Open Access Open Access  Restricted Access Subscription or Fee Access

Security Issues and Challenges in Wireless Sensor Networks

V. Uma Rani, E.A. Mary Anita

Abstract


Wireless sensor networks are one kind of distributed ad hoc networks used to provide a wireless communication infrastructure among the sensors deployed in a specific application domain. Sensor network is based on broadcast wireless medium susceptible to variety of attacks. Due to their characteristics such as small memory, limited energy resources, low computation capability, susceptibility to physical capture, and the use of insecure wireless communication channels make security in wireless sensor network as a challenging one. This paper, we discusses sensor network architecture, the major security issues and challenges in wireless sensor networks, their defense mechanisms, and security protocols and used to counter the issues.

Keywords


Attack, Protocol, Security, Sensor Network.

Full Text:

PDF

References


K. Romer and F. Mattern, ―The design space of wireless sensor networks‖ IEEE Wireless Communications,2004, pp54–61.

C. Karlof and D. Wagner, ―Secure Routing in Wireless Sensor Networks: Attacks and Countermeasure‖, in Proc. First IEEE Int‘l Workshop Sensor Network Protocols and Applications (SNPA ‘03), May 2003pp45-51.

Zaw Tun and Aung Htein Maw, ―Wormhole Attack Detection in Wireless Sensor Networks‖ ,in World Academy of Science, Engineering and Technology 2008,pp4-6.

James Newsome, Elaine Shi Dawn Song Adrian Perrig,‖The Sybil Attack in Sensor Networks: Analysis & Defenses‖ in ZPSN‘O4, April 2004, Berkeley, California, USA pp26-27.

Leela Krishna Bysani, Ashok Kumar Turuk,‖A Survey On Selective Forwarding Attack in Wireless Sensor Networks‖ ,2011 IEEEpp34-49.

Md. Moniruzzaman, Md. Junaid Arafeen, Saugata Bose,‖ Overview of Wireless Sensor Networks: Detection of Cloned Node Using RM, LSN, SET, Bloom Filter and AICN Protocol and Comparing Their Performances‖ in International Journal of Digital Content Technology and its Applications Volume 3, Number 3, September 2009,pp324-334.

David R. Raymond, Randy C. Marchany,‖Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols‖ in IEEE transactions on vehicular technology, vol. 58, no. 1,january 2009,pp367-380.

Anthony D.Wood ,John A .Stankovic,‖Denial of Service in Sensor Networks‖ in IEEE ,2002,pp48-56.

Yong Wang, Garhan Attebury, And Byrav Ramamurthy,‖Survey Of Security Issues In Wireless Sensor Networks‖ in IEEE Communications Surveys & Tutorials, 2nd Quarter 2006.

Virendra Pal Singh, Sweta Jain, Jyoti Sing hai, ‖Hello flood attack Hello Flood Attack and its Countermeasures in Wireless Sensor Networks‖ in IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 11, May 2010,pp23-27.

Wazir Zada Khan Yang Xiang Mohammed YA alsalem, ―Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks‖ in I.J. Computer Network and Information Security, January 2011, pp1-10

Davi Martins and Herve Guyennet,‖Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey‖,in 13th International Conference on Network-Based Information Systems, IEEE, 2010 pp313-320.

Gabrielli, Luigi V. Mancini, Sanjeev Setia, and Sushil Jajodia,‖Securing Topology Maintenance Protocol for Sensor Networks‖ in IEEE transactions on dependable and secure computing, vol. 8, no. 3, may/june 2011,pp450-464.

Kuthadi Venu Madhav,Rajendra. And Raja Lakshmi Selvaraj,‖A Study Of Security Challenges In Wireless Sensor Networks‖ a Journal of Theoretical and Applied Information Technology, 2010pp 39-44.

