The Community for Technology Leaders
Green Image
Providing desirable data security, i.e., confidentiality, authenticity and availability, in wireless sensor networks (WSNs) is challenging, as WSNs usually consist of a large number of resource constraint sensor nodes, deployed in unattended/hostile environments, and hence are exposed to many types of severe insider attacks due to node compromise. Existing security designs mostly provide a hop-by-hop security paradigm and thus are vulnerable to such attacks. Furthermore, existing security designs are also vulnerable to various DoS attacks, such as report disruption attacks and selective forwarding attacks and thus put data availability at stake. In this paper, we seek to overcome these vulnerabilities for large-scale static WSNs. We come up with a location-aware end-to-end security framework in which secret keys are bound to geographic locations. This location-aware property effectively limits the impact of compromised nodes only to their vicinity without affecting end-to-end data security. The proposed multi-functional key management framework assures both node-to-sink and node-to-node authentication along the report forwarding routes. Moreover, the proposed data delivery approach guarantees efficient en-route bogus data filtering, and is highly robust against DoS attacks. The evaluation demonstrates that the proposed design is highly resilient against an increasing number of compromised nodes and effective in energy savings.
Wireless sensor networks, Security, integrity, and protection

W. Lou, Y. Zhang and K. Ren, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," in IEEE Transactions on Mobile Computing, vol. 7, no. , pp. 585-598, 2007.
94 ms
(Ver 3.3 (11022016))