Open Access Open Access  Restricted Access Subscription or Fee Access

Security in Wireless Sensor Networks: Issues and Challenges

A. P. Thangamuthu


Wireless Sensor Networks (WSNs) have made it easier for people to live in various fields: medical engineering, agriculture. Together with computing power and wireless networking, sensing technology makes it lucrative for its potential abundance of use. Since the many uses of such systems have been used, lightweight, inexpensive, disposable and self-contained computers, known as sensor nodes or "motes" are created. WSNs are commonly used in applications for monitoring, tracking and control. These include: centralized management, system heterogeneity, protocol routing, versatility of node, privacy of information and restricted computing capacity [1]. WSN covers a wide geographical area; the question of routing protocols, scalability and security should therefore be addressed. In the traditional networking technique there are major benefits due to the low cost and cooperative design of Wireless Networks (WNs). The networks with wireless sensors have more advantages over wired networks. Although wireless networks have various advantages, they are vulnerable to security problems. Due to the broader application, safety has become an important issue for wireless sensor networks.


Sensor, Communication, Application, Device, Information, Protocol, Security, Wired, Wireless.

Full Text:



W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless micro sensor networks,” in Proceedings of the 33rd Hawaii International Conference on System Sciences, Maui,Hawaii, USA, 2000.

A.Manjeshwar and D. P.Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks,” in Proceedings of 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS ’01), Issues in Wireless Networks and Mobile, pp. 2009–2015, San Francisco, Calif, USA, April 2000.

Y. L. Shen, Q.-Q. Pei, and J.-F. Ma, “MM𝜇TESLA: broadcast authentication protocol for multiple-base-station sensor networks,” Chinese Journal of Computers, vol. 30, no. 4, pp. 539– 546, 2007.

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., “Wireless Sensor Networks: A Survey”, Computer Networks, 38, 2002, pp. 393-422.

Y. Zhang, P. Kitsos, “Security in RFID and sensor networks,” Taylor & Francis Group, LLC, pp. 293–322, 2009.

K. Pathan, H.W. Lee, C. S. Hong, “Security in wireless sensor networks: issues and challenges,” pp. 1044–1047 Feb. 20-22, 2006, ISBN 89-5519-129-4.

S. Kaplantzis, “Security models for wireless sensor networks,” March 20, 2006.

J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security: a survey”, Chapter 17 in Security in Distributed, Grid, and Pervasive Computing, Auerbach Publications, CRC Press, 2006.

Dai, S, Jing, X, and Li, L, “Research and analysis on routing protocols for wireless sensor networks”, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411.

Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks Journal, vol. 8, no. 5, pp. 521–534, 2002.

Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., “A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks”, to appear in IEEE ICNEWS 2006.

D. Liu and P. Ning, “Multi-level 𝜇TESLA: a broadcast authentication system for distributed sensor networks,” ACM Transactions on Embedded Computing Systems (TECS), vol. 3, no. 4, pp. 800–836, 2004.

Tahir Naeem, Kok-Keong Loo, Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, International Journal of Digital Content Technology and its Applications, Page 89-90 Volume 3, Number 1, year 2009.

Undercoffer, J., Avancha, S., Joshi, A. and Pinkston, J. "Security for sensor networks". In Proceedings of the CADIP Research Symposium, University of Maryland, Baltimore County, USA, year 2002

Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges", International conference on Advanced Computing Technologies, Page 1043-1045, year 2006

Saleh, M. and Khatib, I. A. (2005). Throughput Analysis of WEP Security in Ad Hoc Sensor Networks”, Proc. The Second International Conference on Innovations in Information Technology (IIT’05). [21] Santhi, G. Sowmiya, R. (2017).

A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks. International Journal of Computer Applications, 159, 0975 – 8887. [22] Shi, E. In addition, Perrig, A. (2004). Designing secure sensor networks, IEEE Wireless Communications, 11, 38–43.

Xu, W. Et al. (2005). The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Mobile Ad Hoc Net. In addition, Comp. 46–57.

Franklin, M. Galil, Z. and Yung, M. (2000). Eavesdropping games: a graph-theoretic approach to privacy in distributed systems,” J. ACM, 47, 225–243.

