PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In this paper we investigate issues associated with the development of secure IEEE 802.15.4 based wireless sensor networks (WSNs) - a special type of ad hoc networks. We focus on energy aware security architectures and protocols for use in WSNs. To give the motivation behind energy efficient secure networks, first, the security requirements of wireless sensor networks are presented and the relationships between network security and network lifetime limited by often insufficient resources of network nodes are explained. Second, a short literature survey of energy aware security solutions for use in WSNs is presented.
Rocznik
Tom
Strony
64--72
Opis fizyczny
Bibliogr. 30 poz., rys., tab.
Twórcy
autor
  • Institute of Control and Computation Engineering, Warsaw University of Technology, Nowowiejska st 15/19, 00-665 Warsaw, Poland, K.Daniluk@stud.elka.pw.edu.pl
Bibliografia
  • [1] M. C. Vuran, I. F. Akylidiz, Wireless Sensor Networks. Wiley, 2010.
  • [2] E. Niewiadomska-Szynkiewicz, P. Kwaśniewski, and I. Windyga, “Comparative study of wireless sensor networks energy-efficient topologies and power save protocols”, J. Telecom. Inform. Technol., no. 3, pp. 68–75, 2009.
  • [3] A. Tiwari, P. Ballal, and F. L. Lewis, Energy-efficient wireless sensor network design and implementation for condition-based maintenance, ACM Trans. Sensor Netww (TOSN), vol. 3, no. 1, pp. 1–23, 2007.
  • [4] K. Sharma, M. K. Ghose, D. Kumar, “A comparative study of various security approaches used in wireless sensor networks”, Int. J. Adv. Sci. Technol., vol. 17, pp. 31–44, 2010.
  • [5] M. Ahmad, M. Habib, and J. Muhammad, “Analysis of security protocols for Wireless Sensor Networks”, in Proc. 3rd Int. Conf. Comp. Res. Develop. ICCRD 2011, Shanghai, China, 2011, vol. 2, pp. 383–387.
  • [6] C. Castelluccia, A. C.-F. Chan, E. Mykletun, and G. Tsudik, “Efficient and provably secure aggregation of encrypted data in wireless sensor networks”, J. ACM Trans. Sensor Netw. (TOSN), vol. 5, no. 3, 2009.
  • [7] S. R. Gandham, M. Dawande, R. Prakash, and S. Venkatesan, S., Energy efficient schemes for wireless sensor networks with multiple mobile base stations, in Proc. IEEE Global Telecom. Conf. GLOBE-COM’03, San Francisco, USA, 2003, vol. 1, pp. 377–381.
  • [8] J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: a survay, in Security in Distributed Grid, Mobile and Pervasive Computing, Y. Xiao, Ed. Auerbach Publication, 2007.
  • [9] P. Baronti, P. Pillai, V. W. C. Chook, S. Chessa, A. Gotta, and Y. Fun Hu, “Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards”, Comp. Commun., vol. 30, no. 7, pp. 1655–1695, 2007.
  • [10] H. Kumar and A. Kar, “Wireless sensor network security analysis”, Int. J. Next-Generation Netw. (IJNGN), vol. 1, no. 1, 2009.
  • [11] S. K. Singh, M. P. Singh, and D. K. Singh, “A survay of energy- efficient hierarchical cluster-based routing in wireless sensor net- works”, Int. J. Adv. Netw. Appl., vol. 2, no, 2, pp. 570–580, 2010.
  • [12] S. K. Singh, M. P. Singh, and D. K. Singh, “Energy-efficient ho- mogenous clustering algorithm for wireless sensor networks”, Int. J. Wirel. Mob. Netw., vol. 2, no. 3, pp. 49–61, 2010.
  • [13] ZigBee Alliance, “ZigBee Specification v1.0”, New York, USA, 2005.
  • [14] M. I. Shukur, L. S. Chyan, and V. V. Yap, “Wireless sensor net- works: delay guarantee and energy efficient MAC protocols”, World Academy of Sci., Engin. Technol., vol. 50, pp. 1061–1065, 2009.
  • [15] N. Sastry, D. Wagner, “Security consideration for IEEE 802.15.4 networks”, in Proc. 5th Int. Conf. Web Inform. Sys. Engin. WISE 2004, Brisbane, Australia, 2004, pp. 32–4.
  • [16] R. Struik and G. Rason, “Security and security architectural rec- ommendations for the IEEE 802.15.4 Low-Rate WPAN”, Certicom Corp., 2002.
  • [17] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. Culler, “SPINS: security protocols for sensor networks”, Wirel. Netw., vol. 8, no. 5, pp. 521–534, 2002.
  • [18] C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks”, in Proc. 2nd Int. Conf. Embedded Networked Sensor Sys., Baltimore, MD, USA, 2004, pp. 162–175.
  • [19] L. E. Lighfoot, J. Ren, and T. Li, “An energy efficient link-layer security protocol for wireless sensor networks”, in Proc. IEEE Int. Con. Elec.-Infor. Technol. EIT 2007, Chicago, IL, USA, 2007, pp. 233–238.
  • [20] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks”, in Proc. 10th ACM Conf. Comp. Commun. Secur. CCS 2003, Washington, DC, USA, 2003, pp. 62–72.
  • [21] S. Zhu, S. Setia, and S. Jajodia, “LEAP+: Efficient security mechanisms for large-scale distributed sensor networks”, ACM Trans. Sensor Netw. TOSN, vol. 2, no. 4, pp. 500–528, 2006.
  • [22] H. Cam, S. Ozdemir, D. Muthuavinashiappan, and P. Nair, “Energy efficient security protocol for wireless sensor networks”, in Proc. IEEE 58th Veh. Technol. Conf. VTC 2003, Orlando, Florida, USA, 2003, vol. 5, pp. 2981–2984.
  • [23] R. A. Shaikh, S. Lee, M. A. U. Khan, and Y. J. Song, “LSec: lightweight security protocol for distributed wireless sensor network”, Lecture Notes in Computer Science, vol. 4217, 2006.
  • [24] T. Shon, B. Koo, H. Choi, and Y. Park, “Security architecture for IEEE 802.15.4-based wireless sensor network”, in Proc. 4th Int. Symp. Wirel. Pervasive Comput. ISWPC 2009, Melbourne, Australia, 2009, pp. 1–5.
  • [25] A. K. Pathan and C. S. Hong, “SERP: secure energy-efficient routing protocol for densely deployed wireless sensor network”, Annales des Telecomm., pp. 529–541, 2008.
  • [26] W. R. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks”, in Proc. 33rd Annual Hawaii Int. Conf. Sys. Sciences HICSS’00, Maui, Hawaii, USA, 2000, pp. 3005–3014.
  • [27] B. Azzedine, C. Xiuzhen, and J. Linus, “Energy-aware datacentric routing in microsensor networks”, in Proc. 6th Int. Symp. Model. Analys. Simul. Wirel. Mobile Sys. MSWiM 2003, San Diego, CA, USA, 2003, pp. 42–49.
  • [28] K. Lin, Ch. F. Lai, X. Liu, and X. Guan, “Energy efficiency routing with node compromised resistance in wireless sensor networks”, Mob. Netw. Appl., vol. 17, pp. 75–89, 2012.
  • [29] Z. Yu and Y. Guan, “A dynamic en-route scheme for filtering false data injection in wireless sensor networks”, in Proc. 25th IEEE Int. Conf. Com. Commun. INFOCOM 2006, Barcelona, Spain, 2006, pp. 1–12.
  • [30] Z. Karakehayov, “Using REWARD to detect team black-hole attacks in wireless sensor networks”, in Proc. Worksh. Real-World Wirel. Sensor Netw. REALWSN’05, Stockholm, Sweden, 2005, pp. 1–5.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATA-0017-0008
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.