scispace - formally typeset
Search or ask a question
Book ChapterDOI

Efficient and Secure Keying Mechanism for Communication in Sensor Networks

TL;DR: In this paper, the authors present a methodology to design attack-aware efficient secure keying mechanism that provides secure data transmission from one sensor node to another, which is an important constraint for the healthy operations of overall system in untrusted areas as these entities may disturb the proper functioning of applications by injecting wrong data into sensor networks.
Abstract: Now a days the wireless sensor technologies are mostly being used in a typical application areas including environmental, defence, medical, military and commercial enterprises. In upcoming years, wireless sensor networks will integrate more tiny sensors into a variety of application scenarios like cyber physical systems, IoT etc. The security of sensor networks is an important constraint for the healthy operations of overall system in untrusted areas as these entities may disturb the proper functioning of applications by injecting wrong data into sensor networks. One way to address this issue is to provide more security to sensor nodes and encrypt the communication among them. This paper presents methodology to design attack-aware efficient secure keying mechanism that provides secure data transmission from one sensor node to another.
Citations
More filters
Journal ArticleDOI
TL;DR: In this article , the authors proposed a system that can assist farmers to foresee the crop disease using machine learning algorithm, which can be predicted based on the environmental parameters such as soil moisture, temperature and humidity obtained from sensor node and other parameters like rain fall, evaporation rate and sun shine hour obtained from open weather map application programming interfaces.
Abstract: Designing wireless sensor networks (WSNs) that will sustain for longer time have been a challenging issue. For achieving this, efficient utilization of available energy should be anticipated from energy-constrained sensors running autonomously for long periods. In the field of agricultural research, farming related activities, assistance to farmers using advanced IoT and sensor network technologies is a need of time. Initially this paper briefed about smartphone based application systems that forewarns the farmer about pests/diseases that can occur on the crop. The designed system assists farmers to foresee the crop disease using machine learning algorithm. The disease can be predicted based on the environmental parameters as soil moisture, temperature and humidity obtained from sensor node and other parameters like rain fall, evaporation rate and sun shine hour obtained from open weather map application programming interfaces. A prototype is developed using ultra low powered micro-controller with interconnected sensor’s module. While comparing with the Arduino micro-controller based system, it was observed that the developed prototype system utilized less energy with effectively forewarned the farmers about crop diseases using Internet of Things (IoT). Thus it would assist the farmers proactively to reduce the losses due to crop diseases.
Proceedings ArticleDOI
01 Dec 2022
TL;DR: In this article , the authors proposed a system that can assist farmers to foresee the crop disease using machine learning algorithm, which can be predicted based on the environmental parameters such as soil moisture, temperature and humidity obtained from sensor node and other parameters like rain fall, evaporation rate and sun shine hour obtained from open weather map application programming interfaces.
Abstract: Designing wireless sensor networks (WSNs) that will sustain for longer time have been a challenging issue. For achieving this, efficient utilization of available energy should be anticipated from energy-constrained sensors running autonomously for long periods. In the field of agricultural research, farming related activities, assistance to farmers using advanced IoT and sensor network technologies is a need of time. Initially this paper briefed about smartphone based application systems that forewarns the farmer about pests/diseases that can occur on the crop. The designed system assists farmers to foresee the crop disease using machine learning algorithm. The disease can be predicted based on the environmental parameters as soil moisture, temperature and humidity obtained from sensor node and other parameters like rain fall, evaporation rate and sun shine hour obtained from open weather map application programming interfaces. A prototype is developed using ultra low powered micro-controller with interconnected sensor’s module. While comparing with the Arduino micro-controller based system, it was observed that the developed prototype system utilized less energy with effectively forewarned the farmers about crop diseases using Internet of Things (IoT). Thus it would assist the farmers proactively to reduce the losses due to crop diseases.
References
More filters
Journal ArticleDOI
TL;DR: The aim is to provide a contemporary look at the current state of the art in IWSNs and discuss the still-open research issues in this field and to make the decision-making process more effective and direct.
Abstract: In today's competitive industry marketplace, the companies face growing demands to improve process efficiencies, comply with environmental regulations, and meet corporate financial objectives. Given the increasing age of many industrial systems and the dynamic industrial manufacturing market, intelligent and low-cost industrial automation systems are required to improve the productivity and efficiency of such systems. The collaborative nature of industrial wireless sensor networks (IWSNs) brings several advantages over traditional wired industrial monitoring and control systems, including self-organization, rapid deployment, flexibility, and inherent intelligent-processing capability. In this regard, IWSN plays a vital role in creating a highly reliable and self-healing industrial system that rapidly responds to real-time events with appropriate actions. In this paper, first, technical challenges and design principles are introduced in terms of hardware development, system architectures and protocols, and software development. Specifically, radio technologies, energy-harvesting techniques, and cross-layer design for IWSNs have been discussed. In addition, IWSN standards are presented for the system owners, who plan to utilize new IWSN technologies for industrial automation applications. In this paper, our aim is to provide a contemporary look at the current state of the art in IWSNs and discuss the still-open research issues in this field and, hence, to make the decision-making process more effective and direct.

