𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Issues for Wireless Sensor Networks

✍ Scribed by Parag Verma, Ankur Dumka, Anuj Bhardwaj, Navneet Kaur


Publisher
CRC Press
Year
2022
Tongue
English
Leaves
271
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance.

This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task.

This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Contents
1. Introduction to Wireless Sensor Networks
Introduction
Issues and Challenges
Architecture for WSNs
Types of Sensors
Components of WSNs
Types of Wireless Sensor Networks
Applications of WSNs
Protocols in WSNs
SPINS: Security Protocols for Sensor Networks
LEAP: Localized Encryption and Authentication Protocol
Gradient-Based Routing (GBR)
Active Query Forwarding in Sensor Network (ACQUIRE)
Probabilistic Key Distribution Schemes
Deterministic Key Distribution Schemes
References
2. Security in Wireless Sensor Networks - Background
Introduction
Constraints in Sensor Networks
Unreliable Communication
Node Constraints
Battery Power/Energy
Recharge Ability
Sleep Patterns
Transmission Range
Memory Limitations
Unattended Operations
Network Constraints
Ad Hoc Networking
Limited Preconfiguration
Data Rate/Packet Size
Channel Error Rate
Intermittent Connectivity
Unreliable Communications
Higher Latency in Communication
Frequent Routing Changes
Unknown Recipients
Physical Limitation
Characteristics of Sensor Networks
Power Efficiency
Scalability
Responsiveness
Reliability
Mobility
Compact Size
Physical Security
Memory Space
Bandwidth
Security Goals for Sensor Networks
Confidentiality
Integrity
Authentication
Data Freshness
Availability
Self-Organization
Secure Localization
Time Synchronization
Security Classes
Attacks on Sensor Networks
Passive Information Gathering
Attacks Against Privacy
Monitor and Eavesdropping
Traffic Analysis
Camouflage Adversaries
Active Attacks
Routing Attacks
Spoofed, Altered and Replayed Routing Information
Selective Forwarding
Sinkhole Attack
Sybil Attacks
Wormhole Attacks
HELLO Flood Attacks
Denial of Service
Node Subversion
Node Malfunction
Node Outage
Physical Attacks
False Node
Node Replication Attacks
Layering-Based Security Approach
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application Layer
Conclusion
References
3. QoS as a Means of Providing WSN Security
Introduction
Quality of Services in Wireless Sensor Networks
QoS Concept and Security Effect
QoS Challenges in Sensor Networks
QoS Metrics in WSN Layers
Application-Specific QoS Parameters
Network-Specific QoS Parameters
Related Studies
Reliability, Availability and Serviceability (RAS)
Calculating Probability of Node Availability in a WSN
Experiments and Evaluations
Conclusion
References
4. The Security Framework for Wireless Sensor Networks
Introduction
Security Requirements in WSNs
Wireless Sensor Networks' Security Framework
The Secure Triple-Key Management Scheme
Base Station to Node Key Calculation
Nodes to Cluster Leader Key Calculation
Cluster Leader to Next Hop Cluster Leader Key Calculation
Cluster Leader to Base Station Key Calculation
Analysis of Secure Triple-Key Management Scheme
Secure Routing
Node Algorithm
Secure Localization
Determining the Node Location
Securing the Node Location: An Analysis
Malicious Node Detection Mechanism
Threat Model
Trust Model
Trust Evaluation Model
Trust Evaluation of the Sensor Node
Data Trust of the Sensor Node
Direct Data Trust
Regional Relative Trust
Data Trust of the Sensor Node
Historical Data Trust
Behavior Trust of the Sensor Node
Direct Behavior Trust
Behavior Trust of the Sensor Node
Historical Behavior Trust
Comprehensive Trust of the Sensor Node
Historical Trust of the Sensor Node
Trust Evaluation of the Relay Node
Data Trust
Trust List
Conclusion
References
5. Secure Key Management Scheme (SKMS)
Introduction
Key Management in a Wireless Sensor Network
Key Management Schemes
Pre-Distribution Key Management Schemes
Key Pool-Based Pre-Distribution Key Management Schemes
Pair-Wise Key-Based Pre-Distribution Key Management Schemes
Key Space-Based Pre-Distribution Key Management Schemes
Group-Based Probabilistic Pre-Distribution Key Management Schemes
Grid-Based Pre-Distribution Key Management Schemes
Deployment Knowledge-Based Pre-Distribution Key Management Schemes
Polynomial-Based Probabilistic Pre-Distribution Key Management Schemes
Matrix-Based Pre-Distribution Key Management Schemes
Tree-Based Pre-Distribution Key Management Schemes
Combinatorial Design-Based Pre-Distribution Key Management Schemes
Hypercube-Based Pre-Distribution Key Management Schemes
ID-Based Pre-Distribution Key Management Schemes
Energy-Aware Pre-Distribution Key Management Schemes
Location-Based Pre-Distribution Key Management Schemes
Cluster-Based Pre-Distribution Key Management Schemes
Other Pre-Distribution Key Management Schemes
In Situ Key Management Schemes
Challenges Faced by Key Management in a WSN
Evaluation Metrics for KMS in a WSN
Security Metrics
Efficiency Metric
Flexibility Metric
Proposed Advanced EG Scheme for WSN Security
Key Pre-Distribution Phase
Shared Key Discovery Phase
Path Key Establishment Phase
Analysis and Simulation Result
Connectivity
Safety Analysis: Resilience against Attack Capture Nodes
Conclusion
References
6. Secure Routing Algorithms (SRAs) in Sensor Networks
Introduction
Challenges of Design Tasks of Routing Protocol for a WSN
Classification of Routing Protocols in a WSN
Attribute-Based or Data-Centric Routing Protocols
Flooding and Gossiping
SPIN
Directed Diffusion
Rumor Routing
Gradient-Based Routing
Hierarchical-Based Routing (Clustering) or Node-Centric Routing Protocol
LEACH
PEGASIS and Hierarchical-PEGASIS
TEEN and APTEEN
Energy-Aware Cluster-Based Routing Algorithm
Location-Based Routing (Geographic Protocol)
MECN and SMECN
GEAR (Geographic and EnergyAware Routing)
GAF and HGAF
Fermat Point-Based Energy-Efficient Geocast Routing Protocol
Multi-Path Routing Protocol
N-to-1 Multi-Path Routing Protocol
Multi-Path Multi-Speed Protocol (MMSPEED)
Braided Multi-Path Routing Protocol
Energy-Aware Routing
Comparison of Routing Protocols
Routing Attacks in Wireless Sensor Networks
Sybil Attack
Black Hole Attack
Denial of Service Attack
Wormhole Attack
Hello Flood Attack
Grey Hole Attack
Conclusion
References
7. Secure Localization Technique (SLT)
Introduction
Operational Challenges in WSNs
Secure Localization Process
Classification of Localization Techniques
Direct Approaches
Indirect Approaches
Range-Based Localization
Range-Free Localization
Attack Model
Elementary Attacks
Range Change Attack
False Beacon Location Attack
Combinational Attacks
Impersonation
Sybil Attack
Replay Attack
Wormhole Attack
Location-Reference Attack
Existing Solutions of Secure Localization Systems
Node-Centric Secure Localization
The Prevention Method
The Detection Method
The Filtering Method
Infrastructure-Centric Secure Localization
Existing Secure Localization Systems
SeRLoc
Beacon Suite
Attack-Resistant Location Estimation
Robust Statistical Methods
SPINE
ROPE
Transmission Range Variation
DRBTS
HiRLoc
Proposed Secure Localization Technique (SLT)
Network Model and Assumptions
Results and Discussion
Summary
References
8. Malicious Node Detection Mechanisms
Introduction
Security Threats Against Wireless Sensor Networks
Abnormality Detection
Misuse Detection
Specification-Based Detection
Literature on Malicious Node Detection
Suspicious Node Detection by Signal Strength
The Model
Suspicious Message Detection by Signal Strength (SMDSS)
Suspicious Node Information Dissemination Protocol (SNIDP)
Proposed Malicious Node Detection Mechanism
Feature Extraction
Link Stability Features (LSFs)
Probabilistic Features
Randomness Features
Credit Features
Classification
Result and Discussion
Notes
References
9. The Distributed Signature Scheme (DSS) Based on RSA
Introduction
Related Work
Threshold Signatures
Distributed Signatures
Mesh Signatures
Attribute-Based Signatures
RSA-Based Secure Schemes
RSA-Based DSS
Distributed Signature Features
RSA-Based Secret Key Distributions Main Approaches
Our Approach on Scheme Establishment
Scheme Initialization
Generation of Distributive Signature
Key Projection Distribution to New User
Summary
References
Index


