|
1 Introduction to Wireless Sensor Networks |
|
|
1 | (14) |
|
|
1 | (1) |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
Types of Wireless Sensor Networks |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
SPINS: Security Protocols for Sensor Networks |
|
|
7 | (2) |
|
LEAP: Localized Encryption and Authentication Protocol |
|
|
9 | (2) |
|
Gradient-Based Routing (GBR) |
|
|
11 | (1) |
|
Active Query Forwarding in Sensor Network (ACQUIRE) |
|
|
11 | (1) |
|
Probabilistic Key Distribution Schemes |
|
|
11 | (1) |
|
Deterministic Key Distribution Schemes |
|
|
12 | (2) |
|
|
14 | (1) |
|
2 Security in Wireless Sensor Networks -- Background |
|
|
15 | (26) |
|
|
15 | (2) |
|
Constraints in Sensor Networks |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
Intermittent Connectivity |
|
|
21 | (1) |
|
Unreliable Communications |
|
|
21 | (1) |
|
Higher Latency in Communication |
|
|
21 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Characteristics of Sensor Networks |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
24 | (1) |
|
Security Goals for Sensor Networks |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
Attacks on Sensor Networks |
|
|
29 | (1) |
|
Passive Information Gathering |
|
|
30 | (1) |
|
|
30 | (1) |
|
Monitor and Eavesdropping |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
Layering-Based Security Approach |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (3) |
|
3 QoS as a Means of Providing WSN Security |
|
|
41 | (24) |
|
|
41 | (2) |
|
Quality of Services in Wireless Sensor Networks |
|
|
43 | (1) |
|
QoS Concept and Security Effect |
|
|
44 | (1) |
|
QoS Challenges in Sensor Networks |
|
|
45 | (2) |
|
QoS Metrics in WSN Layers |
|
|
47 | (1) |
|
Application-Specific QoS Parameters |
|
|
47 | (1) |
|
Network-Specific QoS Parameters |
|
|
48 | (1) |
|
|
49 | (4) |
|
Reliability, Availability and Serviceability (RAS) |
|
|
53 | (3) |
|
Calculating Probability of Node Availability in a WSN |
|
|
56 | (1) |
|
Experiments and Evaluations |
|
|
57 | (3) |
|
|
60 | (1) |
|
|
61 | (4) |
|
4 The Security Framework for Wireless Sensor Networks |
|
|
65 | (28) |
|
|
65 | (1) |
|
Security Requirements in WSNS |
|
|
66 | (2) |
|
Wireless Sensor Networks' Security Framework |
|
|
68 | (1) |
|
The Secure Triple-Key Management Scheme |
|
|
68 | (2) |
|
Base Station to Node Key Calculation |
|
|
70 | (1) |
|
Nodes to Cluster Leader Key Calculation |
|
|
70 | (1) |
|
Cluster Leader to Next Hop Cluster Leader Key Calculation |
|
|
71 | (1) |
|
Cluster Leader to Base Station Key Calculation |
|
|
72 | (1) |
|
Analysis of Secure Triple-Key Management Scheme |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
74 | (3) |
|
|
77 | (1) |
|
Determining the Node Location |
|
|
77 | (1) |
|
Securing the Node Location: An Analysis |
|
|
78 | (1) |
|
Malicious Node Detection Mechanism |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
Trust Evaluation of the Sensor Node |
|
|
83 | (5) |
|
Trust Evaluation of the Relay Node |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (1) |
|
|
90 | (3) |
|
5 Secure Key Management Scheme (SKMS) |
|
|
93 | (38) |
|
|
93 | (1) |
|
Key Management in a Wireless Sensor Network |
|
|
94 | (1) |
|
|
95 | (2) |
|
Pre-Distribution Key Management Schemes |
|
|
97 | (1) |
|
Key Pool-Based Pre-Distribution Key Management Schemes |
|
|
97 | (1) |
|
Pair-Wise Key-Based Pre-Distribution Key Management Schemes |
|
|
98 | (1) |
|
Key Space-Based Pre-Distribution Key Management Schemes |
|
|
99 | (1) |
|
Group-Based Probabilistic Pre-Distribution Key Management Schemes |
|
|
99 | (3) |
|
Grid-Based Pre-Distribution Key Management Schemes |
|
|
102 | (1) |
|
Deployment Knowledge-Based Pre-Distribution Key Management Schemes |
|
|
103 | (1) |
|
Polynomial-Based Probabilistic Pre-Distribution Key Management Schemes |
|
|
104 | (1) |
|
Matrix-Based Pre-Distribution Key Management Schemes |
|
|
104 | (1) |
|
Tree-Based Pre-Distribution Key Management Schemes |
|
|
105 | (1) |
|
Combinatorial Design-Based Pre-Distribution Key Management Schemes |
|
|
106 | (1) |
|
Hypercube-Based Pre-Distribution Key Management Schemes |
|
|
106 | (1) |
|
ID-Based Pre-Distribution Key Management Schemes |
|
|
107 | (1) |
|
Energy-Aware Pre-Distribution Key Management Schemes |
|
|
107 | (2) |
|
Location-Based Pre-Distribution Key Management Schemes |
|
|
109 | (1) |
|
Cluster-Based Pre-Distribution Key Management Schemes |
|
|
110 | (1) |
|
Other Pre-Distribution Key Management Schemes |
