Visible to the public Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks

TitleCross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks
Publication TypeConference Paper
Year of Publication2016
AuthorsChen, W., Hong, L., Shetty, S., Lo, D., Cooper, R.
Conference Name2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW)
Date PublishedMay 2016
ISBN Number978-1-5090-3682-0
Keywordsarray signal processing, beamforming, Cognitive radio, cognitive radio networks, composability, cooperative communication, cooperative MIMO communication, cooperative MIMO radios, cooperative sensor networks, Cross Layer Security, cross-layered security approach, cryptographic technique, cryptography, Information theory, information theory based compromised nodes detection algorithm, MIMO, MIMO communication, Physical layer, pubcrawl, Relays, Resiliency, security of wireless communication, telecommunication security, wireless networks, Wireless sensor networks

Cooperative MIMO communication is a promising technology which enables realistic solution for improving communication performance with MIMO technique in wireless networks that are composed of size and cost constrained devices. However, the security problems inherent to cooperative communication also arise. Cryptography can ensure the confidentiality in the communication and routing between authorized participants, but it usually cannot prevent the attacks from compromised nodes which may corrupt communications by sending garbled signals. In this paper, we propose a cross-layered approach to enhance the security in query-based cooperative MIMO sensor networks. The approach combines efficient cryptographic technique implemented in upper layer with a novel information theory based compromised nodes detection algorithm in physical layer. In the detection algorithm, a cluster of K cooperative nodes are used to identify up to K - 1 active compromised nodes. When the compromised nodes are detected, the key revocation is performed to isolate the compromised nodes and reconfigure the cooperative MIMO sensor network. During this process, beamforming is used to avoid the information leaking. The proposed security scheme can be easily modified and applied to cognitive radio networks. Simulation results show that the proposed algorithm for compromised nodes detection is effective and efficient, and the accuracy of received information is significantly improved.

Citation Keychen_cross-layered_2016