Browse > Article

On the Security of Hierarchical Wireless Sensor Networks  

Hamid, Md. Abdul (Department of Computer Engineering, Kyung Hee University)
Hong, Choong-Seon (Department of Computer Engineering, Kyung Hee University)
Publication Information
Abstract
We propose a group-based security scheme for hierarchical wireless sensor networks. We model the network for secure routing with 3-tier sensor network comprised of three types of nodes: Base Station, Group Dominator and ordinary Sensor Nodes. Group-based deployment is performed using Gaussian (normal) distribution and show that more than 85% network connectivity can be achieved with the proposed model. The small groups with pre-shared secrets form the secure groups where group dominators form the backbone of the entire network. The scheme is devised for dealing with sensory data aggregated by groups of collocated sensors; i.e., local sensed data are collected by the dominating nodes and sent an aggregated packet to the base station via other group dominators. The scheme is shown to be light-weight, and it offers a stronger defense against node capture attacks. Analysis and simulation results are presented to defend our proposal. Analysis shows that robustness can significantly be improved by increasing the deployment density using both the dominating and/or ordinary sensor nodes.
Keywords
Hierarchical; Security; Node Capture Attacks; Robustness; Wireless Sensor Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Donggang Liu, Peng Ning, and Wenliang Du., 'Group-Based Key Pre-Distribution in Wireless Sensor Networks,' in Proc. ACM WiSE'05, September 2, 2005
2 L. Eschenauer and V. D. Gligor, 'A keymanagement scheme for distributed sensor networks,' in Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, November 2002
3 W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, 'A key management scheme for wireless sensor networks using deployment knowledge,' in Proc. of the IEEE INFOCOM, pages 586-597, March 2004
4 D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, 'Next century challenges: Scalable coordination in sensor networks,' in Proc. of ACM Mobicom, Seattle, Washington, USA, August 1999, pp. 263-270, ACM
5 I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'Wireless Sensor Networks: A Survey,' Computer Networks, vol. 38, no. 4, March 2002
6 G.J. Pottie, and W.J. Kaiser, 'Wireless integrated network sensors,' Communications of the ACM 43(5) (2000), pp. 551-558
7 C. Intanagonwiwat, R. Govindan, and D. Estrin, 'Directed diffusion: a scalable and robust communication paradigm for sensor networks,'in MOBICOM, 2000, pp. 56-67
8 S. M. Ross, Introduction to Probability Models, Academic Press, 2003, 8th Edition
9 B. Krishnamachari, D. Estrin, and S. Wicker, 'The impact of data aggregation in wireless sensor networks,' inInternational Workshop on Distributed Event-Based Systems, (DEBS '02), Vienna, Austria, July 2002
10 Y. W. Law, J. Doumen, and P. Hartel, 'Survey and benchmark of block ciphers for wireless sensor networks,' ACM Trans.on Sensor Networks, vol. 2, No. 1, pp. 65-93, February 2006   DOI
11 I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A Survey on sensor networks,' IEEE Communications Magn, vol. 40, no. 8, 2002
12 C. K. Wong, M. Gouda and S. S. Lam, 'Secure Group Communications Using Key Graphs', IEEE/ACM Trans. on Networking, Vol. 8, No. 1. February 2000
13 C. Intanagonwiwat, D. Estrin, R. Govindan, and J. Heidemann, 'Impact of network density on data aggregation in wireless sensor networks,' in ICDCS, 2002, pp. 457-458
14 N. Gura, A. Patel, A. Wander, H. Eberle, S. C. Shantz, 'Comparing elliptic curve cryptography and RSA on 8-bit CPUs,' in Proc. of the Sixth Workshop on Crypto- graphic Hardware and Embedded Systems (CHES'04), Cambridge, MA, USA, 2004, pp. 119-132