Abstract
1. Introduction
Mobile wireless sensor networks are an extended form of traditional wireless sensor networks where nodes are not static but mobile. Recently, sensors in mobile wireless sensor networks become more and more versatile, for example, underwater sensors, body sensors, and control sensors. The control sensors are usually divided into two classes: actuators and actors. Those actuator and actor sensor networks extend traditional wireless sensor networks from passive networks to active networks, from data networks to control networks, via adding functionalities such as response and action. The actuator and actor sensor networks start to be applied in new applications such as smart grid, smart city, smart building, and factory automation, to name a few [1–3].
Wireless actuator and actor sensor networks can be viewed as wireless sensor control networks (WSCNs) over a group of sensors. WSCNs have two distinctions compared with traditional wireless sensor networks as follows. (1) The entities in networks are extended from sensors only to sensors plus. For example, there exist sensors, actuators, and actors in WSCNs. Actuators may perform actively for controlling, but sensors in traditional wireless sensor networks usually act passively for collecting data. (2) The transmitting messages in networks are extended from data only to data plus, for example, data messages and control messages. Therefore, new security problems arise in WSCNs. If entities in WSCNs can be distinguished by adversaries, adversaries will be able to launch a target attack (that has been explored in our previous paper [4]); if data or control messages are dropped by adversaries, the control loop will be terminated; if data or control messages are disordered, the control status or sequences may be disturbed. We called them indistinguishability, reachability, and timeliness problems in WSCNs. Note that those security problems cannot be solved by previous security schemes for traditional wireless sensor networks due to the specialities of WSCNs. We thus have to explore new methods to solve them, especially, in a tailored design manner.
Concretely, security in wireless control networks starts to attract more and more attention [5–9]. Those work majorally address different contexts from WSCNs, so the solutions may not be able to tackle the aforementioned security requirements. Moreover, the security problems in WSCNs are challengeable due to the inherent properties: wireless lossy channels, jamming-sensitive links, resource-constraint sensor devices, control timing demands, and control sequence ordering requirements.
In this paper, we make the first attempt to clarify and analyze the security requirements in WSCNs and then propose a lightweight scheme called LIRT to guarantee those requirements, namely, indispensability, reachability, and timeliness in WSCNs. We formally prove the achievement of the proposed scheme. Different from other works and previous approaches, all presentations in the paper strictly follow formal expressions for better clarity and rigorous generality.
The contributions of the paper are listed as follows.
We make the first attempt to define formal attacks and security requirements in WSCNs, namely, indistinguishability, reachability, and timeliness in WSCNs. We make the first attempt to propose a lightweight scheme to guarantee those security requirements and formally prove the security goals that are achieved.
The rest of the paper is organized as follows. Section 2 gives an overview on relevant prior work. In Section 3 we discuss the basic assumption and models used throughout the paper. Section 4 provides the detailed description and analysis of our proposed scheme. Finally, Section 5 concludes the paper.
2. Related Work
Wireless sensor networks for automation control have attracted more and more attention in recent years [5, 8, 10–12]. Yen et al. [5] proposed packet loss problem in wireless networked control system over IEEE 802.15.4e. They proposed redundant transmission. de Filippi et al. [7] proposed single-sensor control strategies for semiactive steering damper control in two-wheeled vehicles. Thurman et al. [9] explored acoustic sensors in an unmanned underwater vehicle to provide full autonomy control. Au et al. [13] proposed energy-efficient classification algorithms for wearable sensor systems. All the above work focuses on control performance but not control security.
The security problems in WSCNs have not been thoroughly explored in recent work. Target attacks for wireless machine-to-machine control networks are first pointed out by our previous work [4]. We also proposed a scheme called RISE to mitigate target attacks. Stealthy deception attacks in water SCADA systems are first pointed out by Amin et al. [6]. They discuss sensor networks but mainly in wired SCADA networks. Zheng et al. [3] discussed reliable problem in wireless communication networks that support demand and response control. They proposed several methods for deriving reliability performance. Short et al. [2] discussed burst errors in wireless control networks. They proposed application-level strategies for ameliorating the effects of packet losses and burst errors in sampled-data control systems. Above related work are independent with our discussion and solution in the following, as our analysis for the security requirements are different from them.
3. Problem Formulation
3.1. Network Model and Attack Model
There exist three major entities (denoted as

Wireless sensor control networks. Sensors collect sensing data; actuators respond corresponding instructions; actors execute those instructions.
