FleGSens – Secure Area Monitoring Using Wireless Sensor Networks
In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
[1] D. Dolev and A. Yao, "On the security of public key protocols," IEEE
Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983,
iSSN: 0018-9448.
[2] C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, "Efficient in-network moving
object tracking in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 5, no. 8, pp. 1044-1056, 2006.
[3] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman,
S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, "A line in the sand: a wireless sensor network for target detection,
classification, and tracking," Computer Networks, vol. 46, no. 5, pp. 605- 634, 2004, military Communications Systems and Technologies. [Online]. Available: http://www.sciencedirect.com/science/article/B6VRG-
4CXKNBT-1/2/38791b700b4804d30e9df8aca23712e7
[4] Y. Xu, J. Winter, and W.-C. Lee, "Dual prediction-based reporting for
object tracking sensor networks," in Mobile and Ubiquitous Systems:
Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual
International Conference on, Aug. 2004, pp. 154-163.
[5] H. Yang and B. Sikdar, "A protocol for tracking mobile targets using
sensor networks," in Sensor Network Protocols and Applications, 2003.
Proceedings of the First IEEE. 2003 IEEE International Workshop on,
May 2003, pp. 71-81.
[6] A. Perrig, R. Canetti, D. Tygar, and D. Song, "The tesla broadcast
authentication protocol," Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002,
http://www.rsasecurity.com/rsalabs/cryptobytes/.
[7] Mahalingam Ramkumar and Nasir Memon, "Harps: Hashed random
preloaded subset key distribution," Cryptology ePrint Archive, 2003.
[Online]. Available: citeseer.ist.psu.edu/727910.html
[8] IEEE 802.15 Working Group, "IEEE 802.15 WPAN Task Group 4
(TG4)," http://www.ieee802.org/15/pub/TG4.html.
[9] Y. Zeng, S. Zhang, S. Guo, and X. Li, "Secure hop-count based
localization in wireless sensor networks," in CIS -07: Proceedings of
the 2007 International Conference on Computational Intelligence and
Security. Washington, DC, USA: IEEE Computer Society, 2007, pp.
907-911.
[10] A. Kr¨oller, D. Pfisterer, C. Buschmann, S. P. Fekete, and S. Fischer,
"Shawn: A new approach to simulating wireless sensor networks," in
Design, Analysis, and Simulation of Distributed Systems 2005 (DASD-
05), Apr. 2005, pp. 117-124.
[11] C. Buschmann and D. Pfisterer, "iSense: A modular hardware and
software platform for wireless sensor networks," 6. Fachgesprch
Drahtlose Sensornetze der GI/ITG-Fachgruppe Kommunikation
und Verteilte Systeme, Tech. Rep., 2007. [Online]. Available:
http://ds.informatik.rwth-aachen.de/events/fgsn07
[12] G. Barrenetxea, F. Ingelrest, G. Schaefer, and M. Vetterli, "The hitchhiker-s
guide to successful wireless sensor network deployments," in SenSys -08: Proceedings of the 6th ACM conference on Embedded network sensor systems. New York, NY, USA: ACM, 2008, pp. 43-56.
[1] D. Dolev and A. Yao, "On the security of public key protocols," IEEE
Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983,
iSSN: 0018-9448.
[2] C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, "Efficient in-network moving
object tracking in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 5, no. 8, pp. 1044-1056, 2006.
[3] A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V. Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman,
S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, "A line in the sand: a wireless sensor network for target detection,
classification, and tracking," Computer Networks, vol. 46, no. 5, pp. 605- 634, 2004, military Communications Systems and Technologies. [Online]. Available: http://www.sciencedirect.com/science/article/B6VRG-
4CXKNBT-1/2/38791b700b4804d30e9df8aca23712e7
[4] Y. Xu, J. Winter, and W.-C. Lee, "Dual prediction-based reporting for
object tracking sensor networks," in Mobile and Ubiquitous Systems:
Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual
International Conference on, Aug. 2004, pp. 154-163.
[5] H. Yang and B. Sikdar, "A protocol for tracking mobile targets using
sensor networks," in Sensor Network Protocols and Applications, 2003.
Proceedings of the First IEEE. 2003 IEEE International Workshop on,
May 2003, pp. 71-81.
[6] A. Perrig, R. Canetti, D. Tygar, and D. Song, "The tesla broadcast
authentication protocol," Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002,
http://www.rsasecurity.com/rsalabs/cryptobytes/.
[7] Mahalingam Ramkumar and Nasir Memon, "Harps: Hashed random
preloaded subset key distribution," Cryptology ePrint Archive, 2003.
[Online]. Available: citeseer.ist.psu.edu/727910.html
[8] IEEE 802.15 Working Group, "IEEE 802.15 WPAN Task Group 4
(TG4)," http://www.ieee802.org/15/pub/TG4.html.
[9] Y. Zeng, S. Zhang, S. Guo, and X. Li, "Secure hop-count based
localization in wireless sensor networks," in CIS -07: Proceedings of
the 2007 International Conference on Computational Intelligence and
Security. Washington, DC, USA: IEEE Computer Society, 2007, pp.
907-911.
[10] A. Kr¨oller, D. Pfisterer, C. Buschmann, S. P. Fekete, and S. Fischer,
"Shawn: A new approach to simulating wireless sensor networks," in
Design, Analysis, and Simulation of Distributed Systems 2005 (DASD-
05), Apr. 2005, pp. 117-124.
[11] C. Buschmann and D. Pfisterer, "iSense: A modular hardware and
software platform for wireless sensor networks," 6. Fachgesprch
Drahtlose Sensornetze der GI/ITG-Fachgruppe Kommunikation
und Verteilte Systeme, Tech. Rep., 2007. [Online]. Available:
http://ds.informatik.rwth-aachen.de/events/fgsn07
[12] G. Barrenetxea, F. Ingelrest, G. Schaefer, and M. Vetterli, "The hitchhiker-s
guide to successful wireless sensor network deployments," in SenSys -08: Proceedings of the 6th ACM conference on Embedded network sensor systems. New York, NY, USA: ACM, 2008, pp. 43-56.
@article{"International Journal of Electrical, Electronic and Communication Sciences:53711", author = "Peter Rothenpieler and Daniela Kruger and Dennis Pfisterer and Stefan Fischer and Denise Dudek and Christian Haas and Martina Zitterbart", title = "FleGSens – Secure Area Monitoring Using Wireless Sensor Networks", abstract = "In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.", keywords = "Wireless Sensor Network, Security, Trespass Detection, Testbed.", volume = "3", number = "8", pages = "1537-12", }