SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS

Alessio Di Mauro, Davide Papini, Nicola Dragoni

2012

Abstract

With the recent introduction of Energy-Harvesting nodes, security is gaining more and more importance in sensor networks. By exploiting the ability of scavenging energy from the surrounding environment, the lifespan of a node has drastically increased. This is one of the reason why security needs a new take in this topic. Traditional solutions may not work in this new field. Brand new challenges and threats may arise and new solutions have to be designed. In this paper we present a taxonomy of attacks, focusing on how they change in the energy harvesting scenario compared to regular sensor networks. Finally, we present and discuss existing security solutions for EH-WSNs.

References

  1. Benenson, Z., Cholewinski, P., and Freiling, F. (2008). Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, pages 22-43.
  2. Benenson, Z., Cholewinski, P., and Freiling, F. (2008). Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, pages 22-43.
  3. Carter, J. L. and Wegman, M. N. (1977). Universal Classes of Hash Functions (Extended Abstract). In Proc. of STOC'07, pages 106-112. ACM.
  4. Carter, J. L. and Wegman, M. N. (1977). Universal Classes of Hash Functions (Extended Abstract). In Proc. of STOC'07, pages 106-112. ACM.
  5. Lu, J., Liu, S., Wu, Q., and Qiu, Q. (2010). Accurate modeling and prediction of energy availability in energy harvesting real-time embedded systems. In Proc. of IGCC'10, pages 469-476.
  6. Lu, J., Liu, S., Wu, Q., and Qiu, Q. (2010). Accurate modeling and prediction of energy availability in energy harvesting real-time embedded systems. In Proc. of IGCC'10, pages 469-476.
  7. Lupu, T.-G. (2009). Main types of attacks in wireless sensor networks. In Proc. of the 9th WSEAS SSIP 7809/MIV'09, pages 180-185. WSEAS.
  8. Lupu, T.-G. (2009). Main types of attacks in wireless sensor networks. In Proc. of the 9th WSEAS SSIP 7809/MIV'09, pages 180-185. WSEAS.
  9. Martins, D. and Guyennet, H. (2010). Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey. In Proc. of NBiS'10, pages 313-320.
  10. Martins, D. and Guyennet, H. (2010). Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey. In Proc. of NBiS'10, pages 313-320.
  11. Pelissier, S., Prabhakar, T., Jamadagni, H., VenkateshaPrasad, R., and Niemegeers, I. (2011). Providing Security in Energy Harvesting Sensor Networks. In Proc. of CCNC'11 IEEE, pages 452-456.
  12. Pelissier, S., Prabhakar, T., Jamadagni, H., VenkateshaPrasad, R., and Niemegeers, I. (2011). Providing Security in Energy Harvesting Sensor Networks. In Proc. of CCNC'11 IEEE, pages 452-456.
  13. Sen, J. (2010). A survey on wireless sensor network security. CoRR, abs/1011.1529.
  14. Sen, J. (2010). A survey on wireless sensor network security. CoRR, abs/1011.1529.
  15. Sudevalayam, S. and Kulkarni, P. (2011). Energy harvesting sensor nodes: Survey and implications. Communications Surveys Tutorials, IEEE, 13(3):443-461.
  16. Sudevalayam, S. and Kulkarni, P. (2011). Energy harvesting sensor nodes: Survey and implications. Communications Surveys Tutorials, IEEE, 13(3):443-461.
  17. Taddeo, A. V., Mura, M., and Ferrante, A. (2010). QoS and Security in Energy-Harvesting Wireless Sensor Networks. In Proc. of SECRYPT'10, pages 1-10.
  18. Taddeo, A. V., Mura, M., and Ferrante, A. (2010). QoS and Security in Energy-Harvesting Wireless Sensor Networks. In Proc. of SECRYPT'10, pages 1-10.
  19. Wander, A., Gura, N., Eberle, H., Gupta, V., and Shantz, S. (2005). Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In Proc. of PerCom'05, pages 324-328.
  20. Wander, A., Gura, N., Eberle, H., Gupta, V., and Shantz, S. (2005). Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In Proc. of PerCom'05, pages 324-328.
  21. Won, D., editor (2001). Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proc., volume 2015 of Lecture Notes in Computer Science. Springer.
  22. Won, D., editor (2001). Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proc., volume 2015 of Lecture Notes in Computer Science. Springer.
Download


Paper Citation


in Harvard Style

Di Mauro A., Papini D. and Dragoni N. (2012). SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS . In Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8565-00-6, pages 422-425. DOI: 10.5220/0003907104220425


in Harvard Style

Di Mauro A., Papini D. and Dragoni N. (2012). SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS . In Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS, ISBN 978-989-8565-00-6, pages 422-425. DOI: 10.5220/0003907104220425


in Bibtex Style

@conference{peccs12,
author={Alessio Di Mauro and Davide Papini and Nicola Dragoni},
title={SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2012},
pages={422-425},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003907104220425},
isbn={978-989-8565-00-6},
}


in Bibtex Style

@conference{peccs12,
author={Alessio Di Mauro and Davide Papini and Nicola Dragoni},
title={SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS},
booktitle={Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,},
year={2012},
pages={422-425},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003907104220425},
isbn={978-989-8565-00-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS
SN - 978-989-8565-00-6
AU - Di Mauro A.
AU - Papini D.
AU - Dragoni N.
PY - 2012
SP - 422
EP - 425
DO - 10.5220/0003907104220425


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Pervasive Embedded Computing and Communication Systems - Volume 1: PECCS,
TI - SECURITY CHALLENGES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS
SN - 978-989-8565-00-6
AU - Di Mauro A.
AU - Papini D.
AU - Dragoni N.
PY - 2012
SP - 422
EP - 425
DO - 10.5220/0003907104220425