Security in Wireless Sensor Network has become a hot research topic due to their wide deployment and the increasing new runtime attacks they are facing. We observe that traditional security protocols address conventional security problems and cannot deal with dynamic attacks such as sinkhole dynamic behavior. Moreover, they use resources, and limit the efficient use of sensor resources and inevitably the overall network efficiency is not guaranteed. Therefore, the requirements of new security mechanisms must be addressed in a flexible manner. Indeed, there is a lack of generic security adaptation protocols to deal with extremely dynamic security conditions and performances in a context of Wireless Sensor Network where reliability is a critical criterion for many applications. This paper proposes our Security Adaptation Reference Monitor for Wireless Sensor already validated in proximity-based wireless network. It is based on an autonomic computing security looped system, which fine-tunes security means based on the monitoring of the context. Extensive simulations using agent-based approach have been conducted to verify the performance of our system in the case of sensor network in the presence of sinkhole attacks. The results clearly show that we are efficient in terms of survivability, overall network utilization, and power consumption. 1. Introduction A Wireless Sensor Network (WSN) consists of a large number of low-power, and multifunction sensor nodes that communicate as one hope, multihop, or cluster-based models to send data to one or many base stations (BSs) through wireless links [1]. These BSs are highly enriched with a large amount of energy. WSNs represent a challenging and an interesting research area due to the constraints involved. The small size of the sensors and the networking capability increase the appeal of WSNs for use in daily life. Distributed computing and routing could be well applied in case of multihope and cluster-based models. These capabilities enable WSNs to provide significant advantages for many applications that were not possible in the past. The WSN is built by deploying the sensing nodes in the area of interest to form a self-configured network and start acquiring the necessary information. The unique properties of WSNs increase flexibility and reduce user involvement in operational tasks. Battlefield surveillance, forest fire detection, and smart environments are some well-known applications. Since the nodes in WSN are battery operated and have a limited lifetime to operate, there is a growing need of energy aware
References
[1]
J. Ibriq and I. Mahgoub, “Cluster-based routing in wireless sensor networks: issues and challenges,” in Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, San Jose, Calif, USA, July 2004.
[2]
T. El Maliki and J. M. Seigneur, “A security adaptation reference monitor (SARM) for highly dynamic wireless environments,” in Proceedings of the 4th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '10), pp. 63–68, July 2010.
[3]
J. Anderson, “ComputerSecurity Technology Planning,” http://seclab.cs.ucdavis.edu/projects/history/papers/ande72.pdf, 1972.
[4]
C. Chigan, Y. Ye, and L. Li, “Balancing security against performance in wireless Ad Hoc and sensor networks,” in Proceedings of the 60th IEEE Vehicular Technology Conference (VTC '04), pp. 4735–4739, ETATS-UNIS, September 2004.
[5]
M. W. Chiang, Z. Zilic, K. Radecka, and J. S. Chenard, “Architectures of increased availability wireless sensor network nodes,” in Proceedings of the International Test Conference 2004, pp. 1232–1241, October 2004.
[6]
H. K. D. Sarma and A. Kar, “Security threats in wireless sensor networks,” in Proceedings of the 40th Annual IEEE International Carnahan Conference on Security Technology (ICCST '06), pp. 243–251, 2006.
[7]
E. Shi and A. Perrig, “Designing secure sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 38–43, 2004.
[8]
Y. Zhou, Y. Fang, and Y. Zhang, “Securing wireless sensor networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 10, no. 3, pp. 6–28, 2008.
[9]
J. Deng, R. Han, and S. Mishra, “INSENS: intrusion-tolerant routing in wireless sensor networks,” Tech. Rep. CU-CS-939-02, Department of Computer Science, University of Colorado, 2002.
[10]
B. Karp and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), pp. 243–254, ACM Press, August 2000.
[11]
P. Papadimitratos and Z. J. Haas, “Secure routing for mobile Ad Hoc networks,” in Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS '02), 2002.
[12]
S. Tanachaiwiwat, P. Dave, R. Bhindwale, and A. Helmy, “Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), pp. 324–325, ACM Press, November 2003.
[13]
D. Estrin, R. Govindan, J. S. Heidemann, and S. Kumar, “Next century challenges: scalable coordination in sensor networks,” in Proceedings of the Mobile Computing and Networking Conference, pp. 263–270, 1999.
[14]
L. Hu and D. Evans, “Secure aggregation for wireless networks,” in Proceedings of the Symposium on Applications and the Internet Workshops (SAINT '03 Workshops), p. 384, IEEE Computer Society, 2003.
