Eliana Stavrou, Andreas Pitsillides, George Hadjichristofi, Christoforos Hadjicostis


Existing security research in wireless sensor networks is based on specific assumptions about the nodes and the network environment that are tied to specific usage scenarios. Typical scenarios consider sensor nodes that are immobile and have pre-defined communication patterns. We argue that node mobility is a realistic characteristic of sensor nodes that needs to be taken into consideration in future sensor networks. Mobility capabilities can address the objective challenges raised in mission-critical applications, such as in disaster relief, where their environment characteristics fluctuate over time. It is imperative to investigate the way security is affected in mobile sensor networks and identify the challenges that will need to be addressed in future security protocol design. We present our vision for future sensor networks through a realistic scenario and discuss security gaps that are present in existing research for next generation sensor networks.


  1. Akyildiz I. F., Su W., Sankarasubramaniam Y. and Cayirci E., (2002), Wireless Sensor Networks: A Survey, Computer Networks, Elsevier Journal, 38(4), 393-422.
  2. Al-Karaki, J. N. and Kamal, A. E., (2004). Routing techniques in wireless sensor networks: a survey, IEEE Wireless Communications, 11(6), 6-28.
  3. Anjum F. (2007). Location dependent key management in sensor networks without using deployment knowledge. 2nd International Conference on Communication Systems Software and Middleware, 1- 10.
  4. Aranha D., Oliveira L. B., Lopez J., Dahab R. (2009). NanoPBC: Implementing Cryptographic Pairings on an 8-bit Platform. CHILE.
  5. Carman D. W., Kruus P. S. and Matt B. J., (2000). Constraints and approaches for distributed sensor network security, NAI Labs Technical Report #00-010
  6. Chan, H., Perrig, A., 2003, Security and Privacy in Sensor Networks, IEEE Computer Magazine, pp. 103-105
  7. Chan H., Perrig A. and Song, D. ( 2003). Random Key Predistribution Schemes for Sensor Networks. IEEE Security and Privacy Symposium, 197-213.
  8. Chan H., Gligor V.D., Perrig A. and Muralidharan G., (2005 July-September). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 233- 247.
  9. Crosby G. V., Pissinou N. and Gadze J. (2006). A Framework for Trust-based Cluster Head Election in Wireless Sensor Networks, Proceedings of the Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems
  10. Deng J., Han R. and Mishra S., (2002). INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks, Technical Report CUCS-939-02, Department of Computer Science, University of Colorado
  11. Djenouri, D., Khelladi, L., Badache, A.N., (2005). A survey of security issues in mobile ad hoc and sensor networks, IEEE Communications Surveys & Tutorials, 7(4), 2- 28.
  12. Du W., Deng J., Han Y S., Chen Sand Varshney, P. K. (2004 April). A key management scheme for wireless sensor networks using deployment knowledge. INFOCOM.
  13. Eschenauer L. and Gligor V. ( 2002 November). A Key Management Scheme for Distributed Sensor Networks. 9th ACM Conference. Computer. and Communications Security, 41-47.
  14. Ganesan D., Govindan R., Shenker S. and Estrin D., (2002). Highly-Resilient Energy-Efficient Multipath Routing in Wireless Sensor Networks, ACM Mobile Computing and Communication Review (MC2R), 1(2).
  15. Garcia-Hernandez C. F., Ibarguengoytia-Gonzalez P. H., Garcia-Hernandez J. and Perez-Diaz J. A. (2007). Wireless sensor networks and application: a survey, International Journal of Computer Science and Network Security (IJCSNS), 7(3).
  16. Guorui L., Jingsha H. and Yingfang F. (2006). A hexagonbased key predistribution scheme in sensor networks. International Conference on Parallel Processing Workshops, 180.
  17. Karlof C. and Wagner D. (2003). Secure routing in wireless sensor networks: Attacks and Countermeasures, IEEE International Workshop on Sensor Network Protocols and Applications, 113-127.
  18. Liu K., Abu-Ghazaleh N. and Kang K. (2007). Location verification and trust management for resilient geographic routing, Location verification and trust management for resilient geographic routing, 67(2), 215-228.
