Security and privacy support for wireless sensor networks

2008 2008

Other formats: Order a copy

Abstract (summary)

Sensor networks are considered useful for a broad spectrum of emerging civil and military applications. However, sensor networks are also confronted with many security threats such as node compromise, routing disruption, and false data injection, because they normally operate in unattended, harsh or hostile environments. Due to the unique characteristics of sensor networks, such as limited system resources and large-scale deployment, traditional security and privacy solutions cannot be applied to them.

The goal of this dissertation is to provide ways to deal with security and privacy attacks on sensor networks. First, we design and evaluate solutions for local, passive, external attackers. Traditionally, dummy messages are used to hide the event source. To reduce the message overhead, we propose a cross-layer solution utilizing beacons at the MAC layer. In this solution, the event information is first propagated several hops through a MAC-layer beacon. Then, it is propagated in the routing layer to the destination to avoid further beacon delay. Second, to defend against global, passive, and external attackers, dummy messages are used. To reduce the event notification delay, we propose a FitProbRate scheme based on a statistically strong source anonymity model. Our analysis and simulation results show that this scheme, besides providing provable privacy, significantly reduces real event reporting latency compared to other schemes. To reduce the network traffic, we select some sensors as proxies that proactively filter dummy messages on their way to the base station. Since the problem of optimal proxy placement is NP-hard, we employ local search heuristics. We propose a Proxy-based Filtering Scheme and a Tree-based Filtering Scheme to accurately locate proxies. Simulation results show that our schemes not only quickly find nearly optimal proxy placement, but also significantly reduce message overhead and improve message delivery ratio. Finally, we study the internal attacker in data-centric sensor networks (DCS) and present pDCS, a privacy-enhanced DCS network that offers different levels of data privacy based on different cryptographic keys. In addition, we propose several query optimization techniques based on the Euclidean Steiner Tree and Keyed Bloom Filter to minimize the query overhead while providing certain query privacy. Detailed analysis and simulations show that the Keyed Bloom Filter scheme can significantly reduce message overhead with the same level of query delay and maintain a very high level of query privacy.

Indexing (details)

Computer science
0984: Computer science
Identifier / keyword
Applied sciences; Privacy; Security; Sensor networks; Wireless
Security and privacy support for wireless sensor networks
Shao, Min
Number of pages
Publication year
Degree date
School code
DAI-B 70/02, Dissertation Abstracts International
Place of publication
Ann Arbor
Country of publication
United States
Cao, Guohong
The Pennsylvania State University
University location
United States -- Pennsylvania
Source type
Dissertations & Theses
Document type
Dissertation/thesis number
ProQuest document ID
Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Document URL
Access the complete full text

You can get the full text of this document if it is part of your institution's ProQuest subscription.

Try one of the following:

  • Connect to ProQuest through your library network and search for the document from there.
  • Request the document from your library.
  • Go to the ProQuest login page and enter a ProQuest or My Research username / password.