Muutke küpsiste eelistusi

E-raamat: Security Issues for Wireless Sensor Networks [Taylor & Francis e-raamat]

, , , , , (Pantnagar, College of Technology, G.B. Pant University of Agriculture and Technology, Rudrapui, Uttarakhand, India),
  • Formaat: 258 pages, 25 Tables, black and white; 48 Line drawings, black and white; 13 Halftones, black and white; 61 Illustrations, black and white
  • Ilmumisaeg: 19-Apr-2022
  • Kirjastus: CRC Press
  • ISBN-13: 9781003257608
  • Taylor & Francis e-raamat
  • Hind: 129,25 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 184,65 €
  • Säästad 30%
  • Formaat: 258 pages, 25 Tables, black and white; 48 Line drawings, black and white; 13 Halftones, black and white; 61 Illustrations, black and white
  • Ilmumisaeg: 19-Apr-2022
  • Kirjastus: CRC Press
  • ISBN-13: 9781003257608
Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversarys territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance.

This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task.

This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.
1 Introduction to Wireless Sensor Networks
1(14)
Introduction
1(1)
Issues and Challenges
2(1)
Architecture for WSNs
3(1)
Types of Sensors
4(1)
Components of WSNs
5(1)
Types of Wireless Sensor Networks
6(1)
Applications of WSNs
7(1)
Protocols in WSNs
7(1)
SPINS: Security Protocols for Sensor Networks
7(2)
LEAP: Localized Encryption and Authentication Protocol
9(2)
Gradient-Based Routing (GBR)
11(1)
Active Query Forwarding in Sensor Network (ACQUIRE)
11(1)
Probabilistic Key Distribution Schemes
11(1)
Deterministic Key Distribution Schemes
12(2)
References
14(1)
2 Security in Wireless Sensor Networks -- Background
15(26)
Introduction
15(2)
Constraints in Sensor Networks
17(1)
Unreliable Communication
17(1)
Node Constraints
17(1)
Battery Power/Energy
18(1)
Recharge Ability
18(1)
Sleep Patterns
19(1)
Transmission Range
19(1)
Memory Limitations
19(1)
Unattended Operations
20(1)
Network Constraints
20(1)
Ad Hoc Networking
20(1)
Limited Preconfiguration
20(1)
Data Rate/Packet Size
20(1)
Channel Error Rate
21(1)
Intermittent Connectivity
21(1)
Unreliable Communications
21(1)
Higher Latency in Communication
21(1)
Frequent Routing Changes
21(1)
Unknown Recipients
22(1)
Physical Limitation
22(1)
Characteristics of Sensor Networks
22(1)
Power Efficiency
22(1)
Scalability
23(1)
Responsiveness
23(1)
Reliability
23(1)
Mobility
23(1)
Compact Size
23(1)
Physical Security
24(1)
Memory Space
24(1)
Bandwidth
24(1)
Security Goals for Sensor Networks
24(1)
Confidentiality
25(1)
Integrity
26(1)
Authentication
26(1)
Data Freshness
27(1)
Availability
27(1)
Self-Organization
28(1)
Secure Localization
28(1)
Time Synchronization
28(1)
Security Classes
29(1)
Attacks on Sensor Networks
29(1)
Passive Information Gathering
30(1)
Attacks Against Privacy
30(1)
Monitor and Eavesdropping
31(1)
Traffic Analysis
31(1)
Camouflage Adversaries
31(1)
Active Attacks
32(1)
Routing Attacks
32(1)
Node Subversion
33(1)
Node Malfunction
33(1)
Node Outage
33(1)
Physical Attacks
34(1)
False Node
34(1)
Node Replication Attacks
34(1)
Layering-Based Security Approach
34(1)
Physical Layer
35(1)
Data Link layer
36(1)
Network Layer
36(1)
Transport Layer
37(1)
Application layer
37(1)
Conclusion
38(1)
References
38(3)
3 QoS as a Means of Providing WSN Security
41(24)
Introduction
41(2)
Quality of Services in Wireless Sensor Networks
43(1)
