Providing end-to-end secure communications in wireless sensor networks

被引:24
|
作者
Gu W. [1 ]
Dutta N. [2 ]
Chellappan S. [2 ]
Bai X. [3 ]
机构
[1] Department of Computer Science, Missouri University of Science and Technology, Rolla
[2] Department of Computer and Information Science, University of Massachusetts, Dartmouth, MA
基金
中国国家自然科学基金;
关键词
key management; security; Sensor networks;
D O I
10.1109/TNSM.2011.072611.100080
中图分类号
学科分类号
摘要
In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack. © 2011 IEEE.
引用
收藏
页码:205 / 218
页数:13
相关论文
共 50 条
  • [41] CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks
    Ahvanooey, Milad Taleby
    Zhu, Mark Xuefang
    Mazurczyk, Wojciech
    Li, Qianmu
    Kilger, Max
    Choo, Kim-Kwang Raymond
    Conti, Mauro
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [42] A framework for an end-to-end secure wireless smart home system
    Al-Qutayri, M.
    Barada, H.
    Al-Mehairi, S.
    Nuaimi, J.
    2008 2ND ANNUAL IEEE SYSTEMS CONFERENCE, 2008, : 420 - 426
  • [43] An Add-on End-to-end Secure Email Solution in Mobile Communications
    Zhao, Shushan
    Liu, Shuping
    10TH EAI INTERNATIONAL CONFERENCE ON MOBILE MULTIMEDIA COMMUNICATIONS (MOBIMEDIA 2017), 2017, : 63 - 67
  • [44] Link Activity Scheduling for Minimum End-to-End Latency in Multihop Wireless Sensor Networks
    Cheng, Maggie X.
    Gong, Xuan
    Xu, Yibo
    Cai, Lin
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [45] Availability and End-to-end Reliability in Low Duty Cycle Multihop Wireless Sensor Networks
    Suhonen, Jukka
    Hamalainen, Timo D.
    Hannikainen, Marko
    SENSORS, 2009, 9 (03) : 2088 - 2116
  • [46] Ubiquitous monitoring solution for Wireless Sensor Networks with push notifications and end-to-end connectivity
    Oliveira, Luis M. L.
    Rodrigues, Joel J. P. C.
    Elias, Andre G. F.
    Zarpelao, Bruno B.
    MOBILE INFORMATION SYSTEMS, 2014, 10 (01) : 19 - 35
  • [47] From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    2010 IEEE 29TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2010, : 1 - 8
  • [48] End-to-End Delay and Energy Efficient Routing Protocol for Underwater Wireless Sensor Networks
    Tariq Ali
    Low Tang Jung
    Ibrahima Faye
    Wireless Personal Communications, 2014, 79 : 339 - 361
  • [49] Providing end-to-end QoS in 4G networks
    Prior, R
    Sargento, S
    Gozdecki, J
    Aguiar, R
    Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005, : 188 - 195
  • [50] Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
    Wang, Yunbo
    Vuran, Mehmet C.
    Goddard, Steve
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (01) : 305 - 318