Wireless sensor networks security issues and challenges: A survey

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Wireless Sensor Network (WSN) is a rising technology that offers a great assurance towards a variety of revolutionary applications such as military and public. As wireless sensor networks continue to develop, there is a high importance in security mechanisms. As sensor networks works with responsive data and operate in antagonistic environments, it is crucial to address the security issues. The sensing technology united with wireless communication and processing power makes it rewarding. Due to these computing and inherent constraints in resource, sensor network security has special challenges. The low cost and collaborative nature of the wireless networks (WNs) offers significant advantages upon the conventional communication techniques. The wireless communication technology has several kinds of security threats. The spotlight of this paper is towards addressing the security issues and challenges of WSNs. Here the idea is to identify the threats and security mechanism of wireless sensor networks.

     



  • Keywords


    Adversary; Wireless Sensor Network; Security Issues

  • References


      [1] Akyildiz. I. F., Su. W., Sankarasubramaniam. Y. and Cayirci. E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40, 102–114.

      [2] Bojkovic, Z. S. Bakmaz, B. M. In addition, Bakmaz, M. R. (2008). Security Issues in Wireless Sensor Networks. International journal of communications, 2.

      [3] Carman, D. W. Krus, P. S. and Matt, B. J. (2000) Constraints and approaches for distributed sensor network security. Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, MD.

      [4] Chen, M. Gonzalez, S. Leung, V.C. (2007). Applications and design issues for mobile agents in wireless sensor networks. IEEE Wireless Communication, 14, 20–6.

      [5] Culler, D. E and Hong, W. (2004). Wireless Sensor Networks. Communication of the ACM, 47, 30-33.

      [6] Douceur, J. (2002) the sybil attack. International Workshop on Peer-to-Peer Systems (IPTPS’02).

      [7] Franklin, M. Galil, Z. and Yung, M. (2000). Eavesdropping games: a graph-theoretic approach to privacy in distributed systems,” J. ACM, 47, 225–243.

      [8] Karlof, C and Wagner, D. (2003). Secure routing in Wireless Sensor Networks: Attacks and Countermeasures, Adhoc networks, 293-395.

      [9] Kurak, C and McHugh, J. (1992). A Cautionary Note on Image Downgrading in Computer Security Applications. Proceedings of the eighth Computer Security Applications Conference. 153-159.

      [10] Murthy, C. R. In addition, Manoj, B. S. (2004). Transport layer and security protocols for ad hoc wireless networks. Ad Hoc Wireless Networks - Architectures and Protocols.

      [11] Newsome, J. Shi, E. Song, D, and Perrig, A. (2004). The sybil attack in sensor networks: analysis & defenses. Proc. of the third international symposium on Information processing in sensor networks, 259 – 268.

      [12] Parno, B. Perrig, A. and Gligor, V. (2005). Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE Symposium on Security and Privacy.

      [13] Pathan, A S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S. (2006). A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks. IEEE ICNEWS.

      [14] Perrig, A. Szewczyk, R. Tygar, J. D. Wen, V.and Culler, D. E. Spins: security protocols for sensor networks. Wireless Networking, 8, 521–534, 2002.

      [15] Perrig, A. Szewczyk, R. Wen, V. Culler, D. and Tygar, J. D. (2002). SPINS Security Protocols for Sensor Networks, Wireless Networks, eight, 521-534.

      [16] Perrig, A. Szewczyk, R. Wen, V. Culler, D. and Tygar, J. D. SPINS: Security Protocols for Sensor Networks. International Conference on Mobile Computing and Networking (MobiCom 2001).

      [17] Priyanka, J. S. A. Tephillah, S. and Balamurugan, A. M. (2014). Attacks and countermeasures in WSN. International Journal of Electronics & Communication, 2.

      [18] Raymond, D. R. In addition, Midkiff, S. F. (2008). Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses, IEEE Pervasive Computing, 7, 74-81.

      [19] Rupinder Singh Brar, Harneet Arora. (2013). Mobile agent security issues in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), 3, 378-381.

      [20] Saleh, M. and Khatib, I. A. (2005). Throughput Analysis of WEP Security in Ad Hoc Sensor Networks”, Proc. The Second International Conference on Innovations in Information Technology (IIT’05).

      [21] Santhi, G. Sowmiya, R. (2017). A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks. International Journal of Computer Applications, 159, 0975 – 8887.

      [22] Shi, E. In addition, Perrig, A. (2004). Designing secure sensor networks, IEEE Wireless Communications, 11, 38–43.

      [23] Xu, W. Et al. (2005). The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Mobile Ad Hoc Net. In addition, Comp. 46–57.

      [24] Yu, Y. Li, K. Zhou, W and Li, P. (2011). Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. Journal of Network and Computer Applications, Elsevier.


 

View

Download

Article ID: 13861
 
DOI: 10.14419/ijet.v7i2.33.13861




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.