Routing Security in Wireless Sensor Networks

Routing Security in Wireless Sensor Networks

A.R. Naseer (King Fahd University of Petroleum & Minerials, Dhahran), Ismat K. Maarouf (King Fahd University of Petroleum & Minerials, Dhahran) and Ashraf S. Hasan (King Fahd University of Petroleum & Minerials, Dhahran)
Copyright: © 2008 |Pages: 35
DOI: 10.4018/978-1-59904-899-4.ch036
OnDemand PDF Download:
$37.50

Abstract

Since routing is a fundamental operation in all types of networks, ensuring routing security is a necessary requirement to guarantee the success of routing operation. Securing routing task gets more challenging as the target network lacks an infrastructure-based routing operation. This infrastructure-less nature that invites a multihop routing operation is one of the main features of wireless sensor networks that raises the importance of secure routing problem in these networks. Moreover, the risky environment, application criticality, and resources limitations and scarcity exhibited by wireless sensor networks make the task of secure routing much more challenging. All these factors motivate researchers to find novel solutions and approaches that would be different from the usual approaches adopted in other types of networks. The purpose of this chapter is to provide a comprehensive treatment of the routing security problem in wireless sensor networks. The discussion flow of the problem in this chapter begins with an overview on wireless sensor networks that focuses on routing aspects to indicate the special characteristics of wireless sensor networks from routing perspective. The chapter then introduces the problem of secure routing in wireless sensor networks and illustrates how crucial the problem is to different networking aspects. This is followed by a detailed analysis of routing threats and attacks that are more specific to routing operation in wireless sensor networks. A research-guiding approach is then presented to the reader that analyzes and criticizes different techniques and solution directions for the secure routing problem in wireless sensor network. This is supported by state-of-the-art and familiar examples from the literature. The chapter finally concludes with a summary and future research directions in this field.

Key Terms in this Chapter

Intrusion: Can be defined as a set of actions that can lead to an unauthorized access or alteration of a certain system.

DoS Attack: Any event that decreases or eliminates a network’s capacity to perform its expected function is termed as a denial-of-service attack or commonly known as DoS attack.

Reputation System: A type of collaborative filtering algorithm which attempts to determine ratings for a collection of entities, given a collection of opinions that those entities hold about each other.

Wireless Sensor Network (WSN): A wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants at different locations.

Routing Attacks: Network layer attacks such as routing information spoofing, alteration or replay, blackhole and selective forwarding attacks, sinkhole attacks, Sybil attacks, wormhole attacks, HELLO flood attacks, and acknowledgement spoofing.

Routing Security: Securing routing operation from attacks in a network by deploying appropriate defense.

Trust: A relationship of reliance. Trust is a prediction of reliance on an action, based on what a node knows about the other node, in the context of wireless sensor networks. The notion of trust is increasingly adopted to predict acceptance of behaviors by others.