  19. Liu D., Ning P. and Du W. (2005, September). GroupBased Key Pre-Distribution in Wireless Sensor Networks. ACM Workshop on Wireless Security (WiSe ), 11-20.
  20. Liu D. and Ning P. (2005). Improving Key PreDistribution with Deployment Knowledge in Static Sensor Networks. ACM Trans. Sensor Networks, 204- 39.
  21. Lou W., Kwon Y., (2006). H-SPREAD: a hybrid multipath scheme for secure and reliable data collection in wireless sensor networks. IEEE Transactions on Vehicular Technology, 55(4), 1320 - 1330.
  22. Mizanur Rahman Sk. Md., Nasser N. and Saleh K. (2008). Identity and Pairing- Based Secure Key Management Scheme for Heterogeneous Sensor Networks. IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, 423- 428.
  23. Ma R., Xing L. and Michel H. E., (2007, May). A New Mechanism for Achieving Secure and Reliable Data Transmission in Wireless Sensor Networks. The 2007 IEEE Conference on Technologies for Homeland Security, 274-279.
  24. Marti S., Giuli T., Lai K., and Baker M., (2000). Mitigating routing misbehavior in mobile ad hoc networks, In Proceedings of MOBICOM
  25. Ouadjaout A., Challal Y., Lasla N. andBagaa, M., (2008 March) SEIF: Secure and Efficient Intrusion-Fault Tolerant Routing Protocol for Wireless Sensor Networks, Third International Conference on Availability, Reliability and Security (ARES), 503- 508.
  26. Riaz R., Ali A. Kim K. Ahmad H. F. and Suguri, H, (2006). Secure Dynamic Key Management for Sensor Networks. Innovations in Information Technology, 1- 5.
  27. Stavrou E., Pitsillides A., (2010), A survey on secure multipath routing protocols in WSNs, accepted for publication, Computer Networks, Elsevier Journal, jombib&Itemid=60
  28. Tanachaiwiwat S., Dave P., Bhindwale R., Helmy A., (2003). Secure Locations: Routing on Trust and Isolating Compromised Sensors in Location-aware Sensor Networks. The First ACM Conference on Embedded Networked Sensor Systems (SenSys).
  29. Ting Y.,Shiyong Z. and Yiping Z. (2007). A Matrix-Based Random Key Predistribution Scheme for Wireless Sensor Networks. IEEE International Conference on Computer and Information Technology, 991-996.
  30. Walters J. P., Liang Z., Shi W. and Chaudhary V., (2006). Wireless Sensor Networks Security: A Survey, Security In Distributed, Grid and Pervasive Computing, CRC Press
  31. Wang Y., Attebury G. and Ramamurthy B. (2006). A survey of security issues in wireless sensor networks, IEEE Communications Surveys & Tutorials, 8, (2), 2 - 23.
  32. Wood A. D. and Stankovic J. A., (2002). Denial of Service in Sensor Networks, IEEE Computer, 35(10), 54-62.
  33. Wood A. D. and Stankovic J. A. (2004). A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks, Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, CRC Press
  34. Ye F., Zhong G., Lu S. and Zhang L.,( 2005). GRAdient broadcast: A robust data delivery protocol for large scale sensor networks, In ACM Wireless Networks (WINET), 11(2).
  35. Yao Z., Kim D., Lee I., Kim K. and Jang J., (2005). A Security Framework with Trust Management for Sensor Networks, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks,190-198.
  36. Yulong S., Jianfeng M. and Qingqi P. (2007). Research on the Resilience of Key Management in Sensor Networks. International Conference on Computational Intelligence and Security,716-720.

Paper Citation

in Harvard Style

Stavrou E., Pitsillides A., Hadjichristofi G. and Hadjicostis C. (2010). SECURITY IN FUTURE MOBILE SENSOR NETWORKS - Issues and Challenges . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 278-286. DOI: 10.5220/0002987302780286

in Bibtex Style

author={Eliana Stavrou and Andreas Pitsillides and George Hadjichristofi and Christoforos Hadjicostis},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},

in EndNote Style

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
SN - 978-989-8425-18-8
AU - Stavrou E.
AU - Pitsillides A.
AU - Hadjichristofi G.
AU - Hadjicostis C.
PY - 2010
SP - 278
EP - 286
DO - 10.5220/0002987302780286