[15]
S. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, “Tag ‘a tiny aggregation service for Ad-Hoc sensor networks’,” ACM SIGOPS Operating Systems Review, vol. 36, pp. 131–146, 2002.
[16]
B. Przydatek, D. Song, and A. Perrig, “SIA: secure information aggregation in sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), pp. 255–265, November 2003.
[17]
M. Xiao, X. Wang, and G. Yang, “Cross-layer design for the security of wireless sensor networks,” in Proceedings of the 6th World Congress on Intelligent Control and Automation (WCICA '06), pp. 104–108, June 2006.
[18]
S. Rafaeli and D. Hutchison, “A survey of key management for secure group communication,” ACM Computing Surveys, vol. 35, no. 3, pp. 309–329, 2003.
[19]
X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor network security: a survey,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52–73, 2009.
[20]
Seigneur J. M., Trust, security and privacy in global computing, Ph.D. thesis, 2005.
[21]
C. Hager, Context aware and adaptive security for wireless networks, Ph.D. thesis, Virginia Polytechnic Institute and State University, 2004.
[22]
M. Lacoste, G. Privat, and F. Ramparany, “Evaluating confidence in context for context-aware security,” in Proceedings of the European Conference on Ambient Intelligence (AmI '07), 2007.
[23]
J. Al-Muhtadi, D. Mickunas, and R. Campbell, “A lightweight reconfigurable security mechanism for 3G/4G mobile devices,” IEEE Wireless Communications, vol. 9, no. 2, pp. 60–65, 2002.
[24]
E2R Deliverable D2.2, “Equipment Management Framework for Reconfiguration: Architecture, Interfaces, and Functions,” 2005.
[25]
T. Jarboui, M. Lacoste, and P. Wadier, “A component-based policy-neutral authorization architecture,” in Proceedings of the French Conference on Operating Systems (CFSE '06), 2006.
[26]
D. M. Chess and IBM Thomas J. Watson Research Center, “Security in autonomic computing,” ACM SIGARCH Computer Architecture News, vol. 33, no. 1, 2005.
[27]
D. M. Chess, C. C. Palmer, and S. R. White, “Security in an autonomic computing environment,” IBM Systems Journal, vol. 42, no. 1, pp. 107–118, 2003.
[28]
O. Powell, J. M. Seigneur, and L. Moraru, “Trustworthily forwarding sensor networks information to the internet,” in Proceedings of the International Conference on Emerging Security Information, Systems, and Technologies (SECURWARE '07), pp. 30–35, October 2007.
[29]
A. A. Pirzada and C. McDonald, “Circumventing sinholes and wormholes in wireless sensor networks,” in Proceedings of the International Workshop on Wireless Ad-Hoc Networks, 2005.
[30]
C. Davis, “A localized trust management scheme for Ad-Hoc networks,” in Proceedings of the 3rd International Conference on Networking (ICN '04), March 2004.
[31]
L. Eschenauer, V. Gligor, and J. Baras, “On trust establishment in mobile Ad-Hoc networks,” in Proceedings of the 10th International Workshop of Security Protocols, Springer Lecture Notes in Computer Science (LNCS), April 2002.
[32]
A. Rahman and A. Hailes, “A distributed trust model,” in Proceedings of the New Security Paradigms Workshop 1997, ACM, 1997.
[33]
T. El Maliki and J. M. Seigneur, “Optimal Security Adaptation in Proximity-Based Wireless Networks,” Advance System Group Publication. Mobile Quality of Service. University of Geneva, 2009.
[34]
J. M. Rabaey, M. J. Ammer, J. L. da Silva, D. Patel, and S. Roundy, “PicoRadio supports Ad Hoc ultra-low power wireless networking,” Computer, vol. 33, no. 7, pp. 42–48, 2000.
[35]
B. Warneke, M. Last, B. Liebowitz, and K. S. J. Pister, “Smart dust: communicating with a cubic-millimeter computer,” Computer, vol. 34, no. 1, pp. 44–51, 2001.
[36]
M. J. Sailor and J. R. Link, “‘Smart dust’: nanostructured devices in a grain of sand,” Chemical Communications, no. 11, pp. 1375–1383, 2005.
[37]
E. Felemban, S. Vural, R. Murawski et al., “SAMAC: a cross-layer communication protocol for sensor networks with sectored antennas,” IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1072–1088, 2010.
[38]
M. A. Rahman, A. E. Saddik, and W. Gueaieb, “Wireless sensor network transport layer: state of the art,” in Sensors: Advancement in Modeling, Design Issues, Fabrication and Practical Applications, Springer, Berlin, Germany, 2008.