Security topology in wireless sensor networks with routing optimisation

M. Ismail, M. Y. Sanavullah
{"title":"Security topology in wireless sensor networks with routing optimisation","authors":"M. Ismail, M. Y. Sanavullah","doi":"10.1109/WCSN.2008.4772673","DOIUrl":null,"url":null,"abstract":"Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to different sensory organs in human beings) for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is the development of architecture for secure communication in mobile wireless networks. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on a clustered network is a novelty.","PeriodicalId":338962,"journal":{"name":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","volume":"8 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"31","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Fourth International Conference on Wireless Communication and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCSN.2008.4772673","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 31

Abstract

Multiple sensor nodes deployed in a common neighborhood to sense an event and subsequently transmit sensed information to a remote processing unit or base station, has been the recent focus of research. Tiny sensor nodes, which consist of sensing, data processing, and communicating components, leverage the idea of sensor networks based on collaborative effort of a large number of nodes. These numerous sensors are used (similar to different sensory organs in human beings) for delivering crucial information in real-time from environments and processes, where data collection is impossible previously with wired sensors [1]. Typically, wireless sensor networks are composed of low power sensor nodes and integrate general-purpose computing with heterogeneous sensing and wireless communication. Their emergence has enabled observation of the physical world at an unprecedented level of granularity. One of the most important components of a sensor node is the power unit and may be supported in most applications by a power scavenging unit such as solar cells. Hence, there is a major limitation in a wireless sensor networks, such as, the sensor nodes must consume extremely low power. Also, wireless networks are subject to various kinds of attacks and wireless communication links can be eavesdropped on without noticeable effort and communication protocols on all layers are vulnerable to specific attacks. In contrast to wire-line networks, known attacks like masquerading, man-in-the-middle, and replaying of messages can easily be carried out. Hence, a fundamental issue in the design of wireless sensor networks is the reliability i.e. how long can the wireless sensor networks survive and how well are the wireless sensor networks recovery after the malicious attacks. In this context, in this thesis, the power, mobility, and task management planes that can monitor the power, movement, and task distribution among the sensor nodes are proposed. These planes help the sensor nodes coordinate the sensing task and also lower the overall power consumption. In addition, a secure topology discovery algorithm is proposed and its performance is studied for different types of node distributions. The proposed work is the development of architecture for secure communication in mobile wireless networks. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on a clustered network is a novelty.
基于路由优化的无线传感器网络安全拓扑
多个传感器节点部署在一个共同的社区感知事件,随后将感知到的信息传输到远程处理单元或基站,是最近的研究热点。微型传感器节点由传感、数据处理和通信组件组成,利用了基于大量节点协作努力的传感器网络的思想。这些众多的传感器(类似于人类的不同感觉器官)用于从环境和过程中实时传递关键信息,而以前使用有线传感器[1]是不可能收集数据的。通常,无线传感器网络由低功耗传感器节点组成,并将通用计算与异构感知和无线通信相结合。它们的出现使人们能够以前所未有的粒度水平观察物理世界。传感器节点最重要的组件之一是动力单元,在大多数应用中,它可以由诸如太阳能电池之类的动力清除单元来支持。因此,在无线传感器网络中存在一个主要的限制,例如,传感器节点必须消耗极低的功率。此外,无线网络受到各种攻击,无线通信链路可以不费力地被窃听,所有层上的通信协议容易受到特定攻击。与有线网络相比,伪装、中间人攻击和重放消息等已知攻击很容易实现。因此,无线传感器网络设计的一个基本问题是可靠性,即无线传感器网络的生存时间和遭受恶意攻击后的恢复能力。在此背景下,本文提出了功率、移动和任务管理平面,可以监控传感器节点之间的功率、运动和任务分配。这些平面有助于传感器节点协调传感任务,也降低了整体功耗。此外,提出了一种安全拓扑发现算法,并对其在不同类型节点分布下的性能进行了研究。提出的工作是开发移动无线网络中的安全通信体系结构。该方法将网络划分为集群,并实现分散的证书颁发机构。去中心化是使用阈值加密和分布在多个节点上的网络秘密来实现的。虽然前面已经部分地提出了这个基本思想,但它在集群网络上的应用是一个新事物。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信