Ullah, Masood Ahmad, Masood Habib, Jawad Muhammad.‖Analysis of Security Protocols for Wireless Sensor Networks‖ in IEEE 2011,pp 383-387

Jun-Won Ho, Matthew Wright, and Sajal K. Das,‖ Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing‖ , IEEE transactions on mobile computing, vol. 10, no. 6, june 2011,pp 767-788

B. Parno, A. Perrig, and V.D. Gligor, ―Distributed Detection of Replication Attacks in Sensor Networks,‖ Proc. IEEE Symp. Security and Privacy, pp. 49-63, May 2005.

M. Conti, R.D. Pietro, L.V. Mancini, and A. Mei, ―A Randomized, Efficient, and Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks,‖ Proc. ACM MobiHoc, pp. 80-89, Sept. 2007.

K. Xing, F. Liu, X. Cheng, and H.C. Du, ―Real-Time Detection of Clone Attacks in Wireless Sensor Networks,‖ Proc. IEEE Int‘l Conf. Distributed Computing Systems (ICDCS), pp. 3-10, June 2008.

Richard Brooks,P.Y. Govindaraju, Matthew Pirretti, N. Vijaykrishnan, and Mahmut T. Kandemir ‖On the Detection of Clones in Sensor Networks Using Random Key Predistribution‖ IEEE transactions on systems, man, and cybernetics—partc: applications and reviews, vol. 37, no. 6, November 2007 ,pp1246-1249.

D. Liu and P. Ning, ―Establishing Pairwise Keys in Distributed Sensor Networks,‖ Proc. 10th ACM Conf. Computer and Comm. Security, Oct. 2003.

H. Chan, A. Perrig, and D. Song, ―Random Key Predistribution Schemes for Sensor Networks,‖ Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003.

A.D. Wood and J.A. Stankovic, ―Denial of Service in Sensor Networks,‖ Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.

Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. ―SPINS: Security protocols for sensor networks‖in Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), July 2001,pp 521-534.

Y. Hu, A. Perrig, and D. Johnson,‖ Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks‖, in Proc. Of Infocom 2003. San Francisco, CA, USA, April 2003 pp. 1976-1986..

S. Capkun, L. Buttyan, J. Hubaux, ―SECTOR: Secure Traking of Node Encounters in Muti-hop Wireless Networks‖, in proc. Of SASN 2003 Fairfax, Virginia, October 2003

L. Hu and D. Evans, ―Using directional antennas to prevent wormhole attacks,‖ in Network and Distributed System Security Symposium (NDSS), 2004.

W. Wang and B. Bhargava, ―Visualization of wormholes in sensor networks,‖ in WiSe ‘04: Proceedings of the 2004 ACM workshop on Wireless security, New York, NY, USA, 2004, pp. 51–60.

L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang.‖Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach‖ In Proceedings of Wireless Communictions and Networking Conference, 2005.IEEE. March 2005. pp.1193-1199.

A Hamid, S Hong, (2006) ,‖Defense against Lap-top Class Attacker in Wireless Sensor Network‖, ICACT

Venkata C. Giruka, Mukesh Singhal, James Royalty,Srilekha Varanasi, (2006), Security in wireless networks, Wiley Inter Science

Chris Karlof and Naveen Sastry and David Wagner,‖TinySec: A Link Layer Security Architecture for Wireless Sensor Networks‖ In SenSys,ACM, November2004.

Zhu, S., Setia, S., Jajodia, S. (2003) ‗LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks‘, CCS ‘03, Washington D.C., USA, 27 – 31 October 2003, New York, USA: ACM Press,62-72.

Mark Luk, Ghita Mezzour, Adrian Perrig,Virgil Gligor, ‖ MiniSec: A Secure Sensor Network Communication Architecture‖,ACM IPSN‘07, April 25-27, 2007, Cambridge, Massachusetts, USA.

HaoChiWong, Nogueira,J.MConselheiroLafaiete, ‖NEKAP: Intruder Resilient and Energy Efficient Key Establishment in Sensor Networks‖ in IEEE computer communications and Networks ,ICCN 2007,pp 803-808.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.