FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks (original) (raw)

TinySec: a link layer security architecture for wireless sensor networks

… on Embedded networked sensor …, 2004

We introduce TinySec, the first fully-implemented link layer security architecture for wireless sensor networks. In our design, we leverage recent lessons learned from design vulnerabilities in security protocols for other wireless networks such as 802.11b and GSM. Conventional security protocols tend to be conservative in their security guarantees, typically adding 16-32 bytes of overhead. With small memories, weak processors, limited energy, and 30 byte packets, sensor networks cannot afford this luxury. TinySec addresses these extreme resource constraints with careful design; we explore the tradeoffs among different cryptographic primitives and use the inherent sensor network limitations to our advantage when choosing parameters to find a sweet spot for security, packet overhead, and resource requirements. TinySec is portable to a variety of hardware and radio platforms. Our experimental results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.

A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks

Data security and energy aware communication are key aspects in design of modern ad hoc networks. In this paper we investigate issues associated with the devel-opment of secure IEEE 802.15.4 based wireless sensor net-works (WSNs) – a special type of ad hoc networks. We fo-cus on energy aware security architectures and protocols for use in WSNs. To give the motivation behind energy efficient secure networks, first, the security requirements of wireless sensor networks are presented and the relationships between network security and network lifetime limited by often in-sufficient resources of network nodes are explained. Second, a short literature survey of energy aware security solutions for use in WSNs is presented. Keywords—energy aware security architectures, routing proto-cols, security protocols, wireless sensor networks, WSN.

SecSens - Security Architecture for Wireless Sensor Networks

2009 Third International Conference on Sensor Technologies and Applications, 2009

In recent years, the potential range of applications for sensor networks is expanding. Their use has been considered for safety critical areas such as: hospitals or power plants. The security comes more to the fore. This paper presents SecSens, an architecture that provides basic security components for wireless sensor networks. Since robust and strong security features require powerful nodes, Sec-Sens uses a heterogeneous sensor network. In addition to a large number of simple (cheap) sensor nodes providing the actual sensor tasks, there are a few powerful nodes (cluster nodes) that implement the required security features. The basic component of SecSens offers authenticated broadcasts to allow recipients to authenticate the sender of a message. To protect the sensor network against routing attacks, Sec-Sens includes a probabilistic multi-path routing protocol, which supports the key management and the authenticated broadcasts. SecSens also provides functions to detect forged sensor data by verifying data reports en-route. SecSens is successfully evaluated in a real test environment with two different kinds of sensor boards.

A lightweight secure architecture for wireless sensor networks

International Journal of Internet Technology and Secured Transactions, 2010

The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks may not be feasible. However, less emphasis was placed on the security issues of employing a sensor network and its exposure to potential threats. Due to the severe physical constraints in sensor nodes, traditional cryptographic mechanisms are not suitable to deal with such potential security threats. This paper proposes a secure lightweight architecture that takes account of the constraints of sensor networks. With the use of a base station, a hierarchical network topology is formed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary. The architecture also supports the detection and isolation of aberrant nodes.

Towards integrated security for sensor network applications

2010 IEEE Sensors Applications Symposium (SAS), 2010

Widespread and commercial usage of Wireless Sensor Networks is kept back by the lack of strong and easy to use security. The wide range of applications of WSNs implies different and often contradictory security requirements. This paper argues the need for a configurable security architecture for WSNs and presents a methodology and software implementation to determine the most resource efficient suite of security protocols for a given application.

Security Frameworks for Wireless Sensor Networks-Review

2012

Abstract Due to significant advances in miniaturization, low power circuit design but reasonably efficient to carry the sensitive information through wireless communication, wireless sensor network (WSN) have attracted attention a lot in recent years. WSN's are being used in many applications like health monitoring, military purposes, and home automation.

A lightweight security framework for wireless sensor networks

2011

Abstract Wireless sensor networks are a promising future of many commercial and military applications. However, these networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible.

Next Generation Network: Security and Architecture

IJSRD, 2013

Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.