Academia.eduAcademia.edu

Outline

Comparative Study of Security Attacks on Wireless Sensor Networks

2014

Abstract

Today, the growing interest for usage of ubiquitous services is a call for advanced researches in the emergence of 'Wireless sensor network (WSN)'. This is the key tool that supports various ultramodern applications. In every network security is the main challenge. The security measure for WSN is important dispute due to its unmonitored deployment nature and its inherent resources limitation. Wireless Sensor Network is sometime used in very sensitive fields such as healthcare, military and airports. Therefore the addressing of security issues of network is most challenging task. Due to limited resources of sensor nodes, the security in Wireless Sensor Network is more difficult to implement as compared to other traditional networks. Today huge research is going on in the field of security. Various techniques are now deployed to resolve the security issues. But still there is no appropriate corrected solution against some of them. This paper provides a comprehensive study of l...

References (20)

  1. A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, pp. 53-57, 2004.
  2. A.-S. K. P. and, H.-W. L. and, and C. S. Hong, "Security in Wireless Sensor Networks: Issues and Challenges," CoRR, vol. abs/0712.4169, p. 1043, 2007.
  3. D. B. and and T. Newe, "Securing Wireless Sensor Networks: Security Architectures," JNW, vol. 3, pp. 65-77, 2008.
  4. M. R. K. Amin Reza Sedghi, "Data Security via Public-Key Cryptography in Wireless Sensor Network," International Journal on Cybernetics & Informatics ( IJCI) vol. 2, 2013.
  5. A. Singla and R. Sachdeva, "Review on Security Issues and Attacks in Wireless Sensor Networks," International Journal, vol. 3, 2013.
  6. Q. I. Sarhana, "Security Attacks and Countermeasures for Wireless Sensor Networks: Survey," International Journal of Current Engineering and Technology, vol. 3, 2013.
  7. Y. Hao, L. Haiyun, Y. Fan, L. Songwu, and Z. Lixia, "Security in mobile ad hoc networks: challenges and solutions," Wireless Communications, IEEE, vol. 11, pp. 38-47, 2004.
  8. M. Saraogi, "SECURITY IN WIRELESS SENSOR NETWORKS," presented at the SenSys -Conference On Embedded Networked Sensor Systems.
  9. M. K. Jain, "Wireless sensor networks: Security issues and challenges," International Journal of Computer and Information Technology, vol. 2, pp. 62-67, 2011.
  10. S. Capkun and J. P. Hubaux, "Secure positioning in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, pp. 221-232, 2006.
  11. W. Stallings, Cryptography and Network Security: Principles and Practice: Prentice Hall Press, 2010.
  12. X. Wang, W. Gu, K. Schosek, S. Chellappan, and D. Xuan, "Sensor Network Configuration Under Physical Attacks," in Networking and Mobile Computing. vol. 3619, X. Lu and W. Zhao, Eds., ed: Springer Berlin Heidelberg, 2005, pp. 23-32.
  13. Anthony D. Wood and J. A. Stankovic., "Denial of service in sensor networks," Computer, vol. 35, pp. 54-62, 2002.
  14. M. Y. Malik, "An Outline of Security in Wireless Sensor Networks: Threats,Countermeasures and Implementations," CoRR, vol. abs/1301.3022, 2013.
  15. J. Sen, "Security and Privacy Challenges in Cognitive Wireless Sensor Networks," in Cognitive Radio Technology Applications for Wireless and Mobile Ad Hoc Networks, ed: IGI Global, 2013, pp. 194-232.
  16. S. P. Prabhudutta Mohanty, Nityananda Sarma, Siddhartha Sankar Satapathy, "SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY.," Journal of Theoretical