Skip to main content

Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks

  • Chapter
  • First Online:
Security and Privacy for Next-Generation Wireless Networks

Part of the book series: Wireless Networks ((WN))

  • 937 Accesses

Abstract

In this chapter, we investigate the security and privacy issues in mobile Wireless Sensor Networks (WSNs). Specifically, in Sects. 6.1 and 6.2, we briefly introduce the characteristics and the challenges of mobile WSNs. Section 6.3 outlines the security issues in WSNs, and reviews the conventional key establishment protocols (including symmetric key establishment protocols and asymmetric key establishment protocols) and physical layer key establishment protocols (including the key extraction protocols using the characteristics of wireless fading channels and the key distribution protocols using keyless cryptography technology). In Sect. 6.4, the privacy issues are outlined. Specifically, in this section, we review the localization protocols designed at higher layers and at the physical layer. Section 6.5 provides the future research trends and concludes this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In practice, the internal attacks can be resisted by implementing certain techniques, such as the trust management protocols. This section only reviews the external attacks due to the length limitations.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Alpern, B., Schneider, F.B.: Key exchange using ‘keyless cryptography’. Information Processing Letters 16(2), 79–81 (1983)

    Article  Google Scholar 

  3. Amundson, I., Koutsoukos, X.D.: A survey on localization for mobile wireless sensor networks. In: Mobile Entity Localization and Tracking in GPS-less Environments, Second International Workshop, MELT 2009, Orlando, FL, USA, September 30, 2009. Proceedings, pp. 235–254 (2009)

    Google Scholar 

  4. Amundson, I., Koutsoukos, X.D., Sallai, J.: Mobile sensor localization and navigation using RF doppler shifts. In: Proceedings of the ACM International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments, MELT 2008, San Francisco, California, USA, September 19, 2008, pp. 97–102 (2008)

    Google Scholar 

  5. Baggio, A., Langendoen, K.: Monte carlo localization for mobile wireless sensor networks. Ad Hoc Networks 6(5), 718–733 (2008)

    Article  Google Scholar 

  6. Blom, R.: An optimal class of symmetric key generation systems. In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of Cryptographic Techniques, Paris, France, April 9–11, 1984, Proceedings, pp. 335–338 (1984)

    Google Scholar 

  7. Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16–20, 1992, Proceedings, pp. 471–486 (1992)

    Google Scholar 

  8. Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking 15(2), 346–358 (2007)

    Article  Google Scholar 

  9. Cao, X., Xu, L., Zhang, Y., Wu, W.: Identity-based proxy signature for cloud service in saas. In: 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19–21, 2012, pp. 594–599 (2012)

    Google Scholar 

  10. Castelluccia, C., Mutaf, P.: Shake them up!: A movement-based pairing protocol for CPU-constrained devices. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys 2005, Seattle, Washington, USA, June 6–8, 2005, pp. 51–64 (2005)

    Google Scholar 

  11. Chan, H., Perrig, A.: PIKE: peer intermediaries for key establishment in sensor networks. In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13–17 March 2005, Miami, FL, USA, pp. 524–535 (2005)

    Google Scholar 

  12. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11–14 May 2003, Berkeley, CA, USA, p. 197 (2003)

    Google Scholar 

  13. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Communications Surveys and Tutorials 11(2), 52–73 (2009)

    Article  Google Scholar 

  14. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  15. Du, H., Li, J., Zhang, Y., Li, T., Zhang, Y.: Certificate-based key-insulated signature. In: Data and Knowledge Engineering - Third International Conference, ICDKE 2012, Wuyishan, Fujian, China, November 21–23, 2012. Proceedings, pp. 206–220 (2012)

    Google Scholar 

  16. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings IEEE INFOCOM 2004, The 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, March 7–11, 2004 (2004)

    Google Scholar 

  17. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27–30, 2003, pp. 42–51 (2003)

    Google Scholar 

  18. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing 3(1), 62–77 (2006)

    Article  Google Scholar 

  19. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)

    Article  Google Scholar 

  20. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18–22, 2002, pp. 41–47 (2002)