We assume that the links among sensors, actuators, and actors are not secure. The adversaries (denoted as
Definition 1 (message distinguishing risk (
)).
Adversaries may distinguish data and instructions in transmitting messages in WSCNs, after viewing the behavior and messages among entities in WSCNs.
The observation is the only advantage of adversaries, as we suppose the links are not secure. It can be formally described as follows:
Definition 2 (entity distinguishing risk (
)).
Adversaries may distinguish sensors, actuators, and actors among entities in WSCNs, after viewing the behavior and messages among entities in WSCNs.
It can be formally described as follows:
Definition 3 (dropping attack (
)).
Adversaries may drop data that are sent from sensors to actuators and instructions that are sent from actuators to actors.
Definition 4 (disordering attack (
)).
Adversaries may disturb the arrival time of data at actuators and the arrival time of instructions at actors.
It is natural to see that the prerequisite for dropping attack is message distinguishing risk and entity distinguishing risk.
The disordering attack can be launched without any prerequisite information about message distinguishing risk and entity distinguishing risk. It is thus much easier to be launched via just jamming arbitrary packets into channels, and it is thus more difficult to be defended against.
3.2. Security Definition and Design Goal
The security requirements are defined as follows.
Definition 5 (indistinguishability).
The data and instruction cannot be distinguished from messages by adversaries from all their observations. The sensors, actuators, and actors cannot be distinguished from entities by adversaries from their observations.
Indistinguishability is formally described as
Definition 6 (reachability).
The data can arrive at designated actuators finally, and instructions can arrive at designated actors finally.
Definition 7 (timeliness).
The data can arrive at actuators timely, and instructions can arrive at actors timely.
Therefore, the design goal is to propose a scheme for guaranteeing indistinguishability, reachability, and timeliness in a lightweight way.
4. Proposed Schemes
We list major notations used in the remainder of the paper in Table 1.
Notations.
4.1. Indistinguishability
As message distinguishing risk,
Proposition 8.
Entity indistinguishability is equivalent to message indistinguishability.
Proof (straightforward).
If entities are distinguishable, messages will be distinguishable via the entities who send; if messages are distinguishable, entities will be distinguishable by analyzing their sending messages.
Thus, we discuss two risks together. We firstly analyze the information or advantages that can be obtained by adversaries. Adversaries can observe the following behavior and messages in WSCNs.
The messages that can be observed for message distinguishing are as follows:
(M-O1) the length of the messages that are sent among entities, (M-O2) the format and semantics of the messages that are sent among entities.
The behavior that can be observed for distinguishing entities is as follows.
(B-O1) The sending sequence of the messages and entities, it is a list of messages and entities which send messages in an observing time span. For example, in an observation time span with (B-O2) The interval of two sequentially sending messages at any two entities; for example, (B-O3) The interval of two consecutively sending messages at one entity, for example, (B-O4) The interval of (B-O5) The interval of
Proposition 9.
If and only if the observation is indistinguishable, the message and entity are indistinguishable.
Proof.
The observation at adversaries is the only knowledge to distinguish message and entity. If and only if the observation is indistinguishable, the message and entity are indistinguishable.
Therefore, we propose the following strategies via randomization to make observation indistinguishable. Each strategy addresses one observation.
(IND-S1) All messages that are sent among entities have the same length. (IND-S2) All messages that are sent among entities are encrypted for hiding semantics. (IND-S3) The sending sequence of the messages among entities is randomized. (IND-S4) The interval of two sequentially sending messages at any two entities is randomized. (IND-S5) The interval of two sequentially sending messages at one entity is randomized. (IND-S6) The intervals of (IND-S7) The intervals of
Proposition 10.
Strategy (IND-S6) can be guaranteed by (IND-S4).
Proof (straightforward).
As any interval of two sequentially sending messages at any two entities is randomized, and the intervals of
Proposition 11.
Strategy (IND-S7) can be guaranteed by (IND-S5).
Proof (straightforward).
The interval of two sequentially sending messages at one entity is randomized, the intervals of
Thus, the sending algorithm for indistinguishability (called SAI algorithm) at each entity is proposed in Algorithm 1.
Initialization; //Maintain the same length //Create dummy packet
4.2. Reachability
As adversaries cannot distinguish messages and entities, they have to drop messages (e.g., by jamming channels) randomly to launch a dropping attack.
To guarantee the reachability of the data and instruction messages, we propose the following strategies via redundancy.
(RCH-S1) Data and instruction are sent for α times.
