Autosoft Journal

Online Manuscript Access


Security Completeness Problem in Wireless Sensor Networks


Authors



Abstract

With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integration of all these three aspects in a single solution for resource constraints wireless sensor networks is not trivial. Current research intensively focuses on all these three aspects in an isolated manner. To the best of our knowledge, we have not found any work in the literature that comprehensively discusses: how these various privacy, security and trust solutions work together? In this work, we have made the first step towards this direction and to show how integration of various privacy, security and trust solutions can be performed in a single solution in step-by-step manner.


Keywords


Pages

Total Pages: 16
Pages: 235-250

DOI
10.1080/10798587.2014.970345


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 21
Issue: 2
Year: 2014

Cite this document


References

Ahmed, Khandakar, and Mark Gregory. "Integrating Wireless Sensor Networks with Cloud Computing." 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks (2011): n. pag. Crossref. Web. https://doi.org/10.1109/MSN.2011.86

Ahmed, Muhammad R., Xu Huang, and Dharmendra Sharma. "A Novel Misbehavior Evaluation with Dempster-Shafer Theory in Wireless Sensor Networks." Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing - MobiHoc ”12 (2012): n. pag. Crossref. Web. https://doi.org/10.1145/2248371.2248414

Aivaloglou, Efthimia, Stefanos Gritzalis, and Charalabos Skianis. "Towards a Flexible Trust Establishment Framework for Sensor Networks." Telecommunication Systems 35.3-4 (2007): 207-213. Crossref. Web. https://doi.org/10.1007/s11235-007-9049-x

Alamri, Atif et al. "A Survey on Sensor-Cloud: Architecture, Applications, and Approaches." International Journal of Distributed Sensor Networks 9.2 (2013): 917923. Crossref. Web. https://doi.org/10.1155/2013/917923

Boukerch, A., L. Xu, and K. EL-Khatib. "Trust-Based Security for Wireless Ad Hoc and Sensor Networks." Computer Communications 30.11-12 (2007): 2413-2427. Crossref. Web. https://doi.org/10.1016/j.comcom.2007.04.022

Boyle, David, and Thomas Newe. "Securing Wireless Sensor Networks: Security Architectures." Journal of Networks 3.1 (2008): n. pag. Crossref. Web. https://doi.org/10.4304/jnw.3.1.65-77

Chai, Guofei et al. "Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity." International Journal of Distributed Sensor Networks 8.4 (2012): 648058. Crossref. Web. https://doi.org/10.1155/2012/648058

Chen, Gilbert et al. "Sense: A Wireless Sensor Network Simulator." Advances in Pervasive Computing and Networking 249-267. Crossref. Web. https://doi.org/10.1007/0-387-23466-7_13

Chen H. Pervasive and Mobile Computing

Cionca, Victor, Thomas Newe, and Vasile Teodor Dădârlat. "Configuration Tool for a Wireless Sensor Network Integrated Security Framework." Journal of Network and Systems Management 20.3 (2011): 417-452. Crossref. Web. https://doi.org/10.1007/s10922-011-9219-8

Duan, Junqi et al. "TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 10.1 (2014): 209436. Crossref. Web. https://doi.org/10.1155/2014/209436

Feng R. International Journal of Distributed Sensor Networks

Ganeriwal, Saurabh, Laura K. Balzano, and Mani B. Srivastava. "Reputation-Based Framework for High Integrity Sensor Networks." ACM Transactions on Sensor Networks 4.3 (2008): 1-37. Crossref. Web. https://doi.org/10.1145/1362542.1362546

Gong, Zheng et al. "TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks." Journal of Computer Science and Technology 29.1 (2014): 53-68. Crossref. Web. https://doi.org/10.1007/s11390-013-1411-8

Gómez Mármol, Félix, and Gregorio Martínez Pérez. "Providing Trust in Wireless Sensor Networks Using a Bio-Inspired Technique." Telecommunication Systems 46.2 (2010): 163-180. Crossref. Web. https://doi.org/10.1007/s11235-010-9281-7

