• Article
  • | |
  • Metrics
  • |
  • Reference [34]
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    Security issue of sensor networks is greatly different from that of conventional networks, in terms of its specific requirements, constrained resources of nodes, and variety of network characteristics. The security architecture of sensor networks is proposed, trying to outline a general illustration on this area. The following three topics are discussed: 1) Security primitives such as SKE, MAC and PKC; 2) Various keying mechanisms for the key management issue; 3) Joint considerations on network-related issues including routing, energy and fault tolerance.Other open security issues and further challenges are also addressed.

    Reference
    [1]Chong CY,Kumar SP.Sensor networks:Evolution,opportunities,and challenges.Proc.of the IEEE,2003,91(8):1247-1256.
    [2]Krishnamachari L,Estrin D,Wicker S.The impact of data aggregation in wireless sensor networks In:Proc.of the 22nd IEEE Int'l Conf.on Distributed Computing Systems Vienna:IEEE Computer Society,2002.575-578.
    [3]Ren FY,Huang HN,Lin C.Wireless sensor networks.Journal of Software,2003,14(7):1282-1291 (in Chinese with English abstract).http://www.jos.org.cn/1000-9825/14/1282.htm
    [4]Perrig A,Szewczyk R,Wen V,Culler D,Tygar JD.SPINS:Security protocols for sensor networks.In:Proc.of the 7th Annual Int'l Conf.on Mobile Computing and Networks.Rome ACM Press,2001.189-199.
    [5]The official website of the ZigBee alliances.http://www.zigbee.org
    [6]Doumit S,Agrawal DP.Self-Organized criticality and stochastic learning-based intrusion detection system for wireless sensor networks.MILCOM 2003-IEEE Military Communications Conf,2003,22(1):609-614.
    [7]Akyildiz IF,Su W,Sankarasubramaniam Y,Cayirci E.Wireless sensor networks:A survey.Computer Networks,2002,38(4):393-422.
    [8]Huang Q,Cukier J,Kobayashi H,Liu BD,Zhang JY.Fast authenticated key establishment protocols for wireless sensor networks.In:Proc.of the 2nd ACM Int'l Conf.on Wireless Sensor Networks and Applications.San Diego:ACM Press,2003.141-150.
    [9]Zhu S,Setia S,Jajodia S.LEAP:Efficient security mechanisms for large-scale distributed sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security (CCS2003).Washington D.C.,2003.62-72.
    [10]Chan H,Perrig A,Song D.Random key predistribution schemes for sensor networks.In:Proc.of the IEEE Symp.on Research in Security and Privacy.Oakland:IEEE Computer Society,2003.197-213.
    [11]Ganesan P,Venugopalan R,Peddabachagari P,Dean A,Mueller F,Sichitiu M.Analyzing and modeling encryption overhead for sensor network nodes.In:Proc.of the WSNA.2003.151-159.
    [12]Biryukov A.Block ciphers and stream ciphers:The state of the art.http://www.esat.kuleuven.ac.be/~abiryuko/lecturenotes.pdf
    [13]Chen X,Woo T.Energy efficient data encryption algorithms.2002.http://www.(vl)si.uwaterloo.ca/thwoo/ece750report.pdf
    [14]Malan DJ,Welsh M,Smith MD.A publio-key infrastructure for key distribution in Ting OS based on elliptic curve cryptography.http://airclic.eecs.harvard.edu/publications/secon04.pdf
    [15]Crossbow I.Technology MICA2:Wireless measurement system.http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/6020-0042-04 A MICA2.pdf
    [16]Du WL,Wang RH,Ning P.An efficient scheme for authenticating public keys in sensor networks In:Proc.of the 6th ACM Int'l Symp.on Mobile Ad Hoc Networking and Computing (MobiHoc2005).Urbana-Champaign:ACM Press,2005.58-67.
    [17]NAI Laboratory.Advanced research on distributed sensor network security.http://www.networkassociates.com/us/_tier0/nailabs/_media/documents/dsns.pdf
    [18]Goldreich O,Goldwasser S,Micali S.How to construct random functions.Journal of the ACM,1986,33(4):792-807.
    [19]Park TJ,Arbor A,Shim IB.LiSP:A light-weight security protocol for wireless sensor networks ACM Trans.on Embedded Computing Systems,2004,3(3):634-660.
    [20]Estrin D,Govindan R,Heideman J,Kumar S.Next century challenges:Scalable coordination in sensor networks.In:Proc.of the5th Annual ACM/IEEE Int'l Conf.on Mobile Computing and Networking.New York:ACM Press,1999.263-270.
    [21]Eschenauer L,Gligor VD.A key-management scheme for distributed sensor networks.In:Proc.of the 9th ACM Conf.on Computer and Communications Security.Washington DC:ACM Press,2002.41-47.
    [22]Blundo C,Santis AD,Herzberg A,Kutten S,Vaccaro U,Yung M.PerfectlySecure key distribution for dynamic conferences.In:Advances in Cryptology-CRYPTO'92.Santa Barbara:LNCS,1992.471-486.
    [23]Liu DG,Ning P,Li RF.Establishing pairwise keys in distributed sensor networks ACM Trans.on Information and System Security,2005,8(1):41-77.
    [24]Liu DG,Ning P.Location-Based pairwise key establishments for static sensor networks http://discovery.csc.ncsu.edu/~pning/pubs/sasn03.pdf
    [25]Du W,Deng J,Han YS,Varshney PK.A pairwise key prodistribution scheme for wireless sensor networks.In:Proc.of the 10th ACM Conf.on Computer and Communications Security.Washingtion:ACM Press,2003.42-51.
    [26]Zhang W,Cao G.Group rekeying for filtering false data in sensor networks:A predistribution and local collaboration-based approach.http://www.cse.psu.edu/~wezhang/papers/paper-infocom05.pdf
    [27]Lazos O,Poovendran R.Energy-Aware secure multicast communication in ad-hoc networks using geographic location information In:Proc.of the IEEE Int'l Symp.on Advances in Wireless Communications (ISWC2002).Victoria:IEEE Press,2002.201-204.
    [28]Slijepcevic S,Potkonjak M,Tsiatsis V,Zimbeck S,Srivastava MB.On communication security in wireless ad-hoc sensor network.In:Proc.of the 11th IEEE Int'l Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises (WETICE2002).Pittsburgh:IEEE Computer Society,2002.139-144.
    [29]Cam H,Ozdemir S,Muthuavinashiappan D,Nair P.Energy-Efficient security protocol for wireless sensor networks.http://www.eas.asu.edu/~hasancam/publications/security_sensor-2003.pdf
    [30]Deng J,Han R,Mishra S.Enhancing base station security in wireless sensor networks.http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-951-03.pdf
    [31]Wood AD,Stankovic JA.Denial of service in sensor networks.IEEE Computer,2002,35(10):54-62.
    [32]Karlof C,Wagner D.Secure routing in wireless sensor networks:Attacks andcountermeasures.In:Proc.of the 1st IEEE Int'l Workshop on Sensor Network Protocols and Applications Piscataway:IEEE Press,2003.113-127.
    [33]Deng J,Han R,Mishra S.A performance evaluation of intrusion-tolerant routing in wireless sensor networks In:Proc.of the 2nd Int'l Workshop on Information Processing in Sensor Networks (IPSN2003).California:IEEE Press,2003.349-364.
    [3]任丰原,黄海宁,林闯.无线传感器网络.软件学报,2003,14(7):1282-1291.http://www.jos.org.cn/1000-9825/14/1282.htm
    Related
    Cited by
Get Citation

李平,林亚平,曾玮妮.传感器网络安全研究.软件学报,2006,17(12):2577-2588

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:February 06,2004
  • Revised:July 08,2005
You are the first2045158Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063