Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary’s territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance.
This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task.
This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
Author(s): Parag Verma, Ankur Dumka, Anuj Bhardwaj, Navneet Kaur
Publisher: CRC Press
Year: 2022
Language: English
Pages: 269
City: Boca Raton
Cover
Half Title
Title Page
Copyright Page
Contents
1. Introduction to Wireless Sensor Networks
Introduction
Issues and Challenges
Architecture for WSNs
Types of Sensors
Components of WSNs
Types of Wireless Sensor Networks
Applications of WSNs
Protocols in WSNs
SPINS: Security Protocols for Sensor Networks
LEAP: Localized Encryption and Authentication Protocol
Gradient-Based Routing (GBR)
Active Query Forwarding in Sensor Network (ACQUIRE)
Probabilistic Key Distribution Schemes
Deterministic Key Distribution Schemes
References
2. Security in Wireless Sensor Networks - Background
Introduction
Constraints in Sensor Networks
Unreliable Communication
Node Constraints
Battery Power/Energy
Recharge Ability
Sleep Patterns
Transmission Range
Memory Limitations
Unattended Operations
Network Constraints
Ad Hoc Networking
Limited Preconfiguration
Data Rate/Packet Size
Channel Error Rate
Intermittent Connectivity
Unreliable Communications
Higher Latency in Communication
Frequent Routing Changes
Unknown Recipients
Physical Limitation
Characteristics of Sensor Networks
Power Efficiency
Scalability
Responsiveness
Reliability
Mobility
Compact Size
Physical Security
Memory Space
Bandwidth
Security Goals for Sensor Networks
Confidentiality
Integrity
Authentication
Data Freshness
Availability
Self-Organization
Secure Localization
Time Synchronization
Security Classes
Attacks on Sensor Networks
Passive Information Gathering
Attacks Against Privacy
Monitor and Eavesdropping
Traffic Analysis
Camouflage Adversaries
Active Attacks
Routing Attacks
Spoofed, Altered and Replayed Routing Information
Selective Forwarding
Sinkhole Attack
Sybil Attacks
Wormhole Attacks
HELLO Flood Attacks
Denial of Service
Node Subversion
Node Malfunction
Node Outage
Physical Attacks
False Node
Node Replication Attacks
Layering-Based Security Approach
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Application Layer
Conclusion
References
3. QoS as a Means of Providing WSN Security
Introduction
Quality of Services in Wireless Sensor Networks
QoS Concept and Security Effect
QoS Challenges in Sensor Networks
QoS Metrics in WSN Layers
Application-Specific QoS Parameters
Network-Specific QoS Parameters
Related Studies
Reliability, Availability and Serviceability (RAS)
Calculating Probability of Node Availability in a WSN
Experiments and Evaluations
Conclusion
References
4. The Security Framework for Wireless Sensor Networks
Introduction
Security Requirements in WSNs
Wireless Sensor Networks' Security Framework
The Secure Triple-Key Management Scheme
Base Station to Node Key Calculation
Nodes to Cluster Leader Key Calculation
Cluster Leader to Next Hop Cluster Leader Key Calculation
Cluster Leader to Base Station Key Calculation
Analysis of Secure Triple-Key Management Scheme
Secure Routing
Node Algorithm
Secure Localization
Determining the Node Location
Securing the Node Location: An Analysis
Malicious Node Detection Mechanism
Threat Model
Trust Model
Trust Evaluation Model
Trust Evaluation of the Sensor Node
Data Trust of the Sensor Node
Direct Data Trust
Regional Relative Trust
Data Trust of the Sensor Node
Historical Data Trust
Behavior Trust of the Sensor Node
Direct Behavior Trust
Behavior Trust of the Sensor Node
Historical Behavior Trust
Comprehensive Trust of the Sensor Node
Historical Trust of the Sensor Node
Trust Evaluation of the Relay Node
Data Trust
Trust List
Conclusion
References
5. Secure Key Management Scheme (SKMS)
Introduction
Key Management in a Wireless Sensor Network
Key Management Schemes
Pre-Distribution Key Management Schemes
Key Pool-Based Pre-Distribution Key Management Schemes
Pair-Wise Key-Based Pre-Distribution Key Management Schemes
Key Space-Based Pre-Distribution Key Management Schemes
Group-Based Probabilistic Pre-Distribution Key Management Schemes
Grid-Based Pre-Distribution Key Management Schemes
Deployment Knowledge-Based Pre-Distribution Key Management Schemes
Polynomial-Based Probabilistic Pre-Distribution Key Management Schemes
Matrix-Based Pre-Distribution Key Management Schemes
Tree-Based Pre-Distribution Key Management Schemes
Combinatorial Design-Based Pre-Distribution Key Management Schemes
Hypercube-Based Pre-Distribution Key Management Schemes
ID-Based Pre-Distribution Key Management Schemes
Energy-Aware Pre-Distribution Key Management Schemes
Location-Based Pre-Distribution Key Management Schemes
Cluster-Based Pre-Distribution Key Management Schemes
Other Pre-Distribution Key Management Schemes
In Situ Key Management Schemes
Challenges Faced by Key Management in a WSN
Evaluation Metrics for KMS in a WSN
Security Metrics
Efficiency Metric
Flexibility Metric
Proposed Advanced EG Scheme for WSN Security
Key Pre-Distribution Phase
Shared Key Discovery Phase
Path Key Establishment Phase
Analysis and Simulation Result
Connectivity
Safety Analysis: Resilience against Attack Capture Nodes
Conclusion
References
6. Secure Routing Algorithms (SRAs) in Sensor Networks
Introduction
Challenges of Design Tasks of Routing Protocol for a WSN
Classification of Routing Protocols in a WSN
Attribute-Based or Data-Centric Routing Protocols
Flooding and Gossiping
SPIN
Directed Diffusion
Rumor Routing
Gradient-Based Routing
Hierarchical-Based Routing (Clustering) or Node-Centric Routing Protocol
LEACH
PEGASIS and Hierarchical-PEGASIS
TEEN and APTEEN
Energy-Aware Cluster-Based Routing Algorithm
Location-Based Routing (Geographic Protocol)
MECN and SMECN
GEAR (Geographic and EnergyAware Routing)
GAF and HGAF
Fermat Point-Based Energy-Efficient Geocast Routing Protocol
Multi-Path Routing Protocol
N-to-1 Multi-Path Routing Protocol
Multi-Path Multi-Speed Protocol (MMSPEED)
Braided Multi-Path Routing Protocol
Energy-Aware Routing
Comparison of Routing Protocols
Routing Attacks in Wireless Sensor Networks
Sybil Attack
Black Hole Attack
Denial of Service Attack
Wormhole Attack
Hello Flood Attack
Grey Hole Attack
Conclusion
References
7. Secure Localization Technique (SLT)
Introduction
Operational Challenges in WSNs
Secure Localization Process
Classification of Localization Techniques
Direct Approaches
Indirect Approaches
Range-Based Localization
Range-Free Localization
Attack Model
Elementary Attacks
Range Change Attack
False Beacon Location Attack
Combinational Attacks
Impersonation
Sybil Attack
Replay Attack
Wormhole Attack
Location-Reference Attack
Existing Solutions of Secure Localization Systems
Node-Centric Secure Localization
The Prevention Method
The Detection Method
The Filtering Method
Infrastructure-Centric Secure Localization
Existing Secure Localization Systems
SeRLoc
Beacon Suite
Attack-Resistant Location Estimation
Robust Statistical Methods
SPINE
ROPE
Transmission Range Variation
DRBTS
HiRLoc
Proposed Secure Localization Technique (SLT)
Network Model and Assumptions
Results and Discussion
Summary
References
8. Malicious Node Detection Mechanisms
Introduction
Security Threats Against Wireless Sensor Networks
Abnormality Detection
Misuse Detection
Specification-Based Detection
Literature on Malicious Node Detection
Suspicious Node Detection by Signal Strength
The Model
Suspicious Message Detection by Signal Strength (SMDSS)
Suspicious Node Information Dissemination Protocol (SNIDP)
Proposed Malicious Node Detection Mechanism
Feature Extraction
Link Stability Features (LSFs)
Probabilistic Features
Randomness Features
Credit Features
Classification
Result and Discussion
Notes
References
9. The Distributed Signature Scheme (DSS) Based on RSA
Introduction
Related Work
Threshold Signatures
Distributed Signatures
Mesh Signatures
Attribute-Based Signatures
RSA-Based Secure Schemes
RSA-Based DSS
Distributed Signature Features
RSA-Based Secret Key Distributions Main Approaches
Our Approach on Scheme Establishment
Scheme Initialization
Generation of Distributive Signature
Key Projection Distribution to New User
Summary
References
Index