文
共 24 条
[1]  
Akyildiz I, 2002, IEEE COMMUNICATI, V40
[2]  
Al-Karaki J. N., 2004, 2004 Workshop on High Performance Switching and Routing (IEEE Cat. No.04TH8735), P241
[3]  
[Anonymous], 2002, COMPUTER NETWORKS
[4]  
[Anonymous], NETWORK SIMULATOR NS
[5]  
[Anonymous], 2003, Introduction to Probability Models
[6]  
Bekara C, 2007, LECT NOTES COMPUT SC, V4864, P784
[7]  
DENG J, 2003, LNCS, V2634
[8]   Data Security in Unattended Wireless Sensor Networks [J].
Di Pietro, Roberto ;
Mancini, Luigi V. ;
Soriente, Claudio ;
Spognardi, Angelo ;
Tsudik, Gene .
IEEE TRANSACTIONS ON COMPUTERS, 2009, 58 (11) :1500-1511
[9]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
[10]  
Estrin D., 1999, MobiCom'99. Proceedings of Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, P263, DOI 10.1145/313451.313556