For certain security-sensitive wireless sensor network (WSN) applications, physical location information of the sensor nodes must not be disclosed to any unauthorised entity. During the localisation phase for such applications the physical locations of sensor nodes are kept secret. Globally, a number of secure location estimation schemes have been proposed from various perspectives, but some important constraints of sensor nodes are often ignored. The considered limitations during design of those schemes vary with respect to varying research perspective. In this study, we propose a novel security framework for secure location estimation of sensor nodes suitable for security-sensitive WSN applications. The proposed framework aims to provide security, scalability, adaptability and optimise power consumption during the secure location estimation phase of a wireless sensor network. The designed framework consists of a two-way authentication scheme, a lightweight encryption mechanism and a novel secure key generation algorithm. The study discusses strengths of the components if used for secure localisation individually, as well as when used together as interactive parts of a security framework for WSN applications. 2 Related work WSN security has drawn the attention of many researchers over the decade. Many secure location estimation schemes www.ietdl.org
To achieve precise modelling of real-time systems stochastic behaviours are considered which lead towards probabilistic modelling. Probabilistic modelling has been successfully employed in wide array of application domains including, for example, randomised distributed algorithms, communication, security and power management protocols. This study is an improvement over our previous work, which was based on the probabilistic analysis of a cluster-based fault tolerant target-tracking protocol (FTTT) using only grid-based sensor nodes arrangement. Probabilistic modelling is chosen for the analysis of FTTT protocol to facilitate benefits of symmetry reduction in conjunction with modelling. It is believed that for the first time correctness of the simplified version of a target-tracking protocol is verified by developing its continuous-time Markov chain (CTMC) model using symbolic modelling language. The proposed probabilistic model of a target-tracking wireless sensor networks will help to analyse the phases of FTTT protocol on a limited scale with finite utilisation of time. There are three main contributions of this study; first consideration of synchronised events between the modules, second, random placement of sensor nodes is taken into account in addition to grid-based sensor node arrangement, third one is the reduction in state space size through symmetry reduction technique, which also facilitates to analyse a larger size network. Symmetry reduction on Probabilistic Symbolic Model (PRISM) checker models is performed by PRISM-symm and the generic representatives in PRISM (GRIP) tool. Modelling of FTTT protocol is proved better with the usage of PRISM-symm after comparing the results of PRISM model, PRISM-symm and GRIP.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.