The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2011 vol.8)
pp: 523-536
Issa M. Khalil , United Arab Emirates University, UAE, Al Ain
Over the past decade, local monitoring has been shown to be a powerful technique for improving security in multihop wireless sensor networks (WSNs). Indeed, local monitoring-based security algorithms are becoming the most popular tool for providing security in WSNs. However, local monitoring as it is currently practiced is costly in terms of energy consumption, a major drawback for energy-constrained systems such as WSNs. In WSN environments, the scarce power resources are typically addressed through sleep-wake scheduling of the nodes. However, sleep-wake scheduling techniques in WSNs are vulnerable even to simple attacks. In this paper, a new technique is proposed that promises to allow operation of WSNs in a manner that is both energy-efficient and secure. The proposed technique combines local monitoring with a novel, more secure form of sleep-wake scheduling. The latter is a new methodology dubbed Elmo (Energy Aware Local MOnitoring in Sensor Networks), which enables sleep-wake management in a secure manner even in the face of adversarial nodes that choose not to awaken nodes responsible for monitoring their traffic. An analytical proof is given showing that security coverage is not weakened under Elmo. Moreover, ns-2 simulation results show that the performance of local monitoring is practically unchanged, while energy savings of 20 to 100 times are achieved, depending on the scenario
Sensor networks, local monitoring, sleep/wake techniques, wake-up antenna, malicious nodes.
Issa M. Khalil, "ELMO: Energy Aware Local Monitoring in Sensor Networks", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 4, pp. 523-536, July/August 2011, doi:10.1109/TDSC.2010.74
[1] W. Zhang and G. Cao, “DCTC: Dynamic Convoy Tree-Based Collaboration for Target Tracking in Sensor Networks,” IEEE Trans. Wireless Comm., vol. 3, no. 5, pp. 1689-1701, Sept. 2004.
[2] S. Pattem, S. Poduri, and B. Krishnamachari, “Energy-Quality Tradeoffs for Target Tracking in Wireless Sensor Networks,” Proc. Workshop Information Processing for Sensor Networks, 2003.
[3] B. Chen, K. Jamieson, H. Balakrishnan, and R. Morris, “Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks,” Proc. MOBICOM '01, 2001.
[4] S. Bhattacharya, G. Xing, C. Lu, G.-C. Roman, O. Chipara, and B. Harris, “Dynamic Wake-Up and Topology Maintenance Protocols with Spatiotemporal Guarantees,” Proc. Information Processing in Sensor Networks Symp. (IPSN), pp. 28-34, 2005.
[5] S. Kumar, T.H. Lai, and J. Balogh, “On K-Coverage in a Mostly Sleeping Sensor Network,” Proc. MOBICOM, pp. 144-158, 2004.
[6] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int'l Conf. System Sciences, pp. 3005-3014, 2004.
[7] G. Xing, X. Wang, Y. Zhang, C. Lu, R. Pless, and C. Gill, “Integrated Coverage and Connectivity Configuration for Energy Conservation in Sensor Networks,” Proc. ACM Trans. Sensor Networks (TOSN), vol. 1, no. 1, pp. 36-72, 2005.
[8] W. Ye, J. Heidemann, and D. Estrin, “An Energy Efficient MAC Protocol for Wireless Sensor Networks,” Proc. IEEE INFOCOM, pp. 1567-1576, 2002.
[9] R. Naik, S. Biswas, and S. Datta, “Distributed Sleep-Scheduling Protocols for Energy Conservation in Wireless Networks,” Proc. 38th Ann. Hawaii Int'l Conf. System Sciences (HICSS), pp. 285b-285b, 2005.
[10] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson, “Wireless Sensor Networks for Habitat Monitoring,” Proc. ACM Int'l Workshop Wireless Sensor Networks and Applications, pp. 88-97, 2002.
[11] C. Guo, L.C. Zhong, and J.M. Rabaey, “Low Power Distributed MAC for Ad Hoc Sensor Radio Networks,” Proc. IEEE Global Telecomm. Conf. (GLOBECOM '01), pp. 2944-2948, vol. 5, 2001.
[12] J. Rabaey, J. Ammer, T. Karalar, S. Li, B. Otis, M. Sheets, and T. Tuan, “Picoradios for Wireless Sensor Networks: The Next Challenge in Ultra-Low-Power Design,” Proc. Int'l Solid-State Circuits Conf., pp. 200-201, 2002.
[13] J. Silva, J. Shamberger, M.J. Ammer, C. Guo, S. Li, R. Shah, T. Tuan, M. Sheets, J.M. Rabaey, B. Nikolic, A. Sangiovanni-Vincentelli, and P. Wright, “Design Methodology for Picoradio Networks,” Proc. Conf. Design Automation and Test in Europe, pp. 314-323, 2001.
[14] dataAS3931Product_brief_0204.pdf, 2011.
[15] L. Gu and J.A. Stankovic, “Radio-Triggered Wake-Up Capability for Sensor Networks,” Proc. IEEE Real-Time and Embedded Technology and Applications Symp. (RTAS), pp. 27-36, 2004.