Key Management: A scheme to dynamically establish and maintain secure channels among communicating nodes. In wireless sensor networks, a key management scheme must deal with the following important issues: key deployment/key predistribution, key discovery, key establishment/key setup, node addition/rekeying, and node eviction/key revocation.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Preface
Yan Zhang, Jun Zheng, Miao Ma
Acknowledgment
Yan Zhang, Jun Zheng, Miao Ma
Chapter 1
Thomas M. Chen, Cyrus Peikari
This chapter examines the scope of malicious software (malware) threats to mobile devices. The stakes for the wireless industry are high. While... Sample PDF
Malicious Software in Mobile Devices
$37.50
Chapter 2
Sheikh I. Ahamed, John F. Buford, Moushumi Sharmin, Munirul M. Haque, Nilothpal Talukder
In broadband wireless networks, mobile devices will be equipped to directly share resources using service discovery mechanisms without relying upon... Sample PDF
Secure Service Discovery
$37.50
Chapter 3
Zbigniew Kotulski, Aneta Zwierko
The recent development in the mobile technology (mobile phones, middleware, wireless networks, etc.) created a need for new methods of protecting... Sample PDF
Security of Mobile Code
$37.50
Chapter 4
Identity Management  (pages 44-60)
Kumbesan Sandrasegaran, Mo Li
The broad aim of identity management (IdM) is to manage the resources of an organization (such as files, records, data, and communication... Sample PDF
Identity Management
$37.50
Chapter 5
Wireless Wardriving  (pages 61-77)
Luca Caviglione
Wardriving is the practice of searching wireless networks while moving. Originally, it was explicitly referred to as people searching for wireless... Sample PDF
Wireless Wardriving
$37.50
Chapter 6
Amel Meddeb Makhlouf, Noureddine Boudriga
The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless... Sample PDF
Intrusion and Anomaly Detection in Wireless Networks
$37.50
Chapter 7
Lu Yan
A lot of networks today are behind firewalls. In peer-to-peer (P2P) networking, firewall-protected peers may have to communicate with peers outside... Sample PDF
Peer-to-Peer (P2P) Network Security: Firewall Issues
$37.50
Chapter 8
Mohammad M.R. Chowdhury, Josef Noll
Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless... Sample PDF
Identity Management for Wireless Service Access
$37.50
Chapter 9
Peter Langendörfer, Michael Maaser, Krzysztof Piotrowski, Steffen Peter
This chapter provides a survey of privacy-enhancing techniques and discusses their effect using a scenario in which a charged location-based service... Sample PDF
Privacy-Enhancing Technique: A Survey and Classification
$37.50
Chapter 10
Lawan A. Mohammed, Biju Issac
This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the... Sample PDF
Vulnerability Analysis and Defenses in Wireless Networks
$37.50
Chapter 11
György Kálmán, Josef Noll
This chapter deals with challenges raised by securing transport, service access, user privacy, and accounting in wireless environments. Key... Sample PDF
Key Distribution and Management for Mobile Applications
$37.50
Chapter 12
Said Zaghloul, Admela Jukan
The architecture, and protocols for authentication, authorization, and accounting (AAA) are one of the most important design considerations in third... Sample PDF
Architecture and Protocols for Authentication, Authorization, and Accounting in the Future Wireless Communications Networks
$37.50
Chapter 13
Josef Noll, György Kálmán
Converging networks and mobility raise new challenges towards the existing authentication, authorisation, and accounting (AAA) systems. Focus of the... Sample PDF
Authentication, Authorisation, and Access Control in Mobile Systems
$37.50
Chapter 14
Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga
Wireless networks are gaining popularity that comes with the occurrence of several networking technologies raising from personal to wide area, from... Sample PDF
Trustworthy Networks, Authentication, Privacy, and Security Models
$37.50
Chapter 15
Jianfeng Ma, Xinghua Li
In the design and analysis of authentication and key agreement protocols, provably secure formal methods play a very important role, among which the... Sample PDF
The Provably Secure Formal Methods for Authentication and Key Agreement Protocols
$37.50
Chapter 16
Shiguo Lian
In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which... Sample PDF
Multimedia Encryption and Watermarking in Wireless Environment
$37.50
Chapter 17
Paris Kitsos
In this chapter, a system-on-chip design of the newest powerful standard in the hash families, named Whirlpool, is presented. With more details an... Sample PDF
System-on-Chip Design of the Whirlpool Hash Function
$37.50
Chapter 18
Security in 4G  (pages 272-296)
Artur Hecker, Mohamad Badra
The fourth generation (4G) of mobile networks will be a technology-opportunistic and user-centric system combining the economic and technological... Sample PDF
Security in 4G
$37.50
Chapter 19
Christoforos Ntantogian, Christos Xenakis
The integration of heterogeneous mobile/wireless networks using an IP-based core network materializes the beyond third generation (B3G) mobile... Sample PDF
Security Architectures for B3G Mobile Networks
$37.50
Chapter 20
Christos Xenakis
This chapter analyzes the security architecture designed for the protection of the universal mobile telecommunication system (UMTS). This... Sample PDF
Security in UMTS 3G Mobile Networks
$37.50
Chapter 21
Yan Zhang, Yifan Chen, Rong Yu, Supeng Leng, Huansheng Ning, Tao Jiang
Motivated by the requirements for higher data rate, richer multimedia services, and broader radio range wireless mobile networks are currently in... Sample PDF
Access Security in UMTS and IMS
$37.50
Chapter 22
Christos Xenakis
The global system for mobile communications (GSM) is the most popular standard that implements second generation (2G) cellular systems. 2G systems... Sample PDF
Security in 2.5G Mobile Systems
$37.50
Chapter 23
Sasan Adibi, Gordon B. Agnew
Security measures of mobile infrastructures have always been important from the early days of the creation of cellular networks. Nowadays, however... Sample PDF
End-to-End Security Comparisons Between IEEE 802.16e and 3G Technologies
$37.50
Chapter 24
Silke Holtmanns, Pekka Laitinen
This chapter outlines how cellular authentication can be utilized for generic application security. It describes the basic concept of the generic... Sample PDF
Generic Application Security in Current and Future Networks
$37.50
Chapter 25
Sangheon Pack, Sungmin Baek, Taekyoung Kwon, Yanghee Choi
Network mobility (NEMO) enables seamless and ubiquitous Internet access while on-board vehicles. Even though the Internet Engineering Task Force... Sample PDF
Authentication, Authorization, and Accounting (AAA) Framework in Network Mobility (NEMO) Environments
$37.50
Chapter 26
Bin Lu
Mobile ad hoc network (MANET) is a self-configuring and self-maintaining network characterized as dynamic topology, absence of infrastructure, and... Sample PDF
Security in Mobile Ad Hoc Networks
$37.50
Chapter 27
Christer Andersson, Leonardo A. Martucci, Simone Fischer-Hübner
Providing privacy is often considered a keystone factor for the ultimate take up and success of mobile ad hoc networking. Privacy can best be... Sample PDF
Privacy and Anonymity in Mobile Ad Hoc Networks
$37.50
Chapter 28
Tomasz Ciszkowski, Zbigniew Kotulski
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate... Sample PDF
Secure Routing with Reputation in MANET
$37.50
Chapter 29
Paolo Bellavista, Rebecca Montanari, Daniela Tibaldi, Alessandra Toninelli
The increasing diffusion of wireless portable devices and the emergence of mobile ad hoc networks promote anytime and anywhere opportunistic... Sample PDF
Trust Management and Context-Driven Access Control
$37.50
Chapter 30
Bing Wu, Jie Wu, Mihaela Cardei
Security has become a primary concern in mobile ad hoc networks (MANETs). The characteristics of MANETs pose both challenges and opportunities in... Sample PDF
A Survey of Key Management in Mobile Ad Hoc Networks
$37.50
Chapter 31
Sasan Adibi, Gordon B. Agnew
Mobile ad hoc networks (MANETs) have gained popularity in the past decade with the creation of a variety of ad hoc protocols that specifically offer... Sample PDF
Security Measures for Mobile Ad-Hoc Networks (MANETs)
$37.50
Chapter 32
Hao Yin, Chuang Lin, Zhijia Chen, Geyong Min
The integration of wireless communication and embedded video systems is a demanding and interesting topic which has attracted significant research... Sample PDF
A Novel Secure Video Surveillance System Over Wireless Ad Hoc Networks
$37.50
Chapter 33
John Felix Charles Joseph, Amitabha Das, Boon-Chong Seet, Bu-Sung Lee
Intrusion detection in ad hoc networks is a challenge because of the inherent characteristics of these networks, such as, the absence of centralized... Sample PDF
Cutting the Gordian Knot: Intrusion Detection Systems in Ad Hoc Networks
$37.50
Chapter 34
Luis E. Palafox, J. Antonio Garcia-Macias