πŸ“œ SIMILAR VOLUMES


Security for Wireless Sensor Networks
✍ Donggang Liu, Peng Ning (auth.) πŸ“‚ Library πŸ“… 2007 πŸ› Springer US 🌐 English

<p><P>Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.</P><P><STRONG>Security for Wireless Sensor Networks</STRONG> discusses fundamental security issues in wireless sensor networks, techniques for the prote

Security for Wireless Sensor Networks (A
✍ Donggang Liu, Peng Ning πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

This book discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security. It contains example applications for target tracking, scientific exploration and data acquisition i

Security in Wireless Sensor Networks
✍ George S. Oreku, Tamara Pazynyuk (auth.) πŸ“‚ Library πŸ“… 2016 πŸ› Springer International Publishing 🌐 English

<p>This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts a

Security for Wireless Sensor Networks us
✍ Patil, H.K. and Szygenda, S.A. πŸ“‚ Library πŸ“… 2012 πŸ› Taylor & Francis 🌐 English

<p>Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN securityβ€”detailing its pros and cons. Next, it examines new attack vect

Security for wireless sensor networks us
✍ Patil, Kupwade Harsh;, Szygenda A(Stephen) πŸ“‚ Library πŸ“… 2013;2016 πŸ› CRC Press 🌐 English

<strong>The 7 Qualities of Highly Secure Software</strong>provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the

Secure Wireless Sensor Networks: Threats
✍ Mauro Conti (auth.) πŸ“‚ Library πŸ“… 2015 πŸ› Springer-Verlag New York 🌐 English

<p><p>This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions