LEDS: Providing location-aware end-to-end data security in wireless sensor networks

被引:93
|
作者
Ren, Kui [1 ]
Lou, Wenjing [2 ]
Zhang, Yanchao [3 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[2] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[3] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
data security; wireless sensor network; end-to-end; DoS attack; false-data injection attack;
D O I
10.1109/TMC.2007.70753
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and, hence, are exposed to many types of severe insider attacks due to node compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption attacks and selective forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations and each node stores a few keys based on its own location. This location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. The proposed multifunctional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes. Moreover, the proposed data delivery approach guarantees efficient en-route bogus data filtering and is highly robust against DoS attacks. The evaluation demonstrates that the proposed design is highly resilient against an increasing number of compromised nodes and effective in energy savings.
引用
收藏
页码:585 / 598
页数:14
相关论文
共 50 条
  • [1] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2584 - 2595
  • [2] Data Aggregation with End-to-End Security for Wireless Sensor Networks
    Guo, Jiang-Hong
    Wu, Jian-Qiang
    Wu, Xi-Hong
    MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 383 - 386
  • [3] Providing end-to-end secure communications in wireless sensor networks
    Gu W.
    Dutta N.
    Chellappan S.
    Bai X.
    IEEE Transactions on Network and Service Management, 2011, 8 (03): : 205 - 218
  • [4] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chi-Tung Chen
    Shu-Yan Huang
    Iuon-Chang Lin
    EURASIP Journal on Wireless Communications and Networking, 2012
  • [5] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chen, Chi-Tung
    Huang, Shu-Yan
    Lin, Iuon-Chang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [6] End-to-End Reliability-Aware Scheduling for Wireless Sensor Networks
    Dobslaw, Felix
    Zhang, Tingting
    Gidlund, Mikael
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) : 758 - 767
  • [7] End-to-End Delay Minimization in an Application Aware Routing for Wireless Sensor Networks
    Comsa, Anamaria
    Ivanciu, Iustin
    Luchian, Eduard
    Dobrota, Virgil
    Steenhaut, Kris
    2015 14TH ROEDUNET INTERNATIONAL CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET NER), 2015, : 80 - 84
  • [8] Temporal Privacy Scheme for End-to-End Location Privacy in Wireless Sensor Networks
    Abuzneid, Abdel-shakour
    Sobh, Tarek
    Faezipour, Miad
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [9] Providing End-to-End Delay Guarantees for Multi-hop Wireless Sensor Networks
    Hou, I-Hong
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 414 - 419
  • [10] Location-aware security services for wireless sensor networks using network coding
    Ayday, Erman
    Delgosha, Farshid
    Fekri, Faramarz
    INFOCOM 2007, VOLS 1-5, 2007, : 1226 - +