Karlof, C and Wagner, D. (2003). Secure routing in Wireless Sensor Networks: Attacks and Countermeasures, Adhoc networks, 293- 395.

Alla Chandra Sekhar Reddy, Riaz Shaik , Effective Detection of Denial of Service (Dos) Attacks by Using Snort Rules Architecture, International Journal of Applied Engineering Research ISSN 0973-4562 Volume 9, Number 19 (2014) pp. 1635-1646.

Riaz Shaik, Lokesh Kanagala, Hema Gopinath Sukavasi, Sufficient Authentication for Energy Consumption in Wireless Sensor Net-works, . International Journal of Electrical and Computer Engineer-ing (IJECE) Vol. 6, No. 2, April 2016, pp. 735~742.

Akyildiz, I.F., W. Su, Y. Sankarasubramaniam, E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, August, 102-114(2002).

R. Ramen, J. Lopez, S. Gritzalis, "Situation awareness mechanisms for wireless sensor networks ", IEEE Communication Magazine, vol. 46, no. 4, pp. 102-107, Apr. 2008.

S. Rajasegarar, C. Leckie, and M. Palansiwami, "Anomaly detection in wireless sensor networks", IEEE Wireless Communications, vol. 15, no. 4, Aug. 2008, pp. 34-40.

Yun Zhou, Yuguang Fang, Yanchao Zhang, Securing Wireless Sensor Networks: A Survey, IEEE Communications Surveys & Tutorials, year 2008

Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Commun. Surveys Tutorials, vol. 8, pp. 2– 23, year 2006.

Hero Modares, Rosli Salleh, Amirhossein Moravejosharieh , “Overview of Security Issues in Wireless Sensor Networks”, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation, , © 2011 IEEE

Dirk Westhoff, Joao Girao, Amardeo Sarma, “Security Solutions for Wireless Sensor Networks”

Adrian Perrig, John Stankovic, David Wagner, “Security in Wireless Sensor Networks” Communications of the ACM, Page53-57, year 2004

Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication Technology (ICACT), Page(s):6, year 2006

Vikash Kumar, Anshu Jain and P N Barwal, -Wireless Sensor Networks: Security Issues, Challenges And Solutions, International Journal Of Information & Computation Technology, Volume 4, Number 8 (2014), pp. 859-868.

Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah And Kashif Naseer Qureshi, -Security Issues And Attacks In Wireless Sensor Network, World Applied Sciences Journal 30 (10): 1224-1227, 2014, Idosi Publications, 2014.

Poonam Khare, Sara Ali, -Survey of Wireless Sensor Network Vulnerabilities and its Solution, International Journal of Recent Development in Engineering and Technology, Volume 2, Issue 6, June 2014. [15] Hiren Kumar Deva Sarma and Avijit Kar, -Security Threats in Wireless Sensor Networks, IEEE A&E SYSTEMS MAGAZINE, June 2008.

Mahfuzulhoq Chowdhury, Md Fazlul Kader and Asaduzzaman, -Security Issues in Wireless Sensor Networks: A Survey, International Journal of Future Generation Communication and Networking Vol.6, No.5 (2013), pp.97-116

Sahabul Alam and Debashis De, “analysis of security threats in wireless sensor networks”, IJWMN, vol.6, April-2014.

Aashima single and ratikasachdeva, “Review on security issue and attacks in wireless sensor network, IJARCSSE, vol. 3, April-2013.

Kalpana Sharma, M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threats”, IJCA, 2010.

Vani. Hiremani and Monali.Madne, “ Security mechanism for wireless sensor network- A review”, IJRITCC, vol. 1, December-2013.

Kahina CHELLI, “Security issues in wireless sensor networks: attacks and counter measures”, proceedings of the world congress on engineering, vol.1, Jully 1-3,2015.

Teodor-Grigore Lupu, “Main Type of Attack in Wireless Sensor Networks”.

K.Venkataraman, J. Vijay Daniel, G.Murugaboopathi,“Various Attacks in Wireless Sensor Network: Survey”, IJSCE, vol.3, March-2013.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.