[16] Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proc. First ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 135-147, 2003.
[17] A. Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. Wong, “Decentralized Intrusion Detection in Wireless Sensor Networks,” Proc. First ACM Workshop Quality of Service and Security in Wireless and Mobile Networks, pp. 16-23, 2005.
[18] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MOBICOM, pp. 255-265, 2000.
[19] S.J. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks,” Proc. IEEE Int'l Conf. Comm. (ICC), pp. 3201-3205, 2001.
[20] A.A. Pirzada and C. McDonald, “Establishing Trust in Pure Ad-Hoc Networks,” Proc. 27th Australasian Computer Science Conf. (ACSC '04), pp. 47-54, 2004.
[21] S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes—Fairness in Distributed Ad-hoc Networks,” Proc. Symp. Mobile Ad Hoc Networking and Computing (MOBIHOC), pp. 80-91, 2002.
[22] I. Khalil, S. Bagchi, and N.B. Shroff, “Analysis and Evaluation of SECOS, A Protocol for Energy Efficient and Secure Communication in Sensor Networks,” Ad Hoc Networks J. (ADHOC), vol. 5, no. 3, pp. 360-391, Apr. 2007.
[23] I. Khalil, S. Bagchi, and C. Nina-Rotaru, “Dicas: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks,” IEEE/CreateNet SecureComm., pp. 89-100, Sept. 2005.
[24] I. Khalil, S. Bagchi, and N.B. Shroff, “LITEWORP: Design and Analysis of a Protocol for Detection and Isolation of the Wormhole Attack in Multihop Wireless Networks,” Proc. Elsevier Computer Networks J., vol. 51, no. 13, pp. 3750-3772, Sept. 2007.
[25] D. Liu and P. Ning, “Establishing Pair-Wise Keys in Distributed Sensor Networks,” Proc. Conf. Computer and Comm. Security (CCS), pp. 52-61, 2003.
[26] “The Network Simulator ns-2,”, 2011.
[27] Wireless_ pdfMICA2_Datasheet.pdf , 2011.
[28] Chipcon CC1000 Datasheet, Chipcon Inc. http://www.chipcon. com/filesCC1000DataSheet21.pdf , 2011.
[29] J.W. Hui, Z. Ren, and B. Krogh, “Sentry-Based Power Management in Wireless Sensor Networks,” Proc. Second Int'l Workshop Information Processing in Sensor Networks (IPSN), pp. 458-472, 2003.
[30] S. Liu, K. Fan, and P. Sinha, “Dynamic Sleep Scheduling Using Online Experimentation for Wireless Sensor Networks,” Proc. Third Int'l. Workshop Measurement, Modeling and Performance Analysis of Wireless Sensor Networks (SenMetrics), 2005.
[31] K. Chakrabarty, S.S. Iyengar, H. Qi, and E. Cho, “Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks,” Proc. IEEE Trans. Computers, vol. 51, no. 12, pp. 1448-1453, Dec. 2002.
[32] D. Tian and N.D. Georganas, “A Coverage-Preserved Node Scheduling Scheme for Large Wireless Sensor Networks,” Proc. First Int'l Workshop Wireless Sensor Networks and Applications (WSNA), pp. 32-41, 2002.
[33] T.H. Yan and J.A. Stankovic, “Differentiated Surveillance for Sensor Networks,” Proc. ACM Conf. Embedded Networked Sensor Systems(SenSys), pp. 51-62, 2003.
[34] G.Z. Ye, S. Lu, and L. Zhang, “Peas: A Robust Energy Conserving Protocol for Long-Lived Sensor Networks,” Proc. 23rd Int'l Conf. Distributed Computing Systems (ICDCS), pp. 169-177, 2003.
[35] C.L. Xing, R. Pless, and J.A. O'Sullivan, “Co-Grid: An Efficient Coverage Maintenance Protocol for Distributed Sensor Networks,” Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 414-423, 2004.
[36] Y.H. Chee, “Ultra Low Power Transmitters for Wireless Sensor Networks,” PhD dissertation, Univ. of California, 2006.
[37] B. Cook, A. Berny, S. Lanzisera, A. Molnar, and K. Pister, “Low-Power 2.4-GHz Transceiver with Passive RX Front-End and 400-mV Supply,” IEEE J. Solid-State Circuits, vol. 41, no. 12, pp. 2757-2766, Dec. 2006.
[38] N. Pletcher, “Ultra-Low Power Wake-Up Receivers for Wireless Sensor Networks” PhD dissertation, Univ. of California, 2008.
[39] I. Khalil, S. Bagchi, and N.B. Shroff, “SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks,” Proc. 37th IEEE Dependable Systems and Networks Conf. (DSN '07), pp. 565-574, June 2007.
[40] I. Khalil and S. Bagchi, “MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks,” Proc. Fourth ACM SecureComm., pp. 1-10, 2008.
14 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool