Project

Ensuring Security and Privacy in Wireless Sensor Networks: Algorithms, Implementations and Applications

Goal: The goal of the project is to design and simulation robust security and privacy enforcing schemes for encryption and authentication and masking of messages communicated over resource-constrained wireless sensor networks. The project also deals with implementation of the algorithms in wireless network simulators and identifying appropriate applications and use cases for each algorithm.

Date: 1 December 2008

Updates
0 new
0
Recommendations
0 new
0
Followers
0 new
6
Reads
0 new
52

Project log

Jaydip Sen
added 24 research items
This presentation was delivered in a seminar organized in the National Institute of Science and Technology (NIST), Berhampur, India on September 27, 2012. It discusses how user data privacy can be protected in a wireless sensor network.
Traditional approach of providing network security has been to borrow tools and mechanisms from cryptography. However, the conventional view of security based on cryptography alone is not sufficient for the defending against unique and novel types of misbehavior exhibited by nodes in wireless self-organizing networks such as mobile ad hoc networks and wireless sensor networks. Reputation-based frameworks, where nodes maintain reputation of other nodes and use it to evaluate their trustworthiness, are deployed to provide scalable, diverse and a generalized approach for countering different types of misbehavior resulting form malicious and selfish nodes in these networks. In this chapter, we present a comprehensive discussion on reputation and trust-based systems for wireless self-organizing networks. Different classes of reputation system are described along with their unique characteristics and working principles. A number of currently used reputation systems are critically reviewed and compared with respect to their effectiveness and efficiency of performance. Some open problems in the area of reputation and trust-based system within the domain of wireless self-organizing networks are also discussed.
Wireless Sensor Networks (WSNs) are rapidly emerging as an important new area in wireless and mobile computing research. Applications of WSNs are numerous and growing, and range from indoor deployment scenarios in the home and office to outdoor deployment scenarios in adversary's territory in a tactical battleground (Akyildiz et al., 2002). For military environment, dispersal of WSNs into an adversary's territory enables the detection and tracking of enemy soldiers and vehicles. For home/office environments, indoor sensor networks offer the ability to monitor the health of the elderly and to detect intruders via a wireless home security system. In each of these scenarios, lives and livelihoods may depend on the timeliness and correctness of the sensor data obtained from dispersed sensor nodes. As a result, such WSNs must be secured to prevent an intruder from obstructing the delivery of correct sensor data and from forging sensor data. To address the latter problem, end-to-end data integrity checksums and post-processing of senor data can be used to identify forged sensor data (Estrin et al., 1999; Hu et al., 2003a; Ye et al., 2004). The focus of this chapter is on routing security in WSNs. Most of the currently existing routing protocols for WSNs make an optimization on the limited capabilities of the nodes and the application-specific nature of the network, but do not any the security aspects of the protocols. Although these protocols have not been designed with security as a goal, it is extremely important to analyze their security properties. When the defender has the liabilities of insecure wireless communication, limited node capabilities, and possible insider threats, and the adversaries can use powerful laptops with high energy and long range communication to attack the network, designing a secure routing protocol for WSNs is obviously a non-trivial task.
Jaydip Sen
added a project goal
The goal of the project is to design and simulation robust security and privacy enforcing schemes for encryption and authentication and masking of messages communicated over resource-constrained wireless sensor networks. The project also deals with implementation of the algorithms in wireless network simulators and identifying appropriate applications and use cases for each algorithm.