CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS

Alberto Coen Porisini, Sabrina Sicari

2012

Abstract

Wireless sensor networks (WSN) are the target of different kinds of security attacks. The network nodes, which sense, aggregate, encrypt and transmit data, play a key role for assuring data quality. In this paper we present a way in which the network sink can evaluate the nodes reputation in order to determine whether one or more nodes are behaving maliciously. The approach combines different techniques such secure localization and privacy aware transmission in order to assess both nodes reputation and data quality.

References

  1. I. F. Akyildiz, T. Melodia, and K. Chowdhury, “A survey on wireless multimedia sensor networks,” Elsevier Computer Networks Journal, March 2007.
  2. I. F. Akyildiz, T. Melodia, and K. Chowdhury, “A survey on wireless multimedia sensor networks,” Elsevier Computer Networks Journal, March 2007.
  3. A. Coen-Porisini, P. Colombo, S. Sicari, and A. Trombetta, “A conceptual model for privacy policies,” in Proc. of SEA 2007, Cambridge (MS), USA.
  4. A. Coen-Porisini, P. Colombo, S. Sicari, and A. Trombetta, “A conceptual model for privacy policies,” in Proc. of SEA 2007, Cambridge (MS), USA.
  5. A. Coen-Porisini, P. Colombo, and S. Sicari, “Dealing with anonymity in wireless sensor networks,” in In Proceedings of 25th annual ACM symposium on Applied Computing (ACM SAC), Sierre, Switzerland, 2010.
  6. A. Coen-Porisini, P. Colombo, and S. Sicari, “Dealing with anonymity in wireless sensor networks,” in In Proceedings of 25th annual ACM symposium on Applied Computing (ACM SAC), Sierre, Switzerland, 2010.
  7. A. Coen-Porisini, P. Colombo, and S. Sicari, “Privacy aware systems: from models to patterns” in Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global, editor Dr. H. Mouratidis, 2010
  8. A. Coen-Porisini, P. Colombo, and S. Sicari, “Privacy aware systems: from models to patterns” in Software Engineering for Secure Systems: Industrial and Research Perspectives, IGI Global, editor Dr. H. Mouratidis, 2010
  9. Unified Modeling Language: Infrastructure, Ver. 2.1.2, OMG, November 2007, formal/2007-11-02.
  10. Unified Modeling Language: Infrastructure, Ver. 2.1.2, OMG, November 2007, formal/2007-11-02.
  11. Unified Modeling Language: Superstructure, Ver. 2.1.2, OMG, November 2007, formal/2007-11-02.
  12. Unified Modeling Language: Superstructure, Ver. 2.1.2, OMG, November 2007, formal/2007-11-02.
  13. Directive 95/46/EC of the European Parliament. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31.
  14. Directive 95/46/EC of the European Parliament. Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31.
  15. Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, “Privacyaware role based access control,” in Proceedings of the 12th ACM symposium on Access control models and technologies, 2007.
  16. Q. Ni, A. Trombetta, E. Bertino, and J. Lobo, “Privacyaware role based access control,” in Proceedings of the 12th ACM symposium on Access control models and technologies, 2007.
  17. H. Zhanga, A. Arorab, Y. Choic, and M. Goudac, “Reliable bursty convergecast in wireless sensor networks,” Elsevier Computer Communications, vol. 30, no. 13, pp. 2560-2576, 2007.
  18. H. Zhanga, A. Arorab, Y. Choic, and M. Goudac, “Reliable bursty convergecast in wireless sensor networks,” Elsevier Computer Communications, vol. 30, no. 13, pp. 2560-2576, 2007.
  19. OMNeT++ Discrete Event Simulation System. http://www .omnetpp.org/doc/manual/usman.html, 2005.
  20. OMNeT++ Discrete Event Simulation System. http://www .omnetpp.org/doc/manual/usman.html, 2005.
  21. M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-aware location sensor networks,” in In Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
  22. M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-aware location sensor networks,” in In Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems (HotOS IX), 2003.
  23. H. Chan and A. Perrig, “Security and privacy in sensor networks,” IEEE Computer Magazine, pp. 103-105, March 2003.
  24. H. Chan and A. Perrig, “Security and privacy in sensor networks,” IEEE Computer Magazine, pp. 103-105, March 2003.
  25. M. G. S. Duri, P. M. X. Liu, R. Perez, M. Singh, and J. Tang, “Framework for security and privacy in automotive telematics,” in In Proceedings of 2nd ACM International Worksphop on Mobile Commerce, 2000.
  26. M. G. S. Duri, P. M. X. Liu, R. Perez, M. Singh, and J. Tang, “Framework for security and privacy in automotive telematics,” in In Proceedings of 2nd ACM International Worksphop on Mobile Commerce, 2000.
  27. P. Samarati and L. Sweeney, “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression,” Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
  28. P. Samarati and L. Sweeney, “Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression,” Technical Report SRI-CSL-98-04, Computer Science Laboratory, SRI International, 1998.
  29. M. Gruteser and D. Grunwald, “A methodological assessment of location privacy risks in wireless hotspot networks,” in Proceedings of the first International Conference on Security in Pervasive Computing, 2003.
  30. M. Gruteser and D. Grunwald, “A methodological assessment of location privacy risks in wireless hotspot networks,” in Proceedings of the first International Conference on Security in Pervasive Computing, 2003.
  31. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: security protocols for sensor networks,” Wireless Networking, vol. 8, no. 5, pp. 521-534, 2002.
  32. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “Spins: security protocols for sensor networks,” Wireless Networking, vol. 8, no. 5, pp. 521-534, 2002.
  33. E. Snekkenes, “Concepts for personal location privacy policies,” in In Proceedings of 3rd ACM Conf. on Electronic Commerce, 2001.
  34. E. Snekkenes, “Concepts for personal location privacy policies,” in In Proceedings of 3rd ACM Conf. on Electronic Commerce, 2001.
  35. D. Molnar and D. Wagner, “Privacy and security in library rfid: Issues, practices, and architectures,” in In Proceedings of ACM CCS, 2004.
  36. D. Molnar and D. Wagner, “Privacy and security in library rfid: Issues, practices, and architectures,” in In Proceedings of ACM CCS, 2004.
  37. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks.” in Proceedings of 9th ACM Conference on Computer and Communications Security, 2002.
  38. L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks.” in Proceedings of 9th ACM Conference on Computer and Communications Security, 2002.
  39. R. D. Pietro, A. Mei, and L. V. Mancini, “Random key assignment for secure wireless sensor networks,” in Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Fairfax-VA, USA, 2003.
  40. R. D. Pietro, A. Mei, and L. V. Mancini, “Random key assignment for secure wireless sensor networks,” in Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), Fairfax-VA, USA, 2003.
  41. R. D. Pietro, C. Soriente, A. Spognardi, and G. Tsudik, “Collaborative authentication in unattended wsns,” in Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, 2009.
  42. R. D. Pietro, C. Soriente, A. Spognardi, and G. Tsudik, “Collaborative authentication in unattended wsns,” in Proceedings of 2nd ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, 2009.
  43. S. Capkun and J. Hubaux, “Secure positioning in wireless networks,” in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 221-232, Feb. 2006.
  44. S. Capkun and J. Hubaux, “Secure positioning in wireless networks,” in IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 221-232, Feb. 2006.
  45. S. Brands and D. Chaum, “Distance-bounding protocols,” in Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1994.
  46. S. Brands and D. Chaum, “Distance-bounding protocols,” in Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1994.
Download


