Home | Issues | Profile | History | Submission | Review
Vol: 51(65) No: 4 / December 2006 

A Knowledge Based System Approach in Securing Distributed Wireless Sensor Networks
Daniel-Ioan Curiac
Dept. of Automation and Applied Informatics, “Politehnica” University of Timisoara, Bd.V. Parvan Nr.2, 300223 Timisoara, Romania, phone: (+40) 256-40-3251, e-mail: daniel.curiac@aut.upt.ro, web: http://www.aut.upt.ro/~curiac
Florin Dragan
Dept. of Automation and Applied Informatics, “Politehnica” University of Timisoara, Bd.V. Parvan Nr.2, 300223 Timisoara, Romania
Ovidiu Banias
Dept. of Automation and Applied Informatics, “Politehnica” University of Timisoara, Bd.V. Parvan Nr.2, 300223 Timisoara, Romania
Daniel Iercan
Dept. of Automation and Applied Informatics, “Politehnica” University of Timisoara, Bd.V. Parvan Nr.2, 300223 Timisoara, Romania


Keywords: sensor network, authentication, symmetric cryptography, knowledge based system.

Abstract
Sensor networks technologies had proved their great practicability in the real world, being just a matter of time until this kind of networks will be standardized and used in the field. This paper presents a new approach to secure the transmission of information in sensor networks and is based on a combined hardware-software architecture using three components: a) a mechanism to provide sensor authentication and secret key distribution; b) AES symmetrical encryption algorithm with predistributed keys; and c) an attack detection stratagem using an expert system based on the prediction of the values provided by the sensors, followed by reducing the sensor trust coefficient.

References
[1] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Proceedings of the 1st IEEE International Workshop SNPA2003, Anchorage, USA, pp. 113-127, May 2003.
[2] A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer, pp. 54–62, Oct. 2002.
[3] T. He, C. Huang, B.M. Blum, J.A. Stankovic and T. Abdelzaher, “Range-Free Localization Schemes in Large-Scale Sensor Networks”, Proceedings of the Intl. Conference on Mobile Computing and Networking (MOBICOM), San Diego, USA, pp.81-95, September 2003.
[4] A. Savvides, C.C. Han and M.B. Srivastava, “Dynamic fine-grained localization in ad-hoc networks of sensors”, Proceedings of the 7th ACM MobiCom, Rome, Italy, pp.166-179, 2001.
[5] J. Feng, F. Koushanfar and M. Potkonjak, “System-Architectures for Sensor Networks Issues, Alternatives, and Directions”, Proceedings. of the 2002 IEEE International Conference on Computer Design (ICCD’02), Freiburg, Germany, pp.226-231, September 2002.
[6] L. Tong, Q. Zhao and S. Adireddy, “Sensor Networks with Mobile Agents\", Proceedings IEEE 2003 MILCOM, Boston, USA, pp.688-694, October 2003.
[7] M. Ramkumar and N. Memon, An Efficient Key Predistribution Scheme for Ad Hoc Network Security, IEEE Journal on Selected Areas of Communication, Vol 23 (3), pp 611-621, March 2005.
[8] C. Karlof, N. Sastry and D.Wagner, “TinySec: A Link Layer Security Architecture forWireless Sensor Networks”, Proceedings of the 2nd international conference on Embedded networked sensor systems Pages: 162 – 175, Baltimore, USA, Nov. 2004.
[9] A. Vitaletti and G.Palombizio, “Rijndael for sensor networks: is speed the main issue?”, 2nd Workshop on Cryptography for Ad hoc Networks WCAN 2006, Venice, Italy, July 2006.
[10] Y. Gao Y, K. Wu and F.Li, “Analysis on the Redundancy of Wireless Sensor Networks”, ACM WSNA Proceedings, San Diego, USA, pp.108-114, September 2003.
[11] T. Sun, L.J. Chen, C.C. Han and M. Gerla, “Improving Data Reliability via Exploiting Redundancy in Sensor Networks”, UCLA Technical Report CSD-TR No. 040037.
[12] T. Clouqueur, P. Ramanathan, K.K. Saluja and K.C. Wang, “Value fusion versus decision-fusion for fault tolerance in collaborative target detection in sensor networks”, Proceedings of Fusion 2001, Montreal, pp.25-30, August 2001.
[13] Y. Xu, J. Heidemann and D. Estrin, “Georgraph-informed Energy Conservation for Ad Hoc Routing,” ACM Mobicom 2001, Rome, Italy, July 2001.
[14] D. Li, K. Wong, Y. Hu and A. Sayeed, “Detection, Classification and Tracking of Targets in Distributed Sensor Networks”, IEEE Signal Processing Magazine, pp.17-19, March 2002.
[15] R. Brooks, P. Ramanathan and A. Sayeed, “Distributed target classification and tracking in sensor networks,” Proceedings of the IEEE, vol. 91, no. 8, pp. 1163-1171, 2003.