Skip to main content

Security in Sensor Networks

  • Chapter
  • First Online:
Guide to Computer Network Security

Part of the book series: Computer Communications and Networks ((CCN))

  • 3105 Accesses

Abstract

The rapid development of wireless technology in the last few years has created new interest in low-cost wireless sensor networks. Wireless sensor networks (WSNs) or just sensor networks are grids or networks made of spatially distributed autonomous but cooperating tiny devices called sensors, all of which have sensing capabilities that are used to detect, monitor, and track physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants, at different locations (Wikipedia. http://en.wikipedia.org/wiki/Sensor). A sensor, similar to that in Fig. 19.1, is a small device that produces a measurable response to a change in a physical condition. Sensor nodes can be independently used to measure a physical quantity and to convert it into a signal that can be read by an observer or by an instrument (Wikipedia. http://en.wikipedia.org/wiki/Sensor). The network may consist of just a few or thousands of tiny, mostly immobile, usually, randomly deployed nodes, covering a small or large geographical area. In many cases, sensor networks do not require predetermined positioning when they are randomly deployed making them viable for inaccessible terrains where they can quickly self-organize and form a network on the fly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Wikipedia. http://en.wikipedia.org/wiki/Sensor

  2. Seapahn M, Koushanfar F, Potkonjak M, Srivastava MB, Coverage problems in wireless ad-hoc sensor networks. http://www.ece.rice.edu/~fk1/papers/Infocom_coverage_01.pdf

  3. David C, Estrin D, Mani SM (2004) Overview of sensor networks. Computer 32:41–50. http://www.archrock.com/downloads/resources/IEEE-overview-2004.pdf

  4. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci A (2002) A survey on sensor networks. IEEE Commun Mag 40:102–114

    Google Scholar 

  5. Jay W, Smart sensor networks of the future. DA systems. http://archives.sensorsmag.com/articles/0397/net_mar/main.shtml

  6. Ortiz J, Moon D, Baker CR, Location service for point-to-point routing in wireless sensor networks. http://www.cs.berkeley.edu/~jortiz/papers/cs268_ortiz_moon_baker.pdf

  7. Sure A, Iyengar SS, Cho E (2006) Ecoinformatics using wireless sensor networks: an overview. Ecol Inform 1:287–293

    Article  Google Scholar 

  8. Subramanian NVK, Survey on energy-aware routing and routing protocols for sensor networks. http://archives.cs.iastate.edu/documents/disk0/00/00/05/19/00000519–00/energy_sr.pdf

  9. Krishnamachari B, Estrin D, Wicker S, The impact of data aggregation in wireless sensor networks. http://lecs.cs.ucla.edu/Publications/papers/krishnamacharib_aggregation.pdf

  10. De P, Liu Y, Das SK, Modeling node compromise spread in wireless sensor networks using epidemic theory. In: Proceedings of the 2006 international symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06). http://delivery.acm.org/10.1145/1140000/1139411/25930237.pdf?key1=1139411&key2=1877208021&coll=ACM&dl=ACM&CFID=63535215&CFTOKEN=62146412

  11. Stankovic JA, Research challenges for wireless sensor networks. http://doi.acm.org/10.1145/1121776.1121780

  12. Anand M, Ives Z, Lee I, Quantifying eavesdropping vulnerability in sensor networks. In: Proceedings of the 2nd international workshop on data management for sensor networks. ACM international conference proceeding series, vol 96. http://delivery.acm.org/10.1145/1090000/1080887/p3-anand.pdf?key1=1080887&key2=9635208021&coll=ACM&dl=ACM&CFID=63535215&CFTOKEN=62146412

  13. Hu YC, Perrig A, Johnson DB, Rushing attacks and defense in wireless ad hoc network routing protocols. http://www.monarch.cs.rice.edu/monarch-papers/wise03.pdf

  14. Perrig A, Secure routing in sensor networks. http://www.cylab.cmu.edu/default.aspx?id=1985

  15. Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD, SPINS: security protocols for sensor networks. http://www.ece.cmu.edu/~adrian/projects/mc2001/mc2001.pdf

  16. Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

    Article  Google Scholar 

  17. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: ACM conference on computer and communications security

    Google Scholar 

  18. Sabbah E, Majeed A, Kyoung-Don K, Liu K, Abu-Ghazaleh N (2006) An application-driven perspective on wireless sensor network security. Q2SWinet’06, October 2, 2006

    Google Scholar 

  19. Zhu S, Setia S, Jajodia S (2003) LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: The 10th ACM conference on computer and communication security (CCS’03)

    Google Scholar 

  20. Karlof C, Sastry N, Wagner D (2004) TinySec: a link layer security architecture for wireless sensor networks. In: ACM SenSys

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag London

About this chapter

Cite this chapter

Kizza, J.M. (2015). Security in Sensor Networks. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_19

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-6654-2_19

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-6653-5

  • Online ISBN: 978-1-4471-6654-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics