Open Access Open Access  Restricted Access Subscription or Fee Access

Recent Survey on Security in Wireless Sensor Network

Muneebahmdhyiddeen Muneebahmdhyiddeen, Renju Mohan, B.L. Anupama, Arya Vijayakumaran Nair

Abstract


A Wireless Sensor Network (WSN) is a prominent technology where a huge number of wireless sensors are deployed to observe the changes of environmental conditions. Due to their vast area of applications they are nowadays attracting a lot of interest in wireless and mobile computing research community. Wireless Sensor Networks are the most challenging and emerging technology for the research due to their essential reach in the field linked with their low processing power and associated low energy. However, due to their wireless medium which is broadcast in nature, these networks are unprotected to number of security threats that can badly affect their performance. This problem will more and more dangerous upon the introduction of some mission-critical applications. Due to the unfriendly nature of their deployment environments, the wireless medium and the constrained nature of resources on tiny sensor devices used in such networks, security produces more series challenges compared to the traditional networks. Security is therefore important and challenging task in WSNs. This paper consider major features of security in wireless sensor networks and some existing security attacks.


Keywords


Wireless Sensor Network WSN), Denial of Service (DoS), Intrusion Detection, Trust Management.

Full Text:

PDF

References


Akyildiz, F., W. Su, Y. Sankarasubramaniam, and E. Cayirci. August 2002. “A Survey on Sensor Networks.” IEEE Communications Magazine 40 (80): 102 – 114.

Anderson, R., and M. Kuhn.1997. “Low Cost Attacks on Tamper Resistant Devices.” In Proceedings of the 5th International Workshop on Security Protocols (IWSP), Lecture Notes in Computer Science (LNCS), Vol 1361, 125-136.

Shi E., and A. Perrig. December 2004. “Designing Secure Sensor Networks.” Wireless Communication Magazine, 11 (6): 38-43.

Hill, J., R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. Pister. 2000. “System Architecture Directions for Networked Sensors.” In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 93-104, New York: ACM Press.

Carman, D. W., P. S. Krus, and B. J. Matt. 2000. “Constraints and Approaches for Distributed Sensor Network Security.” Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD, USA.

Ganeriwal S., and M. Srivastava. 2004. “Reputation-Based Framework for High Integrity Sensor Networks.” In Proceedings of the 2nd ACM Workshop on Security on Ad Hoc and Sensor Networks (SASN’04), 66-77, Washington DC, USA.

Zhu, H., F. Bao, R. H. Deng, and K. Kim. September 2004. “Computing of Trust in Wireless Networks.” In Proceedings of 60th IEEE Vehicular Technology Conference, Los Angeles, California, USA.

Wood A. D., and J.A. Stankovic. 2002. “Denial of Service in Sensor Networks.” IEEE Computer, 35 (10), 54-62

Newsome, J., E. Shi, D. Song, and A. Perrig. 2004. “The Sybil Attack in Sensor Networks: Analysis and Defenses.” In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, 1259-1268.

Chan H., and A. Perrig. 2003. “Security and Privacy in Sensor Networks.” IEEE Computer Magazine, 36 (10): 103-105.

Rafaeli S., and D. Hutchison. 2003. “A Survey of Key Management for Secure Group Communications.” ACM Computing Survey, 35 (3): 309-329.

I. Sato, Y. Okazaki, and S. Goto. An improved intrusion detection method based on process profiling. IPSJ Journal, 43(11):3316–3326, 2002.

P. Brutch and C. Ko. Challenges in intrusion detection for wireless ad-hoc networks. In 2003 Symposium on Applications and the Internet Workshops (SAINT’03 Workshops), 2003.

Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, Member, IEEE, and Mohsen Guizani, Fellow, IEEE “An Efficient Distributed Trust Model for Wireless Sensor Networks” Ieee Transactions On Parallel And Distributed Systems, Vol. 26, No. 5, May 2015.

Deng, J., R. Han, and S. Mishra. 2004. “Countermeasures against Traffic Analysis in Wireless Sensor Networks.” Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.