1,595 citations

Proceedings ArticleDOI
09 May 2004
TL;DR: This paper presents an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised.
Abstract: Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects false data into the network with the goal of deceiving the base station or depleting the resources of the relaying nodes. Standard authentication mechanisms cannot prevent this attack if the adversary has compromised one or a small number of sensor nodes. In this paper, we present an interleaved hop-by-hop authentication scheme that guarantees that the base station will detect any injected false data packets when no more than a certain number t nodes are compromised. Further, our scheme provides an upper bound B for the number of hops that a false data packet could be forwarded before it is detected and dropped, given that there are up to t colluding compromised nodes. We show that in the worst case B is O(t/sup 2/). Through performance analysis, we show that our scheme is efficient with respect to the security it provides, and it also allows a tradeoff between security and performance.

628 citations

Journal ArticleDOI
TL;DR: The results show that SEF can be implemented efficiently in sensor nodes as small as Mica2, and can drop up to 70% of bogus reports injected by a compromised node within five hops, and reduce energy consumption by 65% or more in many cases.
Abstract: In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can be used to inject bogus sensing reports. If undetected, these bogus reports would be forwarded to the data collection point (i.e., the sink). Such attacks by compromised nodes can result in not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In this paper, we present a statistical en-route filtering (SEF) mechanism to detect and drop false reports during the forwarding process. Assuming that the same event can be detected by multiple sensors, in SEF each of the detecting sensors generates a keyed message authentication code (MAC) and multiple MACs are attached to the event report. As the report is forwarded, each node along the way verifies the correctness of the MAC's probabilistically and drops those with invalid MACs. SEF exploits the network scale to filter out false reports through collective decision-making by multiple detecting nodes and collective false detection by multiple forwarding nodes. We have evaluated SEF's feasibility and performance through analysis, simulation, and implementation. Our results show that SEF can be implemented efficiently in sensor nodes as small as Mica2. It can drop up to 70% of bogus reports injected by a compromised node within five hops, and reduce energy consumption by 65% or more in many cases.

535 citations

Proceedings ArticleDOI
25 Apr 2007
TL;DR: A publicly available implementation of MiniSec is presented, one tailored for single-source communication, and another tailored for multi-source broadcast communication, that scales to large networks.
Abstract: Secure sensor network communication protocols need to provide three basic properties: data secrecy, authentication, and replay protection. Secure sensor network link layer protocols such as Tiny- Sec (C. Karlof et al., 2004) and ZigBee (2005) enjoy significant attention in the community. However, TinySec achieves low energy consumption by reducing the level of security provided. In contrast, ZigBee enjoys high security, but suffers from high energy consumption. MiniSec is a secure network layer that obtains the best of both worlds: low energy consumption and high security. MiniSec has two operating modes, one tailored for single-source communication, and another tailored for multi-source broadcast communication. The latter does not require per-sender state for replay protection and thus scales to large networks. We present a publicly available implementation of MiniSec for the Telos platform, and experimental results demonstrate our low energy utilization.

385 citations

Journal ArticleDOI
TL;DR: This article presents a classification of key management schemes in sensor networks delineating their similarities and differences, and describes a novel dynamic key management scheme, localized combinatorial keying (LOCK), and compares its security and performance with a representative staticKey management scheme.
Abstract: Numerous key management schemes have been proposed for sensor networks. The objective of key management is to dynamically establish and maintain secure channels among communicating nodes. Desired features of key management in sensor networks include energy awareness, localized impact of attacks, and scaling to a large number of nodes. A primary challenge is managing the trade-off between providing acceptable levels of security and conserving scarce resources, in particular energy, needed for network operations. Many schemes, referred to as static schemes, have adopted the principle of key predistribution with the underlying assumption of a relatively static short-lived network (node replenishments are rare, and keys outlive the network). An emerging class of schemes, dynamic key management schemes, assumes long-lived networks with more frequent addition of new nodes, thus requiring network rekeying for sustained security and survivability. In this article we present a classification of key management schemes in sensor networks delineating their similarities and differences. We also describe a novel dynamic key management scheme, localized combinatorial keying (LOCK), and compare its security and performance with a representative static key management scheme. Finally, we outline future research directions.

221 citations