Secure Sensor Networks for Perimeter Protection

Authors: , Anupam Joshi, John Pinkston

Book Title: Computer Networks

Date:

Abstract: Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense. We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future. We identify threats to this application class and propose a new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of the resource constraints of sensor networks. Our application class requires mitigation against traffic analysis, hence we do not use any routing mechanisms, relying solely on broadcasts of end-to-end encrypted packets. Our model extends the broadcast range of the base station model by utilizing nodes adjacent to the base station as an intermediary hop. Additionally, our model detects and corrects some classes of aberrant node behavior. We have simulated our model and present simulation results.

Type: Article

Tags: intrusion detection, security, sensor network

Google Scholar: search

Attachments:

200.pdfdownloads: 1159

Publications
Log in