Providing end-to-end secure communications in wireless sensor networks

被引:24
|
作者
Gu W. [1 ]
Dutta N. [2 ]
Chellappan S. [2 ]
Bai X. [3 ]
机构
[1] Department of Computer Science, Missouri University of Science and Technology, Rolla
[2] Department of Computer and Information Science, University of Massachusetts, Dartmouth, MA
基金
中国国家自然科学基金;
关键词
key management; security; Sensor networks;
D O I
10.1109/TNSM.2011.072611.100080
中图分类号
学科分类号
摘要
In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack. © 2011 IEEE.
引用
收藏
页码:205 / 218
页数:13
相关论文
共 50 条
  • [31] Energy efficient analysis with end-to-end delay constraints in wireless sensor networks
    Wang, Gaocai
    Yu, Xinsheng
    Li, Daofeng
    Ye, Jin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (02) : 107 - 114
  • [32] Temporal Privacy Scheme for End-to-End Location Privacy in Wireless Sensor Networks
    Abuzneid, Abdel-shakour
    Sobh, Tarek
    Faezipour, Miad
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [33] A Sampling Method for Predicting End-to-End Delay Performance in Wireless Sensor Networks
    Chen, Yu
    Darwazeh, Izzat
    2014 1ST INTERNATIONAL CONFERENCE ON 5G FOR UBIQUITOUS CONNECTIVITY (5GU), 2014, : 279 - 284
  • [34] End-to-End Delay Minimization in an Application Aware Routing for Wireless Sensor Networks
    Comsa, Anamaria
    Ivanciu, Iustin
    Luchian, Eduard
    Dobrota, Virgil
    Steenhaut, Kris
    2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 80 - 84
  • [35] Minimizing End-to-End Delay Routing Protocol for Rechargeable Wireless Sensor Networks
    Gao, Demin
    Lin, Haifeng
    Liu, Yunfei
    Jiang, Anna
    AD HOC & SENSOR WIRELESS NETWORKS, 2016, 34 (1-4) : 77 - 98
  • [36] Delay-Based End-to-End Congestion Control for Wireless Sensor Networks
    Montes, Isabel
    Tiglao, Nestor
    Ocampo, Roel
    Festin, Cedric
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 497 - 502
  • [37] End-to-end delay differentiation by prioritized multipath routing in wireless sensor networks
    Huang, Xiaoxia
    Fang, Yuguang
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1277 - 1283
  • [38] End-to-End Delay in Wireless Random Networks
    Yu, Seung Min
    Kim, Seong-Lyun
    IEEE COMMUNICATIONS LETTERS, 2010, 14 (02) : 109 - 111
  • [39] Spectrum-Aware Routing for Reliable End-to-End Communications in Cognitive Sensor Networks
    Yu, Rong
    Zhang, Yan
    Yao, Wenqing
    Song, Lingyang
    Xie, Shengli
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [40] Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks
    Chatzigiannakis, Ioannis
    Liagkou, Vasiliki
    Spirakis, Paul G.
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018, 2018, 10879 : 101 - 104