scispace - formally typeset
Search or ask a question

Showing papers by "Helen C. Leligou published in 2010"


Journal ArticleDOI
TL;DR: A trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments, and has been implemented in state-of-the-art sensor nodes for a real-life test-bed.
Abstract: The domain of Wireless Sensor Networks (WSNs) applications is increasing widely over the last few years. As this new type of networking is characterized by severely constrained node resources, limited network resources and the requirement to operate in an ad hoc manner, implementing security functionality to protect against adversary nodes becomes a challenging task. In this paper, we present a trust-aware, location-based routing protocol which protects the WSN against routing attacks, and also supports large-scale WSNs deployments. The proposed solution has been shown to efficiently detect and avoid malicious nodes and has been implemented in state-of-the-art sensor nodes for a real-life test-bed. This work focuses on the assessment of the implementation cost and on the lessons learned through the design, implementation and validation process .

35 citations


Journal ArticleDOI
TL;DR: This paper proposes innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information that is used by the routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network.
Abstract: Security in sensor networks is one of the most relevant research topics in resource constrained wireless devices and networks. Several attacks can be suffered in ad hoc and wireless sensor networks (WSN), which are highly susceptible to attacks, due to the limited resources of the nodes. In this paper, we propose innovative and lightweight localization techniques that allow for intrusion identification and isolation schemes and provide accurate location information. This information is used by our routing protocol which additionally incorporates a distributed trust model to prevent several routing attacks to the network. We finally evaluate our algorithms for accurate localization and for secure routing which have been implemented and tested in real ad hoc and wireless sensor networks.

22 citations


Proceedings ArticleDOI
06 Sep 2010
TL;DR: Several challenges addressed during the implementation of a trust-aware management scheme on commercial sensor nodes, as well as problems faced during the deployment of the test-bed network are discussed.
Abstract: Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application domains. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Trust-aware routing is an important direction in designing secure routing protocols for WSN. The common approach to provide trust-aware routing is to implement an efficient mechanism to evaluate the trustworthiness of neighboring nodes, based on a proper set of trust metrics. In this paper, we discuss several challenges addressed during the implementation of a trust-aware management scheme on commercial sensor nodes, as well as problems faced during the deployment of the test-bed network. As it will be discussed, the limited memory, computational power, energy resources and radio bandwidth of sensor nodes deeply impact the implementation strategy, while additionally, the realities of radio propagation, such as lossy and asymmetric links, require careful evaluation of the routing selection metrics.

18 citations


Proceedings ArticleDOI
06 Sep 2010
TL;DR: This paper analyses as example applications the urban surveillance case based on a set of different sensors, and identifies communication modules and parameters that can be reconfigured/reprogrammed and investigates the reconfiguration frequency desired.
Abstract: Wireless Sensor Networks are becoming more and more popular and offer a wide set of solutions invading our life As the research community is working towards integrating them in the so-called “Internet of Things”, the capability to reconfigure them provides an unprecedented flexibility allowing for the flexible use of all available resources of different types However, the desired reconfiguration features differ from use case to use case while the architecture of the device is also a restrictive factor Full or partial reconfiguration, partial reprogramming, different reconfiguration frequencies and reprogramming of different functional components of the devices are among the available options Since reconfiguration/reprogramming offers important benefits increasing however the complexity of the implemented logic and the network load, the design of reconfiguration applications is not a trivial task This paper presents use cases where the reconfiguration features can be exploited, and discusses the functional blocks that can be reconfigured We analyse as example applications the urban surveillance case based on a set of different sensors, and we identify communication modules and parameters that can be reconfigured/reprogrammed and investigate the reconfiguration frequency desired Special emphasis is placed on the security modules and their attributes such as the key-length of the encryption algorithm

8 citations


Proceedings ArticleDOI
10 Sep 2010
TL;DR: This paper presents a distributed trust management framework, which allows for trusted path selection in wireless sensor networks, and discusses its implementation feasibility and cost, as well as the energy consumption issues.
Abstract: Wireless Sensor Networks are gaining popularity due to the fact that they offer low-cost solutions for a variety of application areas. However, these networks are highly susceptible to attacks, due to both the open and distributed nature of the network, as well as the limited resources of the nodes, which dictate the implementation of sophisticated security frameworks. Addressing this challenge in this paper, we present a distributed trust management framework, which allows for trusted path selection. The framework has been initially evaluated based on simulations in JSIM, and then adapted and implemented in state-of-the-art sensor nodes. In this paper, we discuss its implementation feasibility and cost, as well as the energy consumption issues.

4 citations