Secure Sensor Networks for Perimeter Protection

Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.
Date: November 30, 2003
Book Title: Computer Networks
Type: Article
Volume: 43
Number: 4
Pages: 421--435
Google scholar: BZwHppfVN6kJ
Google citations: 23 citations
Downloads: 1472

Has 1 soft copy


size 703032 bytes

Bibtex


@Article{Secure_Sensor_Networks_for_Perimeter_Pro,
  author = "Sasikanth Avancha and Anupam Joshi and John Pinkston",
  title = "{Secure Sensor Networks for Perimeter Protection}",
  month = "November",
  year = "2003",
  pages = "421--435",
  number = "4",
  volume = "43",
  journal = "Computer Networks",
}