A Survey on Wireless Sensor Networks Security
Abstract
Wireless Sensor Networks(WSN) are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today wireless sensor networks are broadly used in environmental control, surveillance tasks, monitoring, tracking and controlling etc. On the top of all this the wireless sensor networks need very secure communication in wake of they being in open field and being based on broadcasting technology. In this paper we deal with the security of the wireless sensor networks. Staring with a brief overview of the sensor networks, a review is made of and how to provide the security on the wireless sensor networks.
FAQs
AI
What types of attacks are prevalent in wireless sensor networks?
The paper identifies four primary attack types in WSN: interruption, interception, modification, and fabrication, highlighting their specific challenges to network security.
How does the LEACH protocol enhance energy consumption in wireless sensor networks?
LEACH employs cluster-based transmission strategies, improving energy efficiency by allowing nodes to communicate with a nearby cluster head rather than directly with distant sinks.
What security measures are recommended to mitigate Sybil attacks?
Validation techniques are advised as a key method to prevent Sybil attacks, where an attacker attributes multiple illegal identities to a single node.
What is the significance of the SPINS protocol in wireless sensor networks?
SPINS offers data authentication, replay protection, and low overhead via two secure building blocks: SNEP and µTESLA, which are vital for preserving data integrity.
What role do simulators play in analyzing wireless sensor networks?
Simulators like OMNeT++ and GloMoSim provide a platform for evaluating performance metrics and system behaviors under various scenarios, aiding in better design and implementation.
References (24)
- REFERENCES
- Jan Steffan, Ludger Fiege, Mariano Cilia Alejandro Buchman,"Scoping in Wireless Sensor Networks", 2nd workshop on middleware for pervasive and Ad-Hoc Computing Toronto, Canada,2004 ACM 1- 58113-951-9.
- Chris karlof, Naveen Sastry, David Wanger, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of the 2nd international conference on Embedded networked sensor systems,November 3-5, 2004, pages 162- 172,Baltimore, Maryland, USA. ISBN:1- 58113-879-2.
- Gunnar Gaubat, Jens-Peter Kaps, Berk Sunar, "Public Key Cryptography in Sensor networks-Revisited", Book Series Lecture Notes in Computer Science Pages 2-18, 11 january 2005.
- Naveen Sastry, David Wagner, "Security Consideration for IEEE802.15.4 Networks", WiSE"04, October 1, 2004 Philadelphia, Pennsylvania,USA.
- Cauligi S. Raghavendra,"PEGASIS: Power- Efficient Gathering in Sensor Information System", 2002 IEEE Aerospace Conference Proceedings -Volume 3, Big Sky, MT; UNITED STATES; 9-16 Mar. 2002. pp. 3- 1125 to 3-1130. 2002 2002.
- Siva D. Muruganathan, Daniel C.F. MA, Rolly I. Bhasin, Abraham O. Fapojuwo,"A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks", IEEE Communications Magazine. Vol. 43, no. 3, pp. S8-13. Mar. 2005.
- David Wagner, university of California "Resilient Aggregation in Sensor Networks", 2nd ACM workshop on Security of ad hoc and sensor networks, Pages 78-87, October 25 2004 Washington DC, USA.
- Xiao Chen, Jawad Drissi, "An Efficient Key Management Scheme in Hierarchical Sensor Networks", IEEE MASS 2005 Workshop- WSN05.
- Kirk H.M. Wong, Yuan Zheng, Jiannong Cao, Shengwei Wang," A Dynamic User Authentication Scheme for Wireless Sensor Networks", IEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing (SUTC"06), 2006.
- Jing Deng, Richard Han, Shivakant Mishra,"Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks", 5th international conference on Information processing in sensor networks, Pages 292-300, April 19-21, 2006.
- Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, "SPINS: Security Protocols for Sensor Networks", Department of Electrical Engineering and Computer Sciences, University of California, Berkley, 2002.
- Sencun Zhu, Sanjeev Setia, Sushil Jajodia,"LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", Aug. 2004, publish in ACM.
- Al-Sakib Khan Pathan, hyung-Woo Lee, Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges", Feb 20-22, 2006 ICACT2006.
- Woo Kwon Koo, Hwaseong Lee, Yong Ho kim, Dong Hoon Lee, "Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks", International Conference on Information Security and Assurance,2008. [15] Christian Herman and Waltenegus
- Dargie,"Senceive: A Middleware for a Wireless Sensor Network",22nd international
- Zhenwei Yu, Jeffrey J.P. Tsai "A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks", 2008 IEEE.
- Tutorial of NS2 http://www.isi.edu/nsnam/ns/tutorial/
- Online tutorials http://en.wikipedia.org/wiki
- Philip Levis, "TinyOS Programming ", june 28 ,2006
- Min Chen, Taekyoung Kwon, Yong Yuan and Victor C.M. Leung, "Mobile Agent Based Wireless Sensor Networks", Journal of computers, vol. 1, No. 1, APRIL2006.
- Yun Zhou," LLK: A Link-Layer Key Establishment Scheme for Wireless Sensor Networks", IEEE Communication Society / WCNC2005.
- Mohammad Ilyas and Imad Mahgoub, "Handbook of Sensor Networks: Compact Wireless and Wired Sensing System", CRC Press, London New York Washington, D.C.
- Beheshti,"A survey on Wireless Sensor Networks Security", 4 th International Conference: sciences of Electronic, Technologies of Information and Telecommunications, March 25-29, 2007, TUNISIA.