|
|
111 | (4) |
|
In Situ Key Management Schemes |
|
|
115 | (1) |
|
Challenges Faced by Key Management in a WSN |
|
|
116 | (1) |
|
Evaluation Metrics for KMS in a WSN |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
Proposed Advanced EG Scheme for WSN Security |
|
|
118 | (1) |
|
Key Pre-Distribution Phase |
|
|
118 | (1) |
|
Shared Key Discovery Phase |
|
|
119 | (1) |
|
Path Key Establishment Phase |
|
|
119 | (1) |
|
Analysis and Simulation Result |
|
|
119 | (1) |
|
|
120 | (1) |
|
Safety Analysis: Resilience against Attack Capture Nodes |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (9) |
|
6 Secure Routing Algorithms (SRAs) in Sensor Networks |
|
|
131 | (38) |
|
|
131 | (1) |
|
Challenges of Design Tasks of Routing Protocol for a WSN |
|
|
132 | (1) |
|
Classification of Routing Protocols in a WSN |
|
|
133 | (1) |
|
Attribute-Based or Data-Centric Routing Protocols |
|
|
133 | (1) |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
135 | (3) |
|
|
138 | (1) |
|
|
139 | (1) |
|
Hierarchical-Based Routing (Clustering) or Node-Centric Routing Protocol |
|
|
140 | (1) |
|
|
141 | (1) |
|
Pegasis and Hierarchical-Pegasis |
|
|
142 | (1) |
|
|
143 | (3) |
|
Energy-Aware Cluster-Based Routing Algorithm |
|
|
146 | (3) |
|
Location-Based Routing (Geographic Protocol) |
|
|
149 | (1) |
|
|
149 | (1) |
|
Gear (Geographic and Energy Aware Routing) |
|
|
150 | (1) |
|
|
150 | (2) |
|
Fermat Point-Based Energy-Efficient Geocast Routing Protocol |
|
|
152 | (1) |
|
Multi-Path Routing Protocol |
|
|
152 | (1) |
|
N-to-1 Multi-Path Routing Protocol |
|
|
153 | (1) |
|
Multi-Path Multi-Speed Protocol (MMSPEED) |
|
|
154 | (1) |
|
Braided Multi-Path Routing Protocol |
|
|
154 | (1) |
|
|
155 | (1) |
|
Comparison of Routing Protocols |
|
|
156 | (1) |
|
Routing Attacks in Wireless Sensor Networks |
|
|
156 | (2) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
160 | (6) |
|
|
166 | (3) |
|
7 Secure Localization Technique (SLT) |
|
|
169 | (44) |
|
|
169 | (1) |
|
Operational Challenges in WSNs |
|
|
170 | (1) |
|
Secure Localization Process |
|
|
171 | (3) |
|
Classification of Localization Techniques |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
175 | (4) |
|
|
179 | (2) |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
False Beacon Location Attack |
|
|
182 | (2) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
Location-Reference Attack |
|
|
185 | (2) |
|
Existing Solutions of Secure Localization Systems |
|
|
187 | (1) |
|
Node-Centric Secure Localization |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
Infrastructure-Centric Secure Localization |
|
|
189 | (1) |
|
Existing Secure Localization Systems |
|
|
190 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
Attack-Resistant Location Estimation |
|
|
191 | (1) |
|
Robust Statistical Methods |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
Transmission Range Variation |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
Proposed Secure Localization Technique (SLT) |
|
|
194 | (2) |
|
Network Model and Assumptions |
|
|
196 | (7) |
|
|
203 | (4) |
|
|
207 | (1) |
|
|
207 | (6) |
|
8 Malicious Node Detection Mechanisms |
|
|
213 | (28) |
|
|
213 | (1) |
|
Security Threats against Wireless Sensor Networks |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
Specification-Based Detection |
|
|
215 | (1) |
|
Literature on Malicious Node Detection |
|
|
216 | (7) |
|
Suspicious Node Detection by Signal Strength |
|
|
223 | (1) |
|
|
223 | (2) |
|
Suspicious Message Detection by Signal Strength (SMDSS) |
|
|
225 | (1) |
|
Suspicious Node Information Dissemination Protocol (SNIDP) |
|
|
225 | (1) |
|
Proposed Malicious Node Detection Mechanism |
|
|
226 | (1) |
|
|
226 | (1) |
|
Link Stability Features (LSFs) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
230 | (2) |
|
|
232 | (5) |
|
|
237 | (1) |
|
|
238 | (3) |
|
9 The Distributed Signature Scheme (DSS) Based on RSA |
|
|
241 | (10) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
Attribute-Based Signatures |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
Distributed Signature Features |
|
|
246 | (1) |
|
RSA-Based Secret Key Distributions Main Approaches |
|
|
246 | (2) |
|
Our Approach on Scheme Establishment |
|
|
248 | (1) |
|
|
249 | (1) |
|
Generation of Distributive Signature |
|
|
250 | (1) |
|
Key Projection Distribution to New User |
|
|
250 | (1) |
|
|
251 | (1) |
References |
|
251 | (4) |
Index |
|
255 | |