QoS Concept and Security Effect
44(1)
QoS Challenges in Sensor Networks
45(2)
QoS Metrics in WSN Layers
47(1)
Application-Specific QoS Parameters
47(1)
Network-Specific QoS Parameters
48(1)
Related Studies
49(4)
Reliability, Availability and Serviceability (RAS)
53(3)
Calculating Probability of Node Availability in a WSN
56(1)
Experiments and Evaluations
57(3)
Conclusion
60(1)
References
61(4)
4 The Security Framework for Wireless Sensor Networks
65(28)
Introduction
65(1)
Security Requirements in WSNS
66(2)
Wireless Sensor Networks' Security Framework
68(1)
The Secure Triple-Key Management Scheme
68(2)
Base Station to Node Key Calculation
70(1)
Nodes to Cluster Leader Key Calculation
70(1)
Cluster Leader to Next Hop Cluster Leader Key Calculation
71(1)
Cluster Leader to Base Station Key Calculation
72(1)
Analysis of Secure Triple-Key Management Scheme
72(2)
Secure Routing
74(1)
Node Algorithm
74(3)
Secure Localization
77(1)
Determining the Node Location
77(1)
Securing the Node Location: An Analysis
78(1)
Malicious Node Detection Mechanism
79(2)
Threat Model
81(1)
Trust Model
82(1)
Trust Evaluation Model
83(1)
Trust Evaluation of the Sensor Node
83(5)
Trust Evaluation of the Relay Node
88(1)
Data Trust
88(1)
Trust List
88(1)
Conclusion
89(1)
References
90(3)
5 Secure Key Management Scheme (SKMS)
93(38)
Introduction
93(1)
Key Management in a Wireless Sensor Network
94(1)
Key Management Schemes
95(2)
Pre-Distribution Key Management Schemes
97(1)
Key Pool-Based Pre-Distribution Key Management Schemes
97(1)
Pair-Wise Key-Based Pre-Distribution Key Management Schemes
98(1)
Key Space-Based Pre-Distribution Key Management Schemes
99(1)
Group-Based Probabilistic Pre-Distribution Key Management Schemes
99(3)
Grid-Based Pre-Distribution Key Management Schemes
102(1)
Deployment Knowledge-Based Pre-Distribution Key Management Schemes
103(1)
Polynomial-Based Probabilistic Pre-Distribution Key Management Schemes
104(1)
Matrix-Based Pre-Distribution Key Management Schemes
104(1)
Tree-Based Pre-Distribution Key Management Schemes
105(1)
Combinatorial Design-Based Pre-Distribution Key Management Schemes
106(1)
Hypercube-Based Pre-Distribution Key Management Schemes
106(1)
ID-Based Pre-Distribution Key Management Schemes
107(1)
Energy-Aware Pre-Distribution Key Management Schemes
107(2)
Location-Based Pre-Distribution Key Management Schemes
109(1)
Cluster-Based Pre-Distribution Key Management Schemes
110(1)
Other Pre-Distribution Key Management Schemes
111(4)
In Situ Key Management Schemes
115(1)
Challenges Faced by Key Management in a WSN
116(1)
Evaluation Metrics for KMS in a WSN
116(1)
Security Metrics
117(1)
Efficiency Metric
117(1)
Flexibility Metric
117(1)
Proposed Advanced EG Scheme for WSN Security
118(1)
Key Pre-Distribution Phase
118(1)
Shared Key Discovery Phase
119(1)
Path Key Establishment Phase
119(1)
Analysis and Simulation Result
119(1)
Connectivity
120(1)
Safety Analysis: Resilience against Attack Capture Nodes
121(1)
Conclusion
122(1)
References
122(9)
6 Secure Routing Algorithms (SRAs) in Sensor Networks
131(38)
Introduction
131(1)
Challenges of Design Tasks of Routing Protocol for a WSN
132(1)
Classification of Routing Protocols in a WSN
133(1)
Attribute-Based or Data-Centric Routing Protocols
133(1)
Flooding and Gossiping
133(2)
SPIN
135(1)
Directed Diffusion
135(3)
Rumor Routing
138(1)
Gradient-Based Routing
139(1)
Hierarchical-Based Routing (Clustering) or Node-Centric Routing Protocol
140(1)
Leach
141(1)
Pegasis and Hierarchical-Pegasis
142(1)
Teen and Apteen
143(3)
Energy-Aware Cluster-Based Routing Algorithm
146(3)
Location-Based Routing (Geographic Protocol)
149(1)
Mecn and Smecn
149(1)
Gear (Geographic and Energy Aware Routing)
150(1)
Gaf and HGAF
150(2)
Fermat Point-Based Energy-Efficient Geocast Routing Protocol
152(1)
Multi-Path Routing Protocol
152(1)
N-to-1 Multi-Path Routing Protocol
153(1)
Multi-Path Multi-Speed Protocol (MMSPEED)
154(1)
Braided Multi-Path Routing Protocol
154(1)
Energy-Aware Routing
155(1)
Comparison of Routing Protocols
156(1)
Routing Attacks in Wireless Sensor Networks
156(2)
Sybil Attack
158(1)
Black Hole Attack
158(1)
Denial of Service Attack
159(1)
Worm hole Attack
159(1)
Hello Flood Attack
159(1)
Grey Hole Attack
160(1)
Conclusion
160(6)
References
166(3)
7 Secure Localization Technique (SLT)
169(44)
Introduction
169(1)
Operational Challenges in WSNs
170(1)
Secure Localization Process
171(3)
Classification of Localization Techniques
174(1)
Direct Approaches
175(1)
Indirect Approaches
175(1)
Range-Based Localization
175(4)
Range-Free Localization
179(2)
Attack Model
181(1)
Elementary Attacks
182(1)
Range Change Attack
182(1)
False Beacon Location Attack
182(2)
Combinational Attacks
184(1)
Impersonation
184(1)
Sybil Attack
184(1)
Replay Attack
184(1)
Worm hole Attack
185(1)
Location-Reference Attack
185(2)
Existing Solutions of Secure Localization Systems
187(1)
Node-Centric Secure Localization
187(1)
The Prevention Method
187(1)
The Detection Method
187(1)
The Filtering Method
188(1)
Infrastructure-Centric Secure Localization
189(1)
Existing Secure Localization Systems
190(1)
SeRLoc
190(1)
Beacon Suite
190(1)
Attack-Resistant Location Estimation
191(1)
Robust Statistical Methods
191(1)
SPINE
192(1)
ROPE
192(1)
Transmission Range Variation
193(1)
DRBTS
193(1)
HiRLoc
194(1)
Proposed Secure Localization Technique (SLT)
194(2)
Network Model and Assumptions
196(7)
Results and Discussion
203(4)
Summary
207(1)
References
207(6)
8 Malicious Node Detection Mechanisms
213(28)
Introduction
213(1)
Security Threats against Wireless Sensor Networks
214(1)
Abnormality Detection
215(1)
Misuse Detection
215(1)
Specification-Based Detection
215(1)
Literature on Malicious Node Detection
216(7)
Suspicious Node Detection by Signal Strength
223(1)
The Model
223(2)
Suspicious Message Detection by Signal Strength (SMDSS)
225(1)
Suspicious Node Information Dissemination Protocol (SNIDP)
225(1)
Proposed Malicious Node Detection Mechanism
226(1)
Feature Extraction
226(1)
Link Stability Features (LSFs)
227(1)
Probabilistic Features
228(1)
Randomness Features
229(1)
Credit Features
230(1)
Classification
230(2)
Result and Discussion
232(5)
Notes
237(1)
References
238(3)
9 The Distributed Signature Scheme (DSS) Based on RSA
241(10)
Introduction
241(1)
Related Work
242(1)
Threshold Signatures
243(1)
Distributed Signatures
243(1)
Mesh Signatures
243(1)
Attribute-Based Signatures
243(1)
RSA-Based Secure Schemes
244(1)
RSA-Based DSS
245(1)
Distributed Signature Features
246(1)
RSA-Based Secret Key Distributions Main Approaches
246(2)
Our Approach on Scheme Establishment
248(1)
Scheme Initialization
249(1)
Generation of Distributive Signature
250(1)
Key Projection Distribution to New User
250(1)
Summary
251(1)
References 251(4)
Index 255
Parag Verma, Navneet Kaur, Anil Kumar Bisht, Raksh Pal Singh Gangwar