Beruflich Dokumente
Kultur Dokumente
A. Security
.) Sensor node In common WSNs without Internet access, the sensor nodes
may already play an important role to ensure data confidential-
Fig. 3. Access point network
ity, integrity, availability and authentication depending on the
application sensitivity. However, the current identified attack
Tt is obvious that the first approach presents a single point scenarios reqiiire a physical presence near the targeted WSN
of failure due to the gateway uniqueness. Gateway dysfunction in order to jam, capture or introduce malicious nodes for
example. By opening WSNs to Internet, such location prox- presenting a high diversity in terms of monitored subjects
imity will no more be required and attackers would be able and environments. By taking into account their main char-
to threaten WSNs from everywhere. In addition to this novel acteristics, we have analyzed three integration approaches and
location diversity, WSNs may have to address new threats Iike demonstrated that they were inappropriate in their current state
malware introduced by the Intemet connection and evolving to allow sensor nodes joining dynamically the Internet of
with the attacker creativity. Most current WSNs connected to Things.
the Internet are protected by a central and unique powerful We consider applying the IP to the Field paradigm, which
gateway ensuring efficient protection. However, a direct reuse implies assigning additional responsibilities to the sensor
of such existing security mechanisms is made impossible by nodes as an adequate solution to integrate WSNs with the
the scarce energy, memory, and computational resources of the Intemet. We have selected three important task assignments in
sensor nodes. In fact, common Mica2 motes offer 7.3 MHz order to highlight the challenges emerging from the paradigm
8-bit microcontrollers with 128 Kbytes of reprogrammable adoption: Security, QoS, and configuration management. Their
flash mcmory, 4 Kbytcs of RAM and 4 Kbytcs of EEPROM analysis revealed that the solutions ciirrently deployed in the
[14]. At last, many services on the Intemet make use of Internet are not suitable for the lirnited sensor node resources
cryptography with large key lengths such as RSA-1024, which and conseq~iently,novel mechanisms have to be developed to
are not currently supported by sensor nodes. Consequently, adapt to the capabilities and constraints of WSNs. We plan
innovative security mechanisms must be developed according to investigate existing approaches and find suitable modifica-
to the resource constraints to protect WSNs from novel attacks tions for resource-constrained sensor platforms to tackle these
originating from the Internet. challenges.
B. Quulity of Service
With gateways acting only as repeater and protocol trans- This work was supported by CASED (www.cased.de). The
lators, sensor nodes are also expected to contribute to quality authors would like to thank Matthias Hollick for the fruitful
of service management by optimizing the resource utilization discussions.
of all heterogeneous devices that are part of the future In-
REFERENCES
ternet of Things. Not considered as a weakness, the device
heterogeneity Opens new perspectives in terms of workload [I] "Internet of Things in 2020: Roadmap for the Future," 2008. online.
http://www.smart-systems-inte~ation.org/public/intemet-of-things.
distribution. In fact, resource differentes may be exploited to [2] K. Römer and F. Mattern. "The Design Space of Wireless Sensor
share the current workload between nodes offering available Networks." Wireless Cornmrrnicarions. IEEE, vol. I I. no. 6. 2004.
resources. Improving the QoS, such collaborative work is con- (31 D. Culler, D. Estrin, and M. Srivastava, "Giiest Editors' Introdiiction:
Overview of Sensor Networks," vol. 37, oo. 8. 2004.
sequently promising for mechanisms requiring high amount of [4] K. Maninez, R. Ong, and J. Han, "Glacsweb: a Sensor Network for
resources like security mechanisms. Nevertheless, the existing Hostile Environments:' in Proceedirzgs of the Sensor and Ad Hoc
approaches ensuring QoS in the Intemet are not applicable Cornrnunicarions and Networks Conference (SECON). 2004.
[SI I. Talzi, A. Hasler, S. Griiber. and C. Tschudin, "PermaSense: investi-
in WSNs, as sudden changes in the link characteristics can gating permafrost with a WSN in rhe Swiss Alps," in Proceedings of
lead to significant reconfiguration of the WSN topology. Tt is rhe wnorkshop on Embedded networked Sensors (EmNets), 2007.
therefore mandatory to find novel approaches towards ensuring 161 R. Lee. K. Chen. S. Chiang, C. Lai. H. Liu. and M.-S. Wei, "A Backup
Routing with Wireless Sensor Network for Bridge Monitoring System,"
delay and loss guarantees. in Proceedings of tlie Cornrriirnication Networks and Services Research
ConferencefCNSR), 2006.
[7] P. Katsikogiannis, E. Zervas. and G. Kaltsas. "A W i l e s s Sensor Net-
work for Building Structural Health Monitoring and Seismic Drtection,"
In addition to security and QoS management, sensor nodes physica status solid; (C). vol. 5, 2008.
can also he required to control the WSN configuration, which [81 D. Hughes. G. Blair. G. Coiilson, P. Greenwood, B. Porter. P. Smith. and
includes covering different tasks, such as address administra- K. Beven, "An Adaptable WSN-based Flood Monitoring Systein," in
Proceedirigs of rhe European Conference on Smart Sensing nnd Context
tion to ensure scalable network constmctions and ensuring (EuroSSC). 2007.
self-healing capabilities by detecting and eliminating faulty [9] W. Werner-Allen. K. Lorinc~,M. Ruiz. 0. Marcillo, J. Johnson. J. Lees.
nodes or managing their own configuration. However, sell- and M. Welsh, "Deploying a Wireless Sensor Network on an Active
Volcano:' IEEE Interner Cornputing, vol. 10, no. 2, 2006.
configuration of participating nodes is not a common feature in [I01 M. H. Teicher, "Actigraphy and Motion Analysis: New Tools for
the Intemet. Instead, the user is expected to install applications Psychiatry," Harvard Review of Psyctiiatry, vol. 3. 1995.
and recover the system from crashes. In contrast, the unat- [I I] A. Wood, G. Virone. T. Doan, Q. Cao. L. Selavo, Y. Wii, L. Fang. Z. He,
S. Lin. and J. Stankovic. "ALARM-NET: Wireless Sensor Networks for
tended operation of autonomous sensor nodes requires novel Assisted-living and Residential Monitoring." 2006.
means of network configuration and management. [I21 R. Roman and J. Lopez, "lntegrating Wireless Sensor Networks and the
Intemet: a Security Analysis." Internet Reseamti: Eleoronic Netu~orking
Applications und Policy. vol. 19, no. 2, 2009.
[I31 Sman Energy Alliance. online, http://www.smart-energy-
In this first analysis step to integrate WSNs into the Intemet alliance.com/s«lutions/i~-the-ficldl.
of Things, we have considered selected application Scenarios 1141 Crossbow Technology, online. http://www.xbow.com.