    Google Scholar 

  21. Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: Scalable coordination in sensor networks. In: MOBICOM ’99, The Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, Seattle, Washington, USA, August 15–19, 1999., pp. 263–270 (1999)

    Google Scholar 

  22. Ge, M., Choo, K.R.: A novel hybrid key revocation scheme for wireless sensor networks. In: Network and System Security - 8th International Conference, NSS 2014, Xi’an, China, October 15–17, 2014, Proceedings, pp. 462–475 (2014)

    Google Scholar 

  23. Geng, Y., ming Rong, C., Veigner, C., Wang, J.T., Cheng, H.B.: Identity-based key agreement and encryption for wireless sensor networks. The Journal of China Universities of Posts and Telecommunications 13(4), 54–60 (2006)

    Article  Google Scholar 

  24. Gholami, M.R., Gezici, S., Ström, E.G.: TW-TOA based positioning in the presence of clock imperfections. Digital Signal Processing 59, 19–30 (2016)

    Article  Google Scholar 

  25. Gopal, S.J., Anita, J.P., Sudheesh, P.: Particle filtering technique for fast fading shadow power estimation in wireless communication. In: Advances in Signal Processing and Intelligent Recognition Systems, pp. 105–115. Springer International Publishing, Cham (2018)

    Google Scholar 

  26. Guan, R.P., Ristic, B., Wang, L., Moran, B., Evans, R.: Feature based moving robot localization using doppler radar: Achievable accuracy. In: 20th International Conference on Information Fusion, FUSION 2017, Xi’an, China, July 10–13, 2017, pp. 1–6 (2017)

    Google Scholar 

  27. Hao, Y.: Target localization and track based on the energy source. Master’s thesis, Fudan University (2006)

    Google Scholar 

  28. He, D., Kumar, N., Choo, K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Transactions on Information Forensics and Security 12(2), 454–464 (2017)

    Article  Google Scholar 

  29. Hou, S., Huang, X., Xu, L.: Identity-based transitive signcryption. In: Network and System Security - 8th International Conference, NSS 2014, Xi’an, China, October 15–17, 2014, Proceedings, pp. 246–259 (2014)

    Google Scholar 

  30. Hu, Z., Gu, D., Song, Z., Li, H.: Localization in wireless sensor networks using a mobile anchor node. In: Advanced Intelligent Mechatronics, 2008. AIM 2008. IEEE/ASME International Conference on, pp. 602–607 (2008)

    Google Scholar 

  31. Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key establishment protocols for self-organizing sensor networks. In: Proceedings of the Second ACM International Conference on Wireless Sensor Networks and Applications, WSNA 2003, San Diego, CA, USA, September 19, 2003, pp. 141–150 (2003)

    Google Scholar 

  32. Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signature revisited. In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2–4, 2007, Proceedings, pp. 308–322 (2007)

    Google Scholar 

  33. Jana, S., Premnath, S.N., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th Annual International Conference on Mobile Computing and Networking, MOBICOM 2009, Beijing, China, September 20–25, 2009, pp. 321–332 (2009)

    Google Scholar 

  34. Kumar, V., Bergmann, N.W., Ahmad, I., Jurdak, R., Kusy, B.: Cluster-based position tracking of mobile sensors. CoRR abs/1710.04589 (2017)

    Google Scholar 

  35. Kuriakose, J., Joshi, S., Raju, R.V., Kilaru, A.: A review on localization in wireless sensor networks. In: Advances in Signal Processing and Intelligent Recognition Systems - selected and revised papers from the International Symposium on Signal Processing and Intelligent Recognition Systems, SIRS 2014, March 13–15, 2014, Trivandrum, India, pp. 599–610 (2014)

    Google Scholar 

  36. Lai, B., Kim, S., Verbauwhede, I.: Scalable session key construction protocol for wireless sensor networks. In: IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), p. 7. Citeseer (2002)

    Google Scholar 

  37. Lédeczi, Á., Nádas, A., Völgyesi, P., Balogh, G., Kusy, B., Sallai, J., Pap, G., Dóra, S., Molnár, K., Maróti, M., Simon, G.: Countersniper system for urban warfare. ACM Transactions on Sensor Networks 1(2), 153–177 (2005)

    Article  Google Scholar 

  38. Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004, Revised Selected Papers, pp. 294–307 (2004)

    Chapter  Google Scholar 

  39. Li, H., Bu, Y., Xue, H., Li, X., Ma, H.: Path planning for mobile anchor node in localization for wireless sensor networks. Journal of Computer Research and Development 46(1), 129–136 (2009)

    Google Scholar 

  40. Li, J., Du, H., Zhang, Y., Li, T., Zhang, Y.: Provably secure certificate-based key-insulated signature scheme. Concurrency and Computation: Practice and Experience 26(8), 1546–1560 (2014)

    Article  Google Scholar 

  41. Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Transactions on Parallel and Distributed Systems 25(8), 2201–2210 (2014)

    Article  Google Scholar 

  42. Li, J., Li, J., Chen, X., Jia, C., Lou, W.: Identity-based encryption with outsourced revocation in cloud computing. IEEE Transactions on Computers 64(2), 425–437 (2015)

    Article  MathSciNet  Google Scholar 

  43. Lin, C., Huang, X., Li, S., Wu, W., Yang, S.: Linearly homomorphic signatures with designated entities. In: Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings, pp. 375–390 (2017)

    Google Scholar 

  44. Lin, H., Xu, L., Huang, X., Wu, W., Huang, Y.: A trustworthy access control model for mobile cloud computing based on reputation and mechanism design. Ad Hoc Networks 35, 51–64 (2015)

    Article  Google Scholar 

  45. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27–30, 2003, pp. 52–61 (2003)

    Google Scholar 

  46. Liu, D., Ning, P.: Improving key predistribution with deployment knowledge in static sensor networks. ACM Transactions on Sensor Networks 1(2), 204–239 (2005)

    Article  Google Scholar 

  47. Liu, J.K., Au, M.H., Huang, X., Lu, R., Li, J.: Fine-grained two-factor access control for web-based cloud computing services. IEEE Transactions on Information Forensics and Security 11(3), 484–497 (2016)

    Article  Google Scholar 

  48. Luo, R.C., Chen, O., Pan, S.H.: Mobile user localization in wireless sensor network using grey prediction method. In: 31st Annual Conference of IEEE Industrial Electronics Society, 2005. IECON 2005., pp. 2680–2685 (2005)

    Google Scholar 

  49. Ma, M., He, D., Kumar, N., Choo, K.R., Chen, J.: Certificateless searchable public key encryption scheme for industrial internet of things. IEEE Transactions on Industrial Informatics 14(2), 759–767 (2018)

    Article  Google Scholar 

  50. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2004, October 4–7, 2004, Santa Clara, CA, USA, pp. 71–80 (2004)

    Google Scholar 

  51. Mathur, S., Trappe, W., Mandayam, N.B., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th Annual International Conference on Mobile Computing and Networking, MOBICOM 2008, San Francisco, California, USA, September 14–19, 2008, pp. 128–139 (2008)

    Google Scholar 

  52. McCarthy, M., Duff, P., Muller, H.L., Randell, C.: Accessible ultrasonic positioning. IEEE Pervasive Computing 5(4), 86–93 (2006)

    Article  Google Scholar 

  53. Neuwinger, B., Witkowski, U., Rückert, U.: Ad-hoc communication and localization system for mobile robots. In: Advances in Robotics, FIRA RoboWorld Congress 2009, Incheon, Korea, August 16–20, 2009. Proceedings, pp. 220–229 (2009)

    Google Scholar 

  54. Niculescu, D., Badrinath, B.R.: Ad hoc positioning system (APS) using AOA. In: Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, CA, USA, March 30 - April 3, 2003, pp. 1734–1743 (2003)

    Google Scholar 

  55. Oliferuk, W., Maj, M., Zembrzycki, K.: Determination of the energy storage rate distribution in the area of strain localization using infrared and visible imaging. Experimental Mechanics 55(4), 753–760 (2015)

    Article  Google Scholar 

  56. Ou, C., Ssu, K.: Sensor position determination with flying anchors in three-dimensional wireless sensor networks. IEEE Transactions on Mobile Computing 7(9), 1084–1097 (2008)

    Article  Google Scholar 

  57. Peng, J., Choo, K.R., Ashman, H.: User profiling in intrusion detection: A review. Journal of Network and Computer Applications 72, 14–27 (2016)

    Article  Google Scholar 

  58. Peng, K., Zhang, Y.: A secure mix network with an efficient validity verification mechanism. In: Internet and Distributed Computing Systems - 5th International Conference, IDCS 2012, Wuyishan, Fujian, China, November 21–23, 2012. Proceedings, pp. 85–96 (2012)

    Google Scholar 

  59. Peng, Y., Wang, P., Xiang, W., Li, Y.: Secret key generation based on estimated channel state information for TDD-OFDM systems over fading channels. IEEE Transactions on Wireless Communications 16(8), 5176–5186 (2017)

    Article  Google Scholar 

  60. Perrig, A., Stankovic, J.A., Wagner, D.A.: Security in wireless sensor networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  61. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16–21, 2001., pp. 189–199 (2001)

    Google Scholar 

  62. Pietro, R.D., Mancini, L.V., Law, Y.W., Etalle, S., Havinga, P.J.M.: LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 6–9 October 2003, Kaohsiung, Taiwan, p. 397 (2003)

    Google Scholar 

  63. Pietro, R.D., Oligeri, G.: COKE crypto-less over-the-air key establishment. IEEE Transactions on Information Forensics and Security 8(1), 163–173 (2013)

    Article  Google Scholar 

  64. Pietro, R.D., Oligeri, G.: ESC: An efficient, scalable, and crypto-less solution to secure wireless networks. Computer Networks 84, 46–63 (2015)

    Article  Google Scholar 

  65. Premnath, S.N., Jana, S., Croft, J., Gowda, P.L., Clark, M., Kasera, S.K., Patwari, N., Krishnamurthy, S.V.: Secret key extraction from wireless signal strength in real environments. IEEE Transaction on Mobile Computing 12(5), 917–930 (2013)

    Article  Google Scholar 

  66. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  67. Ruj, S., Nayak, A., Stojmenovic, I.: Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers 62(11), 2224–2237 (2013)

    Article  MathSciNet  Google Scholar 

  68. Shen, J., Moh, S., Chung, I.: Identity-based key agreement protocol employing a symmetric balanced incomplete block design. Journal of Communications and Networks 14(6), 682–691 (2012)

    Article  Google Scholar 

  69. Shen, J., Wang, A., Wang, C., Hung, P.C.K., Lai, C.: An efficient centroid-based routing protocol for energy management in wsn-assisted iot. IEEE Access 5, 18,469–18,479 (2017)

    Google Scholar 

  70. Shen, J., Zhou, T., He, D., Zhang, Y., Sun, X., Xiang, Y.: Block design-based key agreement for group data sharing in cloud computing. IEEE Transactions on Dependable and Secure Computing, to be appear (2017)

    Google Scholar 

  71. Shimizu, T., Iwai, H., Sasaoka, H.: Physical-layer secret key agreement in two-way wireless relaying systems. IEEE Transactions on Information Forensics and Security 6(3–1), 650–660 (2011)

    Article  Google Scholar 

  72. Shu, L., Hara, T., Nishio, S., Chen, Y., Hauswirth, M.: The new challenge: mobile multimedia sensor networks. International Journal of Multimedia Intelligence and Security 2(2), 107–119 (2011)

    Article  Google Scholar 

  73. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. No. RFC 2627 (1999)

    Google Scholar 

  74. Wang, D., Gu, Q., Cheng, H., Wang, P.: The request for better measurement: A comparative evaluation of two-factor authentication schemes. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi’an, China, May 30 - June 3, 2016, pp. 475–486 (2016)

    Google Scholar 

  75. Wang, D., Wang, P.: Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE Transactions on Dependable and Secure Computing pp. 1–1 (2017)

    Google Scholar 

  76. Wang, M., Zhang, Y., Ma, J., Wu, W.: A universal designated multi verifiers content extraction signature scheme. International Journal of Computational Science and Engineering, to appear (2018)

    Google Scholar 

  77. Wang, Q., Su, H., Ren, K., Kim, K.: Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: INFOCOM 2011. 30th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 10–15 April 2011, Shanghai, China, pp. 1422–1430 (2011)

    Google Scholar 

  78. Wang, Q., Xu, K., Ren, K.: Cooperative secret key generation from phase estimation in narrowband fading channels. IEEE Journal on Selected Areas in Communications 30(9), 1666–1674 (2012)

    Article  Google Scholar 

  79. Watro, R.J., Kong, D., Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: Tinypk: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004, pp. 59–64 (2004)

    Google Scholar 

  80. Wei, L., Zhang, H., Yu, B., Song, J., Guan, Y.: Cubic-receiver-based indoor optical wireless location system. IEEE Photonics Journal 8(1), 1–7 (2016)

    Google Scholar 

  81. Xi, W., Qian, C., Han, J., Zhao, K., Zhong, S., Li, X., Zhao, J.: Instant and robust authentication and key agreement among mobile devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24–28, 2016, pp. 616–627 (2016)

    Google Scholar 

  82. Xie, B., Chen, K., Tan, G., Lu, M., Liu, Y., Wu, J., He, T.: LIPS: A light intensity-based positioning system for indoor environments. ACM Transactions on Sensor Networks 12(4), 28:1–28:27 (2016)

    Article  Google Scholar 

  83. Xie, B., Tan, G., He, T.: Spinlight: A high accuracy and robust light positioning system for indoor applications. In: Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, Seoul, South Korea, November 1–4, 2015, pp. 211–223 (2015)

    Google Scholar 

  84. Xu, B., Qi, W., Zhao, Y., Wei, L., Zhang, C.: Holographic radio interferometry for target tracking in dense multipath indoor environments. In: 9th International Conference on Wireless Communications and Signal Processing, WCSP 2017, Nanjing, China, October 11–13, 2017, pp. 1–6 (2017)

    Google Scholar 

  85. Xu, C., Firner, B., Zhang, Y., Howard, R.E.: The case for efficient and robust rf-based device-free localization. IEEE Transactions on Mobile Computing 15(9), 2362–2375 (2016)

    Article  Google Scholar 

  86. Xu, L., Cao, X., Zhang, Y., Wu, W.: Software service signature (S3) for authentication in cloud computing. Cluster Computing 16(4), 905–914 (2013)

    Article  Google Scholar 

  87. Xu, L., Zhang, Y.: Matrix-based pairwise key establishment for wireless mesh networks. Future Generation Computer Systems 30, 140–145 (2014)

    Article  Google Scholar 

  88. Yang, X., Zhang, Y., Liu, J.K., Zeng, Y.: A trust and privacy preserving handover authentication protocol for wireless networks. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 23–26, 2016, pp. 138–143 (2016)

    Google Scholar 

  89. Ye, A., Zheng, Y., Xu, L., Zhang, Y.: A road-network based privacy-preserving approach in trajectory publishing. Journal of Internet Technology 18(4), 867–876 (2017)

    Google Scholar 

  90. Zan, B., Gruteser, M., Hu, F.: Key agreement algorithms for vehicular communication networks based on reciprocity and diversity theorems. IEEE Transactions on Vehicular Technology 62(8), 4020–4027 (2013)

    Article  Google Scholar 

  91. Zeng, K., Wu, D., Chan, A.J., Mohapatra, P.: Exploiting multiple-antenna diversity for shared secret key generation in wireless networks. In: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15–19 March 2010, San Diego, CA, USA, pp. 1837–1845 (2010)

    Google Scholar 

  92. Zhang, L., Zhou, X., Cheng, Q.: Landscape-3d; A robust localization scheme for sensor networks over complex 3d terrains. In: LCN 2006, The 31st Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 14–16 November 2006, pp. 239–246 (2006)

    Google Scholar 

  93. Zhang, Y., Xiang, Y., Huang, X.: Password-authenticated group key exchange: A cross-layer design. ACM Transactions on Internet Technology 16(4), 24:1–24:20 (2016)

    Article  Google Scholar 

  94. Zhang, Y., Xiang, Y., Huang, X.: A cross-layer key establishment model for wireless devices in cyber-physical systems. In: Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017, pp. 43–53 (2017)

    Google Scholar 

  95. Zhang, Y., Xiang, Y., Huang, X., Chen, X., Alelaiwi, A.: A matrix-based cross-layer key establishment protocol for smart homes. Information Sciences 429, 390–405 (2018)

    Article  Google Scholar 

  96. Zhang, Y., Xiang, Y., Huang, X., Xu, L.: A cross-layer key establishment scheme in wireless mesh networks. In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7–11, 2014. Proceedings, Part I, pp. 526–541 (2014)

    Google Scholar 

  97. Zhang, Y., Xiang, Y., Wang, T., Wu, W., Shen, J.: An over-the-air key establishment protocol using keyless cryptography. Future Generation Computer Systems 79, 284–294 (2018)

    Article  Google Scholar 

  98. Zhang, Y., Xiang, Y., Wu, W., Alelaiwi, A.: A variant of password authenticated key exchange protocol. Future Generation Computer Systems 78, 699–711 (2018)

    Article  Google Scholar 

  99. Zhang, Y., Xu, L., Huang, X.: Polynomial based key predistribution scheme in wireless mesh networks. Journal of Computational Information System 8(6), 2539–2549 (2012)

    Google Scholar 

  100. Zhang, Y., Xu, L., Huang, X., Li, J.: Matrix-based pairwise key establishment with pre and post deployment knowledge for wireless mesh networks. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013, Taichung, Taiwan, July 3–5, 2013, pp. 153–158 (2013)

    Google Scholar 

  101. Zhang, Y., Xu, L., Huang, X., Li, J.: Matrix-based key pre-distribution schemes in wmns using pre and post deployment knowledge. International Journal of Ad Hoc and Ubiquitous Computing 20(4), 262–273 (2015)

    Article  Google Scholar 

  102. Zhang, Y., Xu, L., Xiang, Y., Huang, X.: Matrix-based pairwise key establishment in wireless mesh networks using deployment knowledge. In: Proceedings of IEEE International Conference on Communications, ICC 2013, Budapest, Hungary, June 9–13, 2013, pp. 1604–1608 (2013)

    Google Scholar 

  103. Zhang, Y., Xu, L., Xiang, Y., Huang, X.: A matrix-based pairwise key establishment scheme for wireless mesh networks using pre deployment knowledge. IEEE Transactions on Emerging Topics in Computing 1(2), 331–340 (2013)

    Article  Google Scholar 

  104. Zhu, C., Shu, L., Hara, T., Wang, L., Nishio, S., Yang, L.T.: A survey on communication and data management issues in mobile sensor networks. Wireless Communications and Mobile Computing 14(1), 19–36 (2014)

    Article  Google Scholar 

  105. Zhu, F., Zhang, Y., Lin, C., Wu, W., Meng, R.: A universal designated multi-verifier transitive signature scheme. In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017, Revised Selected Papers, pp. 180–195 (2017)

    Chapter  Google Scholar 

  106. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27–30, 2003, pp. 62–72 (2003)

    Google Scholar 

  107. Zhu, X., Xu, F., Novak, E., Tan, C.C., Li, Q., Chen, G.: Using wireless link dynamics to extract a secret key in vehicular scenarios. IEEE Transactions on Mobile Computing 16(7), 2065–2078 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zhong, S. et al. (2019). Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks. In: Security and Privacy for Next-Generation Wireless Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-030-01150-5_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-01150-5_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-01149-9

  • Online ISBN: 978-3-030-01150-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics