LEDS: Providing location-aware end-to-end data security in wireless sensor networks

被引:0
|
作者
Ren, Kui [1 ]
Lou, Wenjing [1 ]
Zhang, Yanchao [2 ]
机构
[1] Worcester Polytech Inst, Worcester, MA 01609 USA
[2] Univ Florida, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider attacks due to possible node compromise, since a WSN is usually deployed in unattended/hostile environments. Existing security designs provide a hop-by-hop security paradigm only, which leaves the end-to-end data security at high stake. Data confidentiality and authenticity is highly vulnerable to insider attacks, and the multihop transmission of messages aggravates the situation. Moreover, data availability is not sufficiently addressed in existing security designs, many of which are highly vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption attacks, selective forwarding attacks, etc. In this paper, we seek feasible solutions to overcome these vulnerabilities. Through exploiting the static and location-aware nature of WSNs, we come up with a location-aware end-to-end security framework in which each node only stores a few secret keys and those secret keys are bound to the node's geographic location. The property of the location-aware keys successfully limits the impact of compromised nodes to their vicinity. We also propose a multifunctional key management framework which ensures both node-to-sink and node-to-node authentication along report forwarding routes. Moreover, our novel one-to-many data delivery approach guarantees efficient en-route bogus data filtering and is highly robust against many known DoS attacks. We evaluate our design through extensive analysis, which demonstrates a high security resilience against an increasing number of compromised nodes at the cost of a moderate protocol overhead.
引用
收藏
页码:2584 / 2595
页数:12
相关论文
共 50 条
  • [1] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) : 585 - 598
  • [2] Data Aggregation with End-to-End Security for Wireless Sensor Networks
    Guo, Jiang-Hong
    Wu, Jian-Qiang
    Wu, Xi-Hong
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 383 - 386
  • [3] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chi-Tung Chen
    Shu-Yan Huang
    Iuon-Chang Lin
    [J]. EURASIP Journal on Wireless Communications and Networking, 2012
  • [4] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chen, Chi-Tung
    Huang, Shu-Yan
    Lin, Iuon-Chang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [5] End-to-End Reliability-Aware Scheduling for Wireless Sensor Networks
    Dobslaw, Felix
    Zhang, Tingting
    Gidlund, Mikael
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) : 758 - 767
  • [6] End-to-End Delay Minimization in an Application Aware Routing for Wireless Sensor Networks
    Comsa, Anamaria
    Ivanciu, Iustin
    Luchian, Eduard
    Dobrota, Virgil
    Steenhaut, Kris
    [J]. 2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 80 - 84
  • [7] Temporal Privacy Scheme for End-to-End Location Privacy in Wireless Sensor Networks
    Abuzneid, Abdel-shakour
    Sobh, Tarek
    Faezipour, Miad
    [J]. 2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [8] Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks
    Hou, I-Hong
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 414 - 419
  • [9] Location-aware security services for wireless sensor networks using network coding
    Ayday, Erman
    Delgosha, Farshid
    Fekri, Faramarz
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1226 - +
  • [10] From Nowhere to Somewhere: Protecting End-to-End Location Privacy in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    [J]. 2010 IEEE 29TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2010, : 1 - 8