Open Access Open Access  Restricted Access Subscription or Fee Access

Comparative Study on Distributed Signal Processing and its Security

A. Immaculate, G. Vaishnavi

Abstract


Wireless sensor networks are spatially distributed sensor nodes that keep track of the physical or environmental conditions like sound, stress waves, temperature of surrounding etc, and also send the sensed data back to the sink or base station. WSN are used in many applications like military areas, disaster management in remote areas, in building smart cities, environmental monitoring, smart spaces, medical applications, and precision agriculture [1][2] etc. Identifying opportunities and challenges for distributed signal processing in networks of these sensing elements and investigate some of the architectural challenges posed by systems that are massively distributed, physically-coupled, wireless  networked, and energy limited. Therefore security is an important aspect in WSN. These networks can be prone to various disastrous attacks or hackers that have the motive to disrupt the entire network. In this article, is a comparative study that focuses on distributed, wireless sensor networks in which the signal processing is distributed along with the sensing and  various aspects of security in Wireless Sensor Networks has been observed like secure routing protocols, security at the node level in the network level, cryptography etc.  

Full Text:

PDF

References


D. Estrin, R. Govindan, and J. Heidemann, Eds., Special Issue on Embedding the Internet. Communications of the ACM, vol. 43, no. 5, May 2000.

B.R. Badrinath, M. Srivastava, K. Mills, J. Scholtz, and K. Sollins, Eds., Special Issue on Smart Spaces and Environments. IEEE Personal Communications, Oct. 2000.

Sensors: The Journal of Applied Sensing Technology.

G. Pottie and W. Kaiser, “Wireless sensor networks,” Communications of the ACM, vol. 43, no. 5, pp. 51–58, May 2000.

V.D. Gligor, “Emergent Properties in Ad-Hoc Networks: A Security Perspective,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS ’06), p. 1, 2006.

A.Perrig”SPINS: Security Protocols for Sensor Networks, Wireless Networks, vol. 8, no. 5, Sept. 2002, and pp.521–34.

V.D. Gligor, “Emergent Properties in Ad-Hoc Networks: A SecurityPerspective,” Proc. ACM Symp. Information, Computer- LSM and Comm. Security (ASIACCS ’06), p. 1, 2006.

Mauro Conti et al, “Distributed detection of clone attacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Communication, VOL.8, NO. 5, September/October 2011.

Nivedita Mukherjee, “A Dynamic Cryptographic Algorithm To Provide Nodal Level Security in Wireless Sensor Network,2010 International Conference on Innovative Computing and Communication and 2010 Asia Pacific Conference on Information Technology and Ocean Engineering.

Xiaoyong Li, “LDTS: A Lightweight and dependable Trust System for Clustered Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security, vol.8.no.6 June 2016.

Yong Wang, Garhan Attebury, and Byrav Ramamurthy, “A Survey of security issues in wireless sensor networks, IEEE Communications Surveys& Tutorials ,2nd Quarter 2006

Binod Kumar Mishra, “Security against Black Hole Attack in Wireless sensor Network-A Review,2014 Fourth International Conference on Communication Systems and Network Technologies.

Yuxin Liu, “Active Trust: Secure and Trustable Routing in Wireless Sensor Networks,IEEE Transactions on Information Forensics and Security,vol.11,no.9 ,September 2016.

B.R. Badrinath, M. Srivastava, K. Mills, J. Scholtz, and K. Sollins, Eds., Special Issue on Smart Spaces and Environments. IEEE Personal Communications, Oct. 2000.

S.H. Seo, “Effective Key Management in Dynamic Wireless Sensor Networks, IEEE Transactions on Information Forensics and Security,vol.10,no.2 February 2015.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.