UMBC ebiquity

Secure Sensor Networks for Perimeter Protection

Authors: Sasikanth Avancha, Anupam Joshi, and John Pinkston

Journal: Computer Networks

Date: November 30, 2003

Abstract: Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.

Type: Article

Pages: 421--435

Number: 4

Volume: 43

Tags: sensor network, security, intrusion detection

Google Scholar: BZwHppfVN6kJ

Number of Google Scholar citations: 30 [show citations]

Number of downloads: 2441

 

Available for download as


size: 703032 bytes
 

Related Projects:

Past Project

 Intrusion Detection.