Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Self-healing wireless sensor networks
Miyaji A., Omote K. Concurrency and Computation: Practice & Experience27 (10):2547-2568,2015.Type:Article
Date Reviewed: Oct 4 2016

Miyaji and Omote, in this paper, explore the security of encrypted self-healing features for three different wireless sensor network (WSN) schemes designed to be deployed in hostile environments. In such an environment, one imagines the reverse engineering of captured nodes, the introduction of compromised or Trojan nodes, hacked communication links, and node replacement following battery failure (no joke). Healing goes beyond replacing hardware to the restoration of security with cryptographic keys.

Some of these networks rely on servers and a fixed home base, so they are not homogeneous. Eager attackers are described as regularly attacking sensors and links, possibly without disrupting network operations. They may learn the network’s topology (which is assumed to be regular, unchanging, and probably not very large) and the names of nodes. To me, a network of named sensors connected by a fixed communications architecture will be very brittle, compared to one of anonymous sensors connected by a dynamic architecture.

The authors’ investigation is focused on (1) RPoK, a resilient polynomial-based random key pre-distribution scheme (RKP); (2) S-RKP, a simple (that is, limited program) RKP; and (3) POLISH, a proactive, self-healing, cooperative link scheme without a server. Sensors and links are described as being green (fully functional), yellow, or red (compromised), as well as healing (the process of increasing green nodes). Mathematical analysis and simulation are used to compare the availability and the efficiency of healing processes. This is interesting.

They write: “The RoK scheme was the first resilient multiphase WSN with self-healing.” RoK is credited to Castelluccia and Spognardi [1]. Except for one 1993 paper, the references mention only work published after 2002. The authors do not seem to be aware of theoretical work in this area during the decades following 1970, in particular, a very large solar-powered, randomly deployed, homogeneous, anonymous, asynchronous, self-healing sensor network loosely described in works by Kotin and Stark [2,3], later depicted in the Hollywood movie Tears of the Sun [4], and finally in section 12 of Stark [5]. The only thing about this WSN not published is the very simple and possibly unbreakable security trick used when new sensors must be added to the network. None of the encryption techniques mentioned in the paper at hand are used.

This paper will be of interest and of value to engineers working with the networks described by the authors.

Reviewer:  W. Richard Stark Review #: CR144807 (1701-0053)
1) Castelluccia, C.; Spognardi, A. RoK: a robust pre-distribution protocol for multi-phase wireless sensor networks. In Proc. of SecureComm 2007. IEEE, Nice, France, 2007, 351–360.
2) Kotin, L.; Stark, W. R. Thoughts on mechanical societies: or distributed computing in random and changing architectures. Congr. Numer. 60 (1987), 221–241.
3) Stark, W. R.; Kotin, L. The social metaphor for distributed processing. Journal of Parallel and Distributed Computing 7, 1(1989), 125–147.
4) Tears of the Sun. Directed by Antoine Fuqua. Columbia Pictures, Los Angeles, CA, 2003.
5) Stark, W. R. Amorphous computing: examples, mathematics and theory. Natural Computing 12, 3(2013), 377–392.
Bookmark and Share
  Reviewer Selected
 
 
Sensor Networks (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Sensor Networks": Date
Performance analysis of opportunistic broadcast for delay-tolerant wireless sensor networks
Nayebi A., Sarbazi-Azad H., Karlsson G. Journal of Systems and Software 83(8): 1310-1317, 2010. Type: Article
Nov 8 2010
Heartbeat of a nest: using imagers as biological sensors
Ko T., Ahmadian S., Hicks J., Rahimi M., Estrin D., Soatto S., Coe S., Hamilton M. ACM Transactions on Sensor Networks 6(3): 1-31, 2010. Type: Article
Jan 10 2011
Efficient clustering-based data aggregation techniques for wireless sensor networks
Jung W., Lim K., Ko Y., Park S. Wireless Networks 17(5): 1387-1400, 2011. Type: Article
May 8 2012
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy