tailieunhanh - Wireless Sensor Network Security: A Survey

Some terminology we feel fairly strongly about. We do not use the term hacker to describe the vandals that break into computer systems. These criminals call themselves hackers, and that is how they got the name. But they do not deserve the name. True hackers are master programmers, incorruptibly honest, unmotivated by money, and careful not to harm anyone. The criminals termed “hackers” are not brilliant and accomplished. It is really too bad that they not only steal money, people’s time, and worse, but they’ve also stolen a beautiful word that had been used to describe some remarkable and wonderful people. We instead use words like. | SEcuRiTy IN Distributed Grid and Pervasive Computing Yang Xiao Eds. pp. - - -@2006 Auerbach Publications CRC Press Chapter 17 Wireless Sensor Network Security A Survey John Paul Walters Zhengqiang Liang Weisong Shi and Vipin Chaudhary Department of Computer Science Wayne State University E-mail jwalters sean weisong vipin @ 1 Abstract As wireless sensor networks continue to grow so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and or operate in hostile unattended environments it is imperative that these security concerns be addressed from the beginning of the system design. However due to inherent resource and computing constraints security in sensor networks poses different challenges than traditional net-work computer security. There is currently enormous research potential in the field of wireless sensor network security. Thus familiarity with the current research in this field will benefit researchers greatly. With this in mind we survey the major topics in wireless sensor network security and present the obstacles and the requirements in the sensor security classify many of the current attacks and finally list their corresponding defensive measures. 2 Introduction Wireless sensor networks are quickly gaining popularity due to the fact that they are potentially low cost solutions to a variety of real-world challenges 1 . Their low cost provides a means to deploy large sensor arrays in a variety of conditions capable of performing both military and civilian 1 tasks. But sensor networks also introduce severe resource constraints due to their lack of data storage and power. Both of these represent major obstacles to the implementation of traditional computer security techniques in a wireless sensor network. The unreliable communication channel and unattended operation make the security defenses even harder. Indeed as pointed out in 65 wireless sensors often have the processing characteristics of