Haowen Chan, and A. Perrig. "Security and Privacy in Sensor Networks." Computer 36.10 (2003): 103-105. Crossref. Web. https://doi.org/10.1109/MC.2003.1236475

Healy, Michael, Thomas Newe, and Elfed Lewis. "Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes." Lecture Notes Electrical Engineering 3-14. Crossref. Web. https://doi.org/10.1007/978-3-540-79590-2_1

Hsu, Shuo-Jen et al. "Conserving Bandwidth In A Wireless Sensor Network For Telemedicine Application." Intelligent Automation & Soft Computing 16.4 (2010): 537-551. Crossref. Web. https://doi.org/10.1080/10798587.2010.10643099

Huang, Shih-I, Shiuhpyng Shieh, and J. D. Tygar. "Secure Encrypted-Data Aggregation for Wireless Sensor Networks." Wireless Networks 16.4 (2009): 915-927. Crossref. Web. https://doi.org/10.1007/s11276-009-0177-y

Ishmanov, Farruh, Sung Kim, and Seung Nam. "A Secure Trust Establishment Scheme for Wireless Sensor Networks." Sensors 14.1 (2014): 1877-1897. Crossref. Web. https://doi.org/10.3390/s140101877

Jian, Y. et al. "Protecting Receiver-Location Privacy in Wireless Sensor Networks." IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (2007): n. pag. Crossref. Web. https://doi.org/10.1109/INFCOM.2007.227

Jose, J. & Princy, M. (2013, March). PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks. In Proceedings of 2013 international conference on emerging trends in computing, communication and nanotechnology (pp. 330–336)

Kamat, P. et al. "Enhancing Source-Location Privacy in Sensor Network Routing." 25th IEEE International Conference on Distributed Computing Systems (ICDCS”05) n. pag. Crossref. Web. https://doi.org/10.1109/ICDCS.2005.31

Kambourakis, Georgios, Stefanos Gritzalis, and Jong Hyuk Park. "Device Authentication In Wireless And Pervasive Environments." Intelligent Automation & Soft Computing 16.3 (2010): 399-418. Crossref. Web. https://doi.org/10.1080/10798587.2010.10643089

Karlof, Chris, Naveen Sastry, and David Wagner. "TinySec." Proceedings of the 2nd international conference on Embedded networked sensor systems - SenSys ”04 (2004): n. pag. Crossref. Web. https://doi.org/10.1145/1031495.1031515

Li, Xiaoyong, Feng Zhou, and Junping Du. "LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks." IEEE Transactions on Information Forensics and Security 8.6 (2013): 924-935. Crossref. Web. https://doi.org/10.1109/TIFS.2013.2240299

Li, Y., Li, J., Ren, J. & Wu, J. (2012). Providing hop-by-hop authentication and source privacy in wireless sensor networks. In IEEE international conference on computer communications (pp. 3071–3075)

Li, Yun, and Jian Ren. "Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks." 2010 Proceedings IEEE INFOCOM (2010): n. pag. Crossref. Web. https://doi.org/10.1109/INFCOM.2010.5462096

Liu, Ke, Nael Abu-Ghazaleh, and Kyoung-Don Kang. "Location Verification and Trust Management for Resilient Geographic Routing." Journal of Parallel and Distributed Computing 67.2 (2007): 215-228. Crossref. Web. https://doi.org/10.1016/j.jpdc.2006.08.001

Mainwaring, Alan et al. "Wireless Sensor Networks for Habitat Monitoring." Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications - WSNA ”02 (2002): n. pag. Crossref. Web. https://doi.org/10.1145/570748.570751

Misra, Satyajayant, and Guoliang Xue. "Efficient Anonymity Schemes for Clustered Wireless Sensor Networks." International Journal of Sensor Networks 1.1/2 (2006): 50. Crossref. Web. https://doi.org/10.1504/IJSNET.2006.010834

Nguyen, Son T., Erdal Cayirci, and Chunming Rong. "A Secure Many-to-Many Routing Protocol for Wireless Sensor and Actuator Networks." Security and Communication Networks 7.1 (2012): 88-98. Crossref. Web. https://doi.org/10.1002/sec.548

