Computer Networks

Secure Sensor Networks for Perimeter Protection

, , and

Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.


  • 703032 bytes

intrusion detection, security, sensor network

Article

43

4

Downloads: 3703 downloads

Google Scholar Citations: 30 citations

UMBC ebiquity

Past Projects

  1. Intrusion Detection