LEDS: Providing location-aware end-to-end data security in wireless sensor networks

被引:0
|
作者
Ren, Kui [1 ]
Lou, Wenjing [1 ]
Zhang, Yanchao [2 ]
机构
[1] Worcester Polytech Inst, Worcester, MA 01609 USA
[2] Univ Florida, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition to the large number and severe resource constraint of sensor nodes, a particular challenge comes from potential insider attacks due to possible node compromise, since a WSN is usually deployed in unattended/hostile environments. Existing security designs provide a hop-by-hop security paradigm only, which leaves the end-to-end data security at high stake. Data confidentiality and authenticity is highly vulnerable to insider attacks, and the multihop transmission of messages aggravates the situation. Moreover, data availability is not sufficiently addressed in existing security designs, many of which are highly vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption attacks, selective forwarding attacks, etc. In this paper, we seek feasible solutions to overcome these vulnerabilities. Through exploiting the static and location-aware nature of WSNs, we come up with a location-aware end-to-end security framework in which each node only stores a few secret keys and those secret keys are bound to the node's geographic location. The property of the location-aware keys successfully limits the impact of compromised nodes to their vicinity. We also propose a multifunctional key management framework which ensures both node-to-sink and node-to-node authentication along report forwarding routes. Moreover, our novel one-to-many data delivery approach guarantees efficient en-route bogus data filtering and is highly robust against many known DoS attacks. We evaluate our design through extensive analysis, which demonstrates a high security resilience against an increasing number of compromised nodes at the cost of a moderate protocol overhead.
引用
收藏
页码:2584 / 2595
页数:12
相关论文
共 50 条
  • [11] On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks
    Chen, Honglong
    Lou, Wei
    [J]. PERVASIVE AND MOBILE COMPUTING, 2015, 16 : 36 - 50
  • [12] Location-aware ID assignment in wireless sensor networks
    Liu, Yunhuai
    Ni, Lionel M.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 485 - 489
  • [13] Wireless sensor networks for greenhouses: An end-to-end review
    Kochhar, Aarti
    Kumar, Naresh
    [J]. COMPUTERS AND ELECTRONICS IN AGRICULTURE, 2019, 163
  • [14] Secure End-to-End Data Aggregation (SEEDA) Protocols for Wireless Sensor Networks
    Poornima, A. S.
    Amberker, B. B.
    [J]. AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 193 - 219
  • [15] Providing End-to-End Security Using Quantum Walks in IoT Networks
    Abd El-Latif, Ahmed A.
    Abd-El-Atty, Bassem
    Venegas-Andraca, Salvador E.
    Elwahsh, Haitham
    Piran, Md Jalil
    Bashir, Ali Kashif
    Song, Oh-Young
    Mazurczyk, Wojciech
    [J]. IEEE ACCESS, 2020, 8 : 92687 - 92696
  • [16] A Sensor Link Control Protocol for Providing End-to-End Reliability in Sensor Networks
    Kim, Nam-Gon
    Seok, Seung-Joon
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (03): : 379 - 389
  • [17] Providing end-to-end fairness in wireless mesh networks with chain topologies
    Hsu, Chih-Wei
    Wang, Chien-Yi
    Hou, Ting-Chao
    [J]. PROCEEDINGS OF THE 18TH IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 2006, : 655 - +
  • [18] Location-aware routing for data aggregation in sensor networks
    Beaver, J
    Sharaf, MA
    Labrinidis, A
    Chrysanthis, PK
    [J]. GEOSENSOR NETWORKS, 2005, : 189 - 209
  • [19] Location-aware Affinity Propagation Clustering in Wireless Sensor Networks
    ElGammal, Mahmoud
    Eltoweissy, Mohamed
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, : 471 - 475
  • [20] Trust and Location-Aware Routing Protocol for Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. IETE JOURNAL OF RESEARCH, 2016, 62 (05) : 634 - 644