Security for Wireless Sensor Networks (eBook)

, (Autoren)

eBook Download: PDF
2007 | 2007
XII, 212 Seiten
Springer US (Verlag)
978-0-387-46781-8 (ISBN)

Lese- und Medienproben

Security for Wireless Sensor Networks - Donggang Liu, Peng Ning
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the protection of such networks, as well as results from recent studies in wireless sensor network security.



This volume assists both professionals and students to understand background knowledge in wireless sensor network security and prepare them for producing research in this domain.Security for Wireless Sensor Networks is designed for a professional audience composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science.


The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional wireless sensor nodes to monitor and report the conditions and events in their local environments. A large collection of these sensor nodes can thus form a wireless sensor network in an ad hoc manner, creating a new type of information systems. Such sensor networks have recently emerged as an important means to study and interact with the physical world and have received a lot of attention due to their wide applications in military and civilian operations such as target tracking and data acquisition. However, in many of these applications, wireless sensor networks could be deployed in hostile environments where there are malicious attacks against the network. Providing security services in sensor networks, however, turns out to be a very challenging task. First, sensor nodes usually have limited resources such as storage, bandwidth, computation and energy. It is often undesirable to implement expensive algorithms (e. g. , frequent public key operations) on sensor nodes. Second, sensor nodes are usually deployed unattended and built without compromise prevention in mind. An attacker can easily capture and compromise a few sensor nodes without being noticed. When sensor nodes are compromised, the attacker can learn all the secrets stored on them and launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes.

Preface 7
Contents 9
1 Introduction 12
1.1 Wireless Sensor Network 12
1.2 Design Challenges 13
1.3 Security Issues in Sensor Networks 14
1.4 Orgnization of the Book 18
2 Broadcast Authentication 20
2.1 pTESLA Broadcast Authentication 21
2.2 Multi-Level pTESLA 23
2.3 Tree-Based pTESLA 53
2.4 Summary 68
3 Pairwise Key Establishment 70
3.1 Key Pre-Distribution Techniques in Sensor Networks 71
3.2 Polynomial Pool-Based Key Pre-Distribution 74
3.3 Key Pre-Distribution Using Random Subset Assignment 78
3.4 Hypercube-based Key Pre-Distribution 88
3.5 Implement at ion and Evaluation 103
3.6 Summary 107
4 Improving Pairwise Key Establishment Using Deployment Knowledge 110
4.1 Improving Key Pre-Distribution with Prior Deployment Knowledge 111
4.2 Improving Key Pre-Distribution with Post Deployment Knowledge 131
4.3 Improving Key Pre-Distribution with Group Deployment Knowledge 140
4.4 Summary 159
5 Secure Localization 160
5.1 Localization in Sensor Networks 161
5.2 Pitfalls of Current Localization Schemes under Attacks 162
5.3 Attack-Resistant Location Estimation 164
5.4 A Detector for Malicious Beacon Nodes 186
5.5 Summary 205
6 Summary and Future Work 208
6.1 Summary 208
6.2 Future Work 209
References 212
Index 218

1.3.2 Pairwise Key Establishment (p. 5)
Pairwise key establishment is another important fundamental security service. It enables sensor nodes to communicate securely with each other using cryptographic techniques. The main problem here is to establish a secure key shared between two communicating sensor nodes. However, due to the resource con- straints on sensor nodes, it is not feasible for them to use traditional pairwise key establishment techniques such as public key cryptography and key distribution center (KDC).

Instead of the above two techniques, sensor nodes may establish keys between each other through key pre-distribution , where keying materials are pre-distributed to sensor nodes before deployment. As two extreme cases, one may setup a global key among the network so that two sensor nodes can establish a key based on this key, or one may assign each sensor node a unique random key with each of the other nodes. However, the former is vulnerable to the compromise of a single node, and the latter introduces huge storage overhead at sensor nodes.

Eschenauer and Gligor proposed a probabilistic key pre-distribution scheme recently for pairwise key establishment [20]. The main idea is to let each sensor node randomly pick a set of keys from a key pool before the deployment so that any two sensor nodes have a certain probability to share at least one common key. Chan et al. further extended this idea and developed two key pre-distribution techniques: a q-composite key pre-distribution scheme and a random pairwise keys scheme [12]. The q-composite key pre-distribution also uses a key pool but requires that two nodes compute a pairwise key from at least q pre-distributed keys that they share. The random pairwise keys scheme randomly picks pairs of sensor nodes and assigns each pair a unique random key. Both schemes improve the security over the basic probabilistic key pre-distribution scheme.

However, the pairwise key establishment problem is still not fully solved. For the basic probabilistic and the q-composite key pre-distribution schemes, as the number of compromised nodes increases, the fraction of affected pairwise keys increases quickly. As a result, a small number of compromised nodes may disclose a large fraction of pairwise keys. Though the random pairwise keys scheme does not suffer from the above security problem, given a memory constraint, the network size is strictly limited by the desired probability that two sensor nodes share a pairwise key, the memory available for keys on sensor nodes, and the number of neighbor nodes that a sensor node can communicate with. Techniques to address this problem are provided Chapter 3 and Chapter 4.

1.3.3 Security in Localization
Sensors' locations play a critical role in many sensor network applications. Not only do applications such as environment monitoring and target tracking require sensors' location information to fulfill their tasks, but several fundamental techniques developed for wireless sensor networks also require sensor nodes' locations. For example, in geographical routing protocols (e.g., GPSR [35] and GEAR [80]), sensor nodes make routing decisions at least partially based on their own and their neighbors' locations.

Erscheint lt. Verlag 15.2.2007
Reihe/Serie Advances in Information Security
Advances in Information Security
Zusatzinfo XII, 212 p. 83 illus.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Naturwissenschaften
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Information • Liu • Network Security • Ning • security • sensor networks • Wireless • wireless sensor network
ISBN-10 0-387-46781-5 / 0387467815
ISBN-13 978-0-387-46781-8 / 9780387467818
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 43,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das Praxishandbuch zu Krisenmanagement und Krisenkommunikation

von Holger Kaschner

eBook Download (2024)
Springer Fachmedien Wiesbaden (Verlag)
34,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99