Proposition 12.
If the dropping probability of a packet is
Proof.
As the dropping probability of one packet is
The repeat sending for α times can increase the probability of reachability, but it also causes communication overhead. In the following strategies, we will tackle the communication overhead by optimization.
(RCH-S2) Data and instruction are sent for random times in
Proposition 13.
If the dropping probability of a packet is
Proof.
The reachability of one packet in
Proposition 14.
The average communication overhead in (RCH-S2) is less than (RCH-S1) by
Proof (straightforward).
The communication overhead in (RCH-S1) is
(RCH-S3) The repeating times at originators for data or instruction are
Originators are the entities where data or instruction are originated from. For example, the first sensor who sends the data is the originator for that data. Forwarders are the entities between originators and designated destination entities. That is, forwarders forward the data or instruction to packet destination. The dummy packets at immediate forwarders are not created from meaningless dummy string (NULL) but created from data or instruction received previously by immediate forwarders. That is, before forwarders send dummy packets, they choose the last one in received data or instruction as a dummy packet. This strategy can both improve the reachability of data or instruction and mitigate the communication overhead.
Proposition 15.
If the dropping probability of a packet is
Proof (straightforward).
The proof is similar to the former proposition.
The sending algorithm for reachability (SAR algorithm) at each entity is given in Algorithm 2.
//at Originators: Initialization; //
//at Forwarders: Initialization; //Get packet from ingress queue
4.3. Timeliness
Adversaries cannot distinguish messages and entities. The dropping attack cannot aim at designated messages or entities. The dropping is thus randomly dropping, for example, by jamming channels. The jamming subsequently results in disordering attack. The timeliness of the control operations is damaged. To guarantee the timeliness of the data and instruction messages, we propose following strategies.
(TML-S1) The suspended time is randomly chosen from a time slot that is shortened exponentially. That is,
Proposition 16.
If the suspended time slot
Proof.
Suppose the suspended time slot is
Similarly, (TML-S2) can be proposed corresponding to (RCH-S2). That is, when data and instruction are sent for random times in (TML-S3) We propose to shorten the suspended time slot exponentially at forwarders. The minimum is lower bounded by a threshold value, denoted as Th.
The sending algorithm for timeliness (SAT algorithm) at each entity is given in Algorithm 3.
//at Originators: Initialization; //Exponentially suspending
//at Forwarders: Initialization;
Proposition 17.
Strategy (TML-S3) does not damage indistinguishability.
Proof.
Everyone in WSCNs may be originators or forwarders. It depends on messages to forwarder or originator. Originators or forwarders both shorten suspended time slot exponentially. Thus, strategy (TML-S3) does not damage indistinguishability.
Proposition 18.
If the suspended time slot
Proof (straightforward).
The proof is similar to the proof of the former proposition.
The proposed scheme—LIRT—is the combination of strategies for indistinguishability, reachability, and timeliness. As the strategy (TML-S3) includes SAI, SAR, and SAT, it can be viewed as an appropriate version of LIRT. As the scheme is described intentionally in an incremental manner in this section, the advantages of LIRT are clear to follow for its advantages due to the improvements step by step.
5. Discussion
In former discussion, feedback information such as networking status and receiver's acknowledgement is not used for simplicity. If feedback information is available, it can be used to enhance previous strategies by achieving adaptive and optimal overall performance. The feedback information that can be gathered by senders is as follows.
The network feedback on network status, it is sent by intermediate forwarders or detectors, and it reports congestion, risks, and dropping rate of messages. The feedback from receivers, it is sent by designated destination of messages, and it reports message arrival, delay, jitter, and timeliness.
If the feedback information is available in WSCNs, the strategies can be enhanced by intelligent method for adaptivity and optimization.
6. Conclusions
WSCNs are important types in mobile wireless sensor networks and present their own characteristics compared with traditional wireless sensor networks. In this paper, we made the first attempt to specify the security requirements for WSCNs, in which of the upmost importance are indistinguishability, reachability, and timeliness. To clarify and illustrate the security requirements, several new attacks in WSCNs were pointed out at the first time, for example, distinguishing risks, dropping attacks, and disordering attacks. To defend against those attacks, a lightweight scheme LIRT was proposed. LIST can guarantee the indistinguishability, reachability, and timeliness in WSCNs, which is justified by extensive and rigorous analysis on security strength. The performance of LIRT is also measured by communication overhead, to confirm its applicability in realistic scenarios.
