Adaptation of honeypot solutions for WSN

Krzysztof Lasota, Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz

Abstract


The article is devoted to security aspects of Wireless Sensor Networks. Starting with review and classification of existing threats and methods of improving security, the paper presents an idea of securing WSNs using honeypots for verification of its proper functioning. Several implementation possibilities are presented, as well as identification of the services which lend themselves to proposed mode of

Keywords


honeypot; security; wireless sensor network

Full Text:

PDF (Polski)

References


Singh S. K., Singh M. P., Singh D. K.: A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks. International Journal of Computer Trends and Technology - May to June Issue 2011, ISSN: 2231 -2803.

Kalita H.K., Kar A.: Wireless Sensor Networks Security Analysis, International Journal of Next-Generation Networks (IJNGN), vol. 1, no. 1, Dec. 2009, s. K9.

Bojkovic Z. S., Bakmaz B. M, Bakmaz M. R.: Security Issues in Wireless Sensor Networks. NAUN Int. Journal of Communications, 2008, vol.2, no. 1, s. 106-115.

Karlof C, Sastry N., Wagner D.: TinySec: A Link Layer security Architecture for Wireless Sensor Networks, ACM SenSys 2004, Nov. 3-5,2004, s. 162-175.

Zhu S., Setia S., Jajodia S.: Leap: efficient security mechanisms for large scale distributed I sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, New York, USA, 2003, s. 62-72.

Luk M., Mezzour G., Perrig A., Gligor V.: MiniSec: a secure sensor network communication architecture. Proceedings of the 6th International Conf. on Information Processing in Sensor networks, April, 2007, Cambridge, Massachusetts, USA.

Stępień A.: Wykrywanie anomalii w pracy sieci sensorowej. Praca magisterska, Politechnika Warszawska, WEITI, marzec 2011.

Newsome J., Shi E., Song D., Perrig A.: The Sybil attack in sensor networks analysis & defenses, International Symposium on Information Processing in Sensor Network, vol. 1 2004, s. 259-268.

Hu Y. C, Perrig A., Johnson D. B.: Packed Leashes: a defense against wormhole attacks in wireless networks, IEEE INFOCOM, vol. 1,2003, s. 1976-1986.

Skorobogatov S. P.: Semi-invasive attacks - a new approach to hardware security analysis. Tech. Report UCAM-CL-TR-630, University of Cambridge, Comp. Lab., April 2005.

Yang Xiao: Security in sensor network. Auerbach Publications, 2007.

Hu F., Ziobro J., Tillett J., Sharma N. K.: Secure wireless sensor networks: Problems and solutions. Journal of Systemics, Cybernetics and Infbrmatics, vol.1, no.4, s. 90-100, 2003.

Demirkol I., Alagoz F., Delie H., Ersoy: Wireless Sensor Networks for Intrusion Detection: Packet Traffic Modeling, Comm. Letters, no.l, vol. 10, s. 22-24, IEEE, 2006.

Wong M. C, Xiao Y., Su X.: Security Issues in Ad Hoc Networks. Xiao Y. (red.): Security in Sensor Networks. Auerbach Publications, 2007, s. 215-236.

Huo G., Wang X.: DIDS: A Dynamic Model of Intrusion Detection System in Wireless Sensor Networks. Proceedings of the 2008 IEEE International Conference on Information and Automation, 2008 Zhangjiajie, Chiny, s. 374-378.

Deng H., Li W., Agrawal D. P.: Routing Security in wireless ad hoc networks. IEEE Communication Magazine, vol. 40 no. 10, 2002, s. 70-75.

Mishra A., Nadkarni K., Patcha A.: Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, vol. 11 no 1, 2004, s. 48-60.

Karlof C, Wagner D.: Secure routing in wireless sensor networks attacks and countermeasures, IEEE International Workshop on Sensor Network Protocols and Applications, vol. 1, 2003, s. 113-127.




DOI: http://dx.doi.org/10.21936/si2012_v33.n3A.122