Secure topology maintenance and events collection in WSNs

Mauro Conti, Roberto Di Pietro, Andrea Gabrielli*, Luigi V. Mancini

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Scopus citations

Abstract

Topology Maintenance Protocols (TMPs) are key for operating Wireless Sensor Networks (WSNs). Their adoption serves a few goals, such as, to save energy, to avoid collisions in communications and to have an adequate number of nodes monitoring the environment-by alternating duty cycles with sleep cycles on the sensor nodes. While effectiveness of TMPs protocols is widely addressed, security is an overlooked feature. Indeed, while different TMPs have been presented in the literature, few of them address the security issues. In particular, only recently a secure TMP protocol that does not require pair-wise node confidentiality has been proposed: Sec-TMP. The aim of Sec-TMP is to enforce event delivery to the Base Station while providing a standard topology maintenance service to the WSN. In this paper, we provide a thorough assessment of our previous preliminary proposal of Sec-TMP, with particular reference to its effectiveness and security. First, we investigate the energy consumption introduced by TMPs protocols. Second, we show that Sec-TMP performs well without any assumption neither on the show-up time of data-collecting node, nor on their mobility model. In particular, we test Sec-TMP against a realistic unpredictable data-collecting mobility scenario, that also brings in new security issues. A thorough security analysis of the proposed solutions to these new issues is also provided. Finally, extensive simulations support the quality of Sec-TMP as for effectiveness and security.

Original languageEnglish (US)
Pages (from-to)744-762
Number of pages19
JournalSecurity and Communication Networks
Volume4
Issue number7
DOIs
StatePublished - Jul 2011

Keywords

  • Attack-resilient
  • Sensor network security
  • Topology maintenance protocol

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Secure topology maintenance and events collection in WSNs'. Together they form a unique fingerprint.

Cite this