LEDS: Providing location-aware end-to-end data security in wireless sensor networks

被引:93
|
作者
Ren, Kui [1 ]
Lou, Wenjing [2 ]
Zhang, Yanchao [3 ]
机构
[1] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[2] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[3] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
美国国家科学基金会;
关键词
data security; wireless sensor network; end-to-end; DoS attack; false-data injection attack;
D O I
10.1109/TMC.2007.70753
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing desirable data security, that is, confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is challenging, as a WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and, hence, are exposed to many types of severe insider attacks due to node compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as report disruption attacks and selective forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations and each node stores a few keys based on its own location. This location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. The proposed multifunctional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes. Moreover, the proposed data delivery approach guarantees efficient en-route bogus data filtering and is highly robust against DoS attacks. The evaluation demonstrates that the proposed design is highly resilient against an increasing number of compromised nodes and effective in energy savings.
引用
收藏
页码:585 / 598
页数:14
相关论文
共 50 条
  • [41] A Comprehensive Analysis of the End-to-End Delay for Wireless Multimedia Sensor Networks
    Abbas, Nasim
    Yu, Fengqi
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (06) : 2456 - 2467
  • [42] A Location-Aware Routing with Hole Detouring Technique for Wireless Sensor Networks
    Park, Yong Suk
    Lee, Kyu Yeol
    Ca Van Phan
    Choi, Hyo Hyun
    Kim, Jeong Geun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (03) : 827 - 830
  • [43] End-to-end performance aware association mechanism for wireless municipal mesh networks
    Luo, Lin
    Liu, Hang
    Wu, Mingquan
    Li, Dekai
    COMPUTER COMMUNICATIONS, 2008, 31 (08) : 1602 - 1614
  • [44] A location-aware key predistribution scheme for distributed wireless sensor networks
    Canh, Ngo Trong
    Van Phuong, Tran
    Lee, Young-Koo
    Lee, Sungyoung
    Lee, Heejo
    2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 197 - +
  • [45] Audio Beacon Providing Location-Aware Content for Low-End Mobile Devices
    Cavalcante, Andre M.
    Paiva, Rafael C. D.
    Iida, Renato
    Fialho, Alvaro
    Costa, Afonso
    Vieira, Robson D.
    2012 INTERNATIONAL CONFERENCE ON INDOOR POSITIONING AND INDOOR NAVIGATION (IPIN), 2012,
  • [46] Adjusting sink location to reduce end-to-end delay in low-duty-cycle wireless sensor networks
    Lin, Yu-Yuan
    Ssu, Kuo-Feng
    Chiang, Hau-Yu
    Journal of Electronic Science and Technology, 2015, 13 (01) : 20 - 26
  • [47] Adjusting Sink Location to Reduce End-to-End Delay in Low-Duty-Cycle Wireless Sensor Networks
    Yu-Yuan Lin
    Kuo-Feng Ssu
    Hau-Yu Chiang
    Journal of Electronic Science and Technology, 2015, 13 (01) : 20 - 26
  • [48] Providing end-to-end QoS for multimedia applications in 3G wireless networks
    Guo, K
    Rangarajan, S
    Siddiqui, MA
    Paul, S
    INTERNET MULTIMEDIA MANAGEMENT SYSTEMS IV, 2003, 5242 : 184 - 197
  • [49] Evaluating CoAP end to end Security for Constrained Wireless Sensor Networks
    Fournaris, Apostolos P.
    Giannoulis, Spilios
    Koulamas, Christos
    2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
  • [50] EACK: End-to-End Acknowledgement-Based Method for Reliable Data Collection in Wireless Sensor Networks
    Heydari, Vahid
    Yoo, Seong-Moo
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 13 - 16