Oliveira, Leonardo B. et al. "TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks." Computer Communications 34.3 (2011): 485-493. Crossref. Web. https://doi.org/10.1016/j.comcom.2010.05.013

Ozturk, Celal, Yanyong Zhang, and Wade Trappe. "Source-Location Privacy in Energy-Constrained Sensor Network Routing." Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN ”04 (2004): n. pag. Crossref. Web. https://doi.org/10.1145/1029102.1029117

Park, Taejoon, and Kang G. Shin. "LiSP." ACM Transactions on Embedded Computing Systems 3.3 (2004): 634-660. Crossref. Web. https://doi.org/10.1145/1015047.1015056

Perrig, Adrian, John Stankovic, and David Wagner. "Security in Wireless Sensor Networks." Communications of the ACM 47.6 (2004): 53. Crossref. Web. https://doi.org/10.1145/990680.990707

Perrig, Adrian et al. Wireless Networks 8.5 (2002): 521-534. Crossref. Web. https://doi.org/10.1023/A:1016598314198

Shaikh, Riaz Ahmed et al. "Achieving Network Level Privacy in Wireless Sensor Networks." Sensors 10.3 (2010): 1447-1472. Crossref. Web. https://doi.org/10.3390/s100301447

Shaikh, R.A. et al. "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks." IEEE Transactions on Parallel and Distributed Systems 20.11 (2009): 1698-1712. Crossref. Web. https://doi.org/10.1109/TPDS.2008.258

Shaikh, Riaz Ahmed et al. "LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network." Lecture Notes in Computer Science (2006): 367-377. Crossref. Web. https://doi.org/10.1007/11872153_32

Syed, Muhammad Khaliq-ur-Rahman Raazi et al. "MUQAMI+: a Scalable and Locally Distributed Key Management Scheme for Clustered Sensor Networks." annals of telecommunications - annales des télécommunications 65.1-2 (2009): 101-116. Crossref. Web. https://doi.org/10.1007/s12243-009-0123-0

Tan, Guangbao, Wei Li, and Jie Song. "Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks." Proceedings of International Conference on Computer Science and Information Technology (2014): 279-289. Crossref. Web. https://doi.org/10.1007/978-81-322-1759-6_34

Wood, Anthony D. et al. "SIGF." Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks - SASN ”06 (2006): n. pag. Crossref. Web. https://doi.org/10.1145/1180345.1180351

Yang, Junmo, and Sang-Hun Jung. "The Case Study Of System Architecture In Wireless Sensor Networks: The Kindergarten Safety System (Kss)." Intelligent Automation & Soft Computing 16.4 (2010): 507-517. Crossref. Web. https://doi.org/10.1080/10798587.2010.10643097

Yao, Zhiying, Daeyoung Kim, and Yoonmee Doh. "PLUS: Parameterized and Localized trUst Management Scheme for Sensor Networks Security." 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems (2006): n. pag. Crossref. Web. https://doi.org/10.1109/MOBHOC.2006.278584

Yu, Yanli et al. "Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures." Journal of Network and Computer Applications 35.3 (2012): 867-880. Crossref. Web. https://doi.org/10.1016/j.jnca.2011.03.005

Zhang, Junqi et al. "A Trust Management Architecture for Hierarchical Wireless Sensor Networks." IEEE Local Computer Network Conference (2010): n. pag. Crossref. Web. https://doi.org/10.1109/LCN.2010.5735718

Zhu, Chunsheng et al. "Providing Desirable Data to Users When Integrating Wireless Sensor Networks with Mobile Cloud." 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (2013): n. pag. Crossref. Web. https://doi.org/10.1109/CloudCom.2013.86

Zhu, Sencun, Sanjeev Setia, and Sushil Jajodia. "LEAP+." ACM Transactions on Sensor Networks 2.4 (2006): 500-528. Crossref. Web. https://doi.org/10.1145/1218556.1218559

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/