FleGSens – Secure Area Monitoring Using Wireless Sensor Networks

In the project FleGSens, a wireless sensor network (WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information security. The intended prototype consists of 200 sensor nodes for monitoring a 500m long land strip. The system is focused on ensuring integrity and authenticity of generated alarms and availability in the presence of an attacker who may even compromise a limited number of sensor nodes. In this paper, two of the main protocols developed in the project are presented, a tracking protocol to provide secure detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols and particularly demonstrating the impact and cost of several attacks.




References:
[1] D. Dolev and A. Yao, "On the security of public key protocols," IEEE
Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983,
iSSN: 0018-9448.
[2] C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, "Efficient in-network moving
object tracking in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 5, no. 8, pp. 1044-1056, 2006.
[3] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman,
S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, "A line in the sand: a wireless sensor network for target detection,
classification, and tracking," Computer Networks, vol. 46, no. 5, pp. 605- 634, 2004, military Communications Systems and Technologies. [Online]. Available: http://www.sciencedirect.com/science/article/B6VRG-
4CXKNBT-1/2/38791b700b4804d30e9df8aca23712e7
[4] Y. Xu, J. Winter, and W.-C. Lee, "Dual prediction-based reporting for
object tracking sensor networks," in Mobile and Ubiquitous Systems:
Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual
International Conference on, Aug. 2004, pp. 154-163.
[5] H. Yang and B. Sikdar, "A protocol for tracking mobile targets using
sensor networks," in Sensor Network Protocols and Applications, 2003.
Proceedings of the First IEEE. 2003 IEEE International Workshop on,
May 2003, pp. 71-81.
[6] A. Perrig, R. Canetti, D. Tygar, and D. Song, "The tesla broadcast
authentication protocol," Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002,
http://www.rsasecurity.com/rsalabs/cryptobytes/.
[7] Mahalingam Ramkumar and Nasir Memon, "Harps: Hashed random
preloaded subset key distribution," Cryptology ePrint Archive, 2003.
[Online]. Available: citeseer.ist.psu.edu/727910.html
[8] IEEE 802.15 Working Group, "IEEE 802.15 WPAN Task Group 4
(TG4)," http://www.ieee802.org/15/pub/TG4.html.
[9] Y. Zeng, S. Zhang, S. Guo, and X. Li, "Secure hop-count based
localization in wireless sensor networks," in CIS -07: Proceedings of
the 2007 International Conference on Computational Intelligence and
Security. Washington, DC, USA: IEEE Computer Society, 2007, pp.
907-911.
[10] A. Kr¨oller, D. Pfisterer, C. Buschmann, S. P. Fekete, and S. Fischer,
"Shawn: A new approach to simulating wireless sensor networks," in
Design, Analysis, and Simulation of Distributed Systems 2005 (DASD-
05), Apr. 2005, pp. 117-124.
[11] C. Buschmann and D. Pfisterer, "iSense: A modular hardware and
software platform for wireless sensor networks," 6. Fachgesprch
Drahtlose Sensornetze der GI/ITG-Fachgruppe Kommunikation
und Verteilte Systeme, Tech. Rep., 2007. [Online]. Available:
http://ds.informatik.rwth-aachen.de/events/fgsn07
[12] G. Barrenetxea, F. Ingelrest, G. Schaefer, and M. Vetterli, "The hitchhiker-s
guide to successful wireless sensor network deployments," in SenSys -08: Proceedings of the 6th ACM conference on Embedded network sensor systems. New York, NY, USA: ACM, 2008, pp. 43-56.