Paper Citation


in Harvard Style

Coen Porisini A. and Sicari S. (2012). CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS . In Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS, ISBN 978-989-8565-01-3, pages 203-208. DOI: 10.5220/0003901102030208


in Harvard Style

Coen Porisini A. and Sicari S. (2012). CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS . In Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS, ISBN 978-989-8565-01-3, pages 203-208. DOI: 10.5220/0003901102030208


in Bibtex Style

@conference{sensornets12,
author={Alberto Coen Porisini and Sabrina Sicari},
title={CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS,},
year={2012},
pages={203-208},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003901102030208},
isbn={978-989-8565-01-3},
}


in Bibtex Style

@conference{sensornets12,
author={Alberto Coen Porisini and Sabrina Sicari},
title={CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS,},
year={2012},
pages={203-208},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003901102030208},
isbn={978-989-8565-01-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS,
TI - CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS
SN - 978-989-8565-01-3
AU - Coen Porisini A.
AU - Sicari S.
PY - 2012
SP - 203
EP - 208
DO - 10.5220/0003901102030208


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Sensor Networks - Volume 1: SENSORNETS,
TI - CROSS LAYER DATA ASSESSMENT IN WIRELESS SENSOR NETWORKS
SN - 978-989-8565-01-3
AU - Coen Porisini A.
AU - Sicari S.
PY - 2012
SP - 203
EP - 208
DO - 10.5220/0003901102030208