In this chapter we present the growing challenges related to security in wireless sensor networks. We show possible attack scenarios and evidence... Sample PDF
Security in Wireless Sensor Networks
$37.50
Chapter 35
Mohamed Hamdi, Noreddine Boudriga
The applications of wireless sensor networks (WSNs) are continuously expanding. Recently, consistent research and development activities have been... Sample PDF
Security and Privacy in Wireless Sensor Networks: Challenges and Solutions
$37.50
Chapter 36
A.R. Naseer, Ismat K. Maarouf, Ashraf S. Hasan
Since routing is a fundamental operation in all types of networks, ensuring routing security is a necessary requirement to guarantee the success of... Sample PDF
Routing Security in Wireless Sensor Networks
$37.50
Chapter 37
Yawen Wei, Zhen Yu, Yong Guan
Localization of sensor nodes is very important for many applications proposed for wireless sensor networks (WSN), such as environment monitoring... Sample PDF
Localization Security in Wireless Sensor Networks
$37.50
Chapter 38
Miao Ma
One of the severe security threats in wireless sensor network is false data injection attack, that is, the compromised sensors forge the events that... Sample PDF
Resilience Against False Data Injection Attack in Wireless Sensor Networks
$37.50
Chapter 39
Jean-Marc Seigneur, Luminita Moraru, Olivier Powell
Weiser (1991) envisioned ubiquitous computing with computing and communicating entities woven into the fabrics of every day life. This chapter deals... Sample PDF
Survivability of Sensors with Key and Trust Management
$37.50
Chapter 40
Yu Wang
Fault tolerance is one of the premier system design desiderata in wireless ad hoc and sensor networks. It is crucial to have a certain level of... Sample PDF
Fault Tolerant Topology Design for Ad Hoc and Sensor Networks
$37.50
Chapter 41
Georgios Kambourakis, Angelos Rouskas, Stefanos Gritzalis
Security is always an important factor in wireless connections. As with all other existing radio technologies, the Bluetooth standard is often cited... Sample PDF
Evaluating Security Mechanisms in Different Protocol Layers for Bluetooth Connections
$37.50
Chapter 42
Miguel A. Ruiz, Felipe Espinosa, David Sanguino, AbdelBaset Awawdeh
The electromagnetic energy source used by wireless communication devices in a vehicle can cause electromagnetic compatibility problems with the... Sample PDF
Bluetooth Devices Effect on Radiated EMS of Vehicle Wiring
$37.50
Chapter 43
Security in WLAN  (pages 695-709)
Mohamad Badra, Artur Hecker
The great promise of wireless LAN will never be realized unless there is an appropriate security level. From this point of view, various security... Sample PDF
Security in WLAN
$37.50
Chapter 44
Jahan Hassan, Björn Landfeldt, Albert Y. Zomaya
Wireless local area networks (WLAN) are rapidly becoming a core part of network access. Supporting user mobility, more specifically session... Sample PDF
Access Control in Wireless Local Area Networks: Fast Authentication Schemes
$37.50
Chapter 45
Denis Trcek
Mass deployment of radio-frequency identification (RFID) technology is now becoming feasible for a wide variety of applications ranging from medical... Sample PDF
Security and Privacy in RFID Based Wireless Networks
$37.50
Chapter 46
Giorgos Kostopoulos, Nicolas Sklavos, Odysseas Koufopavlou
Wireless communications are becoming ubiquitous in homes, offices, and enterprises with the popular IEEE 802.11 wireless local area network (LAN)... Sample PDF
Security and Privacy Approaches for Wireless Local and Metropolitan Area Networks (LANs & MANs)
$37.50
Chapter 47
Sasan Adibi, Gordon B. Agnew, Tom Tofigh
An overview of the technical and business aspects is given for the corporate deployment of services over worldwide interoperability for microwave... Sample PDF
End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications
$37.50
Chapter 48
Symeon Chatzinotas, Jonny Karlsson, Göran Pulkkis, Kaj Grahn
During the last few years, mobile broadband access has been a popular concept in the context of fourth generation (4G) cellular systems. After the... Sample PDF
Evaluation of Security Architectures for Mobile Broadband Access
$37.50
Chapter 49
Sasan Adibi, Gordon B. Agnew
Authentication is an important part of the authentication authorization and accounting (AAA) schemes and the extensible authentication protocol... Sample PDF
Extensible Authentication (EAP) Protocol Integrations in the Next Generation Cellular Networks
$37.50
About the Contributors