الثلاثاء، 31 أغسطس 2010

On The Security Of Wireless Sensor Networks


The word wireless has almost occupied every field in this era, every wired facility is going to become unwired or wireless one, and maybe after a couple of years we will not see any wire in the world.

The availability of cheap, low power, and miniature embedded processors, radios, sensors, and actuators, often integrated on a single chip, is leading to the use of wireless communications and computing for interacting with the physical world in applications such as security and surveillance applications, smart classroom, monitoring of natural habitats and eco-systems, medical monitoring etc. The resulting systems, often called wireless sensor networks, differ considerably from current networked and embedded systems. They combine the large scale and distributed nature of networked systems such as the internet with the extreme energy constraints and physically coupled nature of embedded control systems. Their design requires a proper understanding of the interplay between network protocols, energy-aware design, signal-processing algorithms, and distributed programming.

The technology of Wireless Sensor Networks (WSNs) is in the front part of the investigation of the computer networks and it could be the next technologic market of a huge sum of money. A WSN contains hundreds to thousands of small sensors where these sensors are designed to be self-organized wireless networks. Sensor nodes have limited processing power, storage, bandwidth, and energy. This limitation makes provision of the security in sensor networks not an easy task.
As discussed in, a WSN has no fixed infrastructure; the sensor nodes are scattered in a special domain, which makes the network threatened by attackers in many ways of attacking. For this reason, an efficient approaches have to be proposed in order to make WSNs secure. The applicable distribution techniques use the key management techniques such as cryptographic public key to provide the security requirements.

A sensor network must be confidential and should not reveal sensor readings to the adversary. The standard approach for keeping sensitive data secret is to encrypt the data with a secret key such that only the intended receivers possess, hence achieving confidentiality. The key in WSN is encrypted at the sender then decrypted by the receiver using such symmetric cryptographic algorithms such as RC4, RC5, and DES.
Probabilistic key management approaches depend on the randomness in selecting a set of encryption keys (to be distributed between the sensor nodes in distributed WSN) from a pool of keys that contain a large number of encrypted keys. These approaches will work after the deployment stage of the sensors and have no idea about the area so every thing is probabilistic-wise.

The problem addressed in this work focuses on the probabilistic key management approaches, based on where all approaches appear to be static and can be applied on the WSN, we propose such adaptable approach that depends on WSN constraints (Battery Life, Transmission Range, Bandwidth, Memory, and Density of sensor in the network). The problem is depicted in Fig.1.

Fig.1.  Problem Statement : How To Get A Secure Channel

Also, the work in this document is motivated by many issues. First, the security of WSN which became very important in real life particularly in military fields. WSN are used today in hostile environments, malls, hospitals, house appliances and armies to do different kinds of jobs, which makes its security level to swing from low to high. Second, previous studies have not leaded to use such approach of key management that can be applied in any WSN. This leaded us to start thinking about some dynamic approach to use for WSN security.

A remarkable issue that faces wireless sensor networks (WSNs) nowadays is security. WSNs should provide a way to transfer data securely particularly when employed for military purposes. Hence, several protocols have been proposed to enhance WSNs by providing minimum level of security requirements. Key management protocols have gained a remarkable interest by researchers. In this paper, we retrieve four probabilistic key management approaches that have been widely used in WSNs. These approaches are: Random key predistribution, Q-composite key scheme, MultiPath Reinforcement Scheme, and Random PairWise Keys Scheme. We also provide here a probabilistic analytical evaluation model to asses these protocols individually. The model comprises several factors that should be considered carefully before deploying the WSN. These factors are: scalability, confidentiality, memory complexity, communication complexity, and power consumption. The results showed that the pairwise key scheme best fits in several diverse environment satisfying most of our study factors.

The randomness in distributing sensor nodes in a WSN makes such environments difficult to study. From the security perspective, there is no specific probabilistic key management approach that could be marked as the best protocol to be applied over any WSN with some setup parameters. Indeed, the variation of parameters makes the use of a certain protocol varied too. In this paper, we have evaluated the performance of four probabilistic key management approaches using two metrics: communication complexity and power consumption.

Simulation results have shown that the simplest protocol to apply over a small sensor network is the random key pre-distribution with a large key pool size. On the other hand, Q-composite scheme improves over basic scheme for small scale network attack.

The Random multipath scheme gives a great level of security if it is used with average size of networks but it consumes much power in transmission and as it is known the power consumed in communication reward doubles of that consumed in computations. It can be said that the pairwise key (provides node-to-node authentication) which does the most of its job before distribution and gives the best results in several metrics to be the best applicable approach especially with large networks where the security is considered the most important factor.


References:


Qasem Abu Al-Haija  “Toward Secure Non-Deterministic Distributed Wireless Sensor Network Using Probabilistic Key Management        Approaches,” Accepted for publication at Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., USA, July 2010.


Yang Xiao, et al. "A Survey Of Key Management Schemes In Wireless Sensor Networks," Computer Communications, Vol. 30, PP. 2314-2341, April 24, 2007.


Omar Banimelhem, Qasem Abu Al-Haija and Ahmad Al-Badawi " Performance Evaluation of Probabilistic Key Management Approaches for Wireless Sensor Networks" ,Proceedings of the first International Conference in Information and Communication Systems - ICICS2009, Paper495, Dec 2009.


Wenliang Du, et al. "Key Management In Wireless Sensor Networks Extended Abstract," In Proceedings Of The 5Th Annual ACM/IEEE International Conference On Mobile Computing And Networking (Mobicom), 1999, Pp. 483-492. Man, September 2004


هناك 34 تعليقًا:

  1. After a few years and we will not see any wire in the world.

    ردحذف
  2. WSN containing hundreds of thousands of small sensors.

    ردحذف
  3. To provide the security requirements of the wireless sensors is used for basic management techniques such as public key encryption.

    ردحذف
  4. Of WSN, this has become very important in real life, especially in the military.

    ردحذف
  5. Of the most important features of wireless sensors, energy availability, cheap low…

    ردحذف
  6. The ideal wireless sensor has many features such as consumes very little power, is smart and software programmable capable of fast data acquisition reliable, Accurate over the long term, Requires no real maintenance.

    ردحذف
  7. 2. I think that energy-aware design and signal-processing algorithms are the most to be aware of. Experts can create new protocols and distributed programs more easily than to select the perfect design of energy providers and signal-processing algorithms. The energy could be down any time by many reasons, and the most compatible algorithm for signal-processing takes many probabilities. What do you think guys?

    ردحذف
  8. golden: I agree with you. Using sensors makes the network more reliable

    ردحذف
  9. 3. Where should all these wires been buried!!!! 

    ردحذف
  10. 5. Do you really think that wireless networks will replace wired one in several coming years?

    ردحذف
  11. great article i have question,How long does a node operate, does it have a life time scale?

    ردحذف
  12. blackiris: with this revolution i think that we start to replace it,let us wait and see ,but How long does a node operate, does it have a life time scale?

    ردحذف
  13. What data or parameters a key contains that can use to select a random sensor?

    ردحذف
  14. for nayh: it seems that you have a good knowledge in this field thats why you are right. the sensory networks are one of the most energy aware designs due to the battery life, thats why all protocols regarding the WSN takes the power consumption in their accounts, you may have to read ref 1, 2

    ردحذف
  15. for Salem-Man: actually, they well be all replaced by the wireless signals such as Wi-Fi/Wi-Max techniques and WSN

    ردحذف
  16. For BlackIris: as long as technology advances and makes you send your information in secure and fast way without Bearing the trouble of cables and, is it much better to use the wireless technology!!!

    ردحذف
  17. For Angry: yes, the sensors operates on a battery, which makes a constraint on the sensor life time

    ردحذف
  18. For Green Forest: thank you for asking but you should read ref.1,4 to demonstrate the idea of sensory network

    ردحذف
  19. For Sweet Sour: Actually, most of the security protocols that are used in the sensory network are symmetric key protocols not the public key due to the amount of power the sensor needs to provide the public key inside the network, but some researchers starts to propose an enhanced version of some public key protocols such as ECC, RSA, ...etc, that could be fine in the low power devices such as motes (sensors)

    ردحذف
  20. Thank u eng. we could learn much from your articles

    ردحذف
  21. In the case of expiration the sensor of battery, what's that possible to happen?

    ردحذف
  22. For Sweetsour: thank you for your nice question, unfortunately if the battery expired then the sensor is considered Died and the connection to this sensor will not be established

    ردحذف
  23. Ya I really wish that all wired networks will be replaced by wireless ones. Q:How many encrypted keys could be created in one signal process?

    ردحذف
  24. So,in this case must be found an excellent way to avoid any problems

    ردحذف
  25. For BlackIris: It depends on how secure you want your network to be (the more keys exist the more randomness you create the more possible keys exist the more harder to attacker to find out the encryption key),on the number of all sensors in the network, and also the number of neighbor sensors.

    Hope i answered you completely

    ردحذف
  26. Thank you very much for you with our best wishes of further progress and success

    ردحذف
  27. i enjoyed a lot this discussion and info,thanx qasem, and thnx all

    ردحذف
  28. thank you very much for very nice discussion, if you have any question please dont hesitate to ask, i am on service

    ردحذف
  29. State of the art technology, with the best installers and monitoring the State of Minnesota has to offer. Lloyd SecurityWireless Home Security Systems, Commercial security systems, No phone line security system, Minnetonka home security, Minneapolis Security provider
    Minneapolis Home Security Systems

    ردحذف
  30. This is a great post. It’s Very informative and well writing

    data acquisition

    ردحذف