Providing end-to-end secure communications in wireless sensor networks

被引:24
|
作者
Gu W. [1 ]
Dutta N. [2 ]
Chellappan S. [2 ]
Bai X. [3 ]
机构
[1] Department of Computer Science, Missouri University of Science and Technology, Rolla
[2] Department of Computer and Information Science, University of Massachusetts, Dartmouth, MA
基金
中国国家自然科学基金;
关键词
key management; security; Sensor networks;
D O I
10.1109/TNSM.2011.072611.100080
中图分类号
学科分类号
摘要
In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack. © 2011 IEEE.
引用
收藏
页码:205 / 218
页数:13
相关论文
共 50 条
  • [1] Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks
    Harn, Lein
    Hsu, Ching-Fang
    Ruan, Ou
    Zhang, Mao-Yuan
    IEEE SENSORS JOURNAL, 2016, 16 (06) : 1779 - 1785
  • [2] Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks
    Poornima, A. S.
    Amberker, B. B.
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 193 - 219
  • [3] Enabling end-to-end secure communication between wireless sensor networks and the Internet
    Hong Yu
    Jingsha He
    Ting Zhang
    Peng Xiao
    Yuqiang Zhang
    World Wide Web, 2013, 16 : 515 - 540
  • [4] Enabling end-to-end secure communication between wireless sensor networks and the Internet
    Yu, Hong
    He, Jingsha
    Zhang, Ting
    Xiao, Peng
    Zhang, Yuqiang
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2013, 16 (04): : 515 - 540
  • [5] Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks
    Hou, I-Hong
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 414 - 419
  • [6] END-TO-END LEARNING OF SECURE WIRELESS COMMUNICATIONS: CONFIDENTIAL TRANSMISSION AND AUTHENTICATION
    Sun, Zhuo
    Wu, Hengmiao
    Zhao, Chenglin
    Yue, Gang
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (05) : 88 - 95
  • [7] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) : 585 - 598
  • [8] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2584 - 2595
  • [9] Wireless sensor networks for greenhouses: An end-to-end review
    Kochhar, Aarti
    Kumar, Naresh
    COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2019, 163
  • [10] Secure Provisioning for Achieving End-to-End Secure Communications
    Sousa, Patricia R.
    Resende, Joao S.
    Martins, Rolando
    Antunes, Luis
    AD-HOC, MOBILE, AND WIRELESS NETWORKS (ADHOC-NOW 2019), 2019, 11803 : 498 - 507