Secure topology maintenance and events collection in WSNs
نویسندگان
چکیده
Topology Maintenance Protocols (TMPs) are key for operating Wireless Sensor Networks (WSNs). Their adoption serves a few goals, such as: to save energy, to avoid collisions in communications, and to have an adequate number of nodes monitoring the environment—by alternating duty cycles with sleep cycles on the sensor nodes. While effectiveness of TMPs protocols is widely addressed, security is an overlooked feature. Indeed, while different TMPs have been presented in the literature, few of them address the security issues. In particular, only recently a secure TMP protocol that does not require pair-wise node confidentiality has been proposed: Sec-TMP [20]. The aim of Sec-TMP is to enforce event delivery to the Base Station while providing a standard topology maintenance service to the WSN. In this paper, we provide a thorough assessment of our previous preliminary proposal of Sec-TMP, with particular reference to its effectiveness and security. First, we investigate the energy consumption introduced by TMPs protocols. Second, we show that Sec-TMP performs well without any assumption neither on the show-up time of data-collecting node, nor on their mobility model. In particular, we test Sec-TMP against a realistic unpredictable data-collecting mobility scenario, that also brings in new security issues. A thorough security analysis of the proposed solutions to these new issues is also provided. Finally, extensive simulations support the quality of Sec-TMP as for effectiveness and security. Copyright c © 0000 John Wiley & Sons, Ltd.
منابع مشابه
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN
Topology Maintenance in Wireless Sensor Networks (WSNs), that is, alternating duty cycles with sleep cycles while having an adequate number of nodes monitoring the environment, is a necessary requirement to allow the WSNs to move from niche applications to widespread adoption; topology maintenance is even mandatory when the WSNs are used in a security sensitive context. In this work, we present...
متن کاملSimulation modeling of secure wireless sensor networks
This paper describes an extensible simulation environment for the modeling of wireless sensor networks (WSNs). In particular, our simulator facilitates the study of secure connectivity between sensor nodes. The simulator has five main components: network topology model, key establishment protocol, adversary model for node capture, network analysis tools, and a graphical user interface (GUI) to ...
متن کاملMulticast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach
Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...
متن کاملSecurity of Wireless Sensor Networks: Current Status and Key Issues
Due to significant advances in wireless and mobile communication techniques and the broad development of potential applications, Wireless Sensor Networks (WSNs) have attracted great attention in recent years. Nevertheless, WSNs are formed dynamically by a number of powerlimited sensor nodes and themanager nodewith long-lasting power. WSNs are self-organized and autonomous systems consisting of ...
متن کاملUnauthenticated event detection in wireless sensor networks using sensors co-coverage
Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Security and Communication Networks
دوره 4 شماره
صفحات -
تاریخ انتشار 2011