Providing end-to-end secure communications in wireless sensor networks

被引:24
|
作者
Gu W. [1 ]
Dutta N. [2 ]
Chellappan S. [2 ]
Bai X. [3 ]
机构
[1] Department of Computer Science, Missouri University of Science and Technology, Rolla
[2] Department of Computer and Information Science, University of Massachusetts, Dartmouth, MA
基金
中国国家自然科学基金;
关键词
key management; security; Sensor networks;
D O I
10.1109/TNSM.2011.072611.100080
中图分类号
学科分类号
摘要
In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack. © 2011 IEEE.
引用
收藏
页码:205 / 218
页数:13
相关论文
共 50 条
  • [21] Probabilistic Estimation of End-to-End Path Latency in Wireless Sensor Networks
    Oliver, Ramon Sema
    Fohler, Gerhard
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 614 - 622
  • [22] End-to-End Delay Constrained Routing and Scheduling for Wireless Sensor Networks
    Wang, Qing
    Fan, Pingyi
    Wu, Dapeng Oliver
    Ben Letaief, Khaled
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [23] End-to-End Delay Measurement in Wireless Sensor Networks without Synchronization
    Liu, Kebin
    Ma, Qiang
    Liu, Haoxiang
    Cao, Zhichao
    Liu, Yunhao
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 583 - 591
  • [24] End-to-End Delay Analysis in Wireless Sensor Networks with Service Vacation
    Alabdulmohsin, Ibrahim
    Hyadi, Amal
    Afify, Laila
    Shihada, Basem
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2799 - 2804
  • [25] End-to-End Reliability-Aware Scheduling for Wireless Sensor Networks
    Dobslaw, Felix
    Zhang, Tingting
    Gidlund, Mikael
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) : 758 - 767
  • [26] An End-to-End Performance Meter for Applications in Wireless Body Sensor Networks
    Orhan, Ibrahim
    Gonga, Antonio
    Lindh, Thomas
    2008 5TH INTERNATIONAL SUMMER SCHOOL AND SYMPOSIUM ON MEDICAL DEVICES AND BIOSENSORS, 2008, : 295 - +
  • [27] A Comprehensive Analysis of the End-to-End Delay for Wireless Multimedia Sensor Networks
    Abbas, Nasim
    Yu, Fengqi
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (06) : 2456 - 2467
  • [28] Providing end-to-end QoS for multimedia applications in 3G wireless networks
    Guo, K
    Rangarajan, S
    Siddiqui, MA
    Paul, S
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS IV, 2003, 5242 : 184 - 197
  • [29] Secret end-to-end communications in mobile networks
    Yu, Bin-Xiao
    Wang, Xin-Mei
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2004, 32 (03): : 384 - 387
  • [30] Efficient Key Authentication Service for Secure End-to-End Communications
    Etemad, Mohammad
    Kupcu, Alptekin
    PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 183 - 197