Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks
Title | Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Chen, W., Hong, L., Shetty, S., Lo, D., Cooper, R. |
Conference Name | 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) |
Date Published | May 2016 |
Publisher | IEEE |
ISBN Number | 978-1-5090-3682-0 |
Keywords | array signal processing, beamforming, Cognitive radio, cognitive radio networks, composability, cooperative communication, cooperative MIMO communication, cooperative MIMO radios, cooperative sensor networks, Cross Layer Security, cross-layered security approach, cryptographic technique, cryptography, Information theory, information theory based compromised nodes detection algorithm, MIMO, MIMO communication, Physical layer, pubcrawl, Relays, Resiliency, security of wireless communication, telecommunication security, wireless networks, Wireless sensor networks |
Abstract | Cooperative MIMO communication is a promising technology which enables realistic solution for improving communication performance with MIMO technique in wireless networks that are composed of size and cost constrained devices. However, the security problems inherent to cooperative communication also arise. Cryptography can ensure the confidentiality in the communication and routing between authorized participants, but it usually cannot prevent the attacks from compromised nodes which may corrupt communications by sending garbled signals. In this paper, we propose a cross-layered approach to enhance the security in query-based cooperative MIMO sensor networks. The approach combines efficient cryptographic technique implemented in upper layer with a novel information theory based compromised nodes detection algorithm in physical layer. In the detection algorithm, a cluster of K cooperative nodes are used to identify up to K - 1 active compromised nodes. When the compromised nodes are detected, the key revocation is performed to isolate the compromised nodes and reconfigure the cooperative MIMO sensor network. During this process, beamforming is used to avoid the information leaking. The proposed security scheme can be easily modified and applied to cognitive radio networks. Simulation results show that the proposed algorithm for compromised nodes detection is effective and efficient, and the accuracy of received information is significantly improved. |
URL | https://ieeexplore.ieee.org/document/7529908 |
DOI | 10.1109/IPDPSW.2016.88 |
Citation Key | chen_cross-layered_2016 |
- Cryptography
- wireless sensor networks
- wireless networks
- telecommunication security
- security of wireless communication
- Resiliency
- Relays
- pubcrawl
- Physical layer
- MIMO communication
- MIMO
- information theory based compromised nodes detection algorithm
- information theory
- array signal processing
- cryptographic technique
- cross-layered security approach
- Cross Layer Security
- cooperative sensor networks
- cooperative MIMO radios
- cooperative MIMO communication
- cooperative communication
- composability
- cognitive radio networks
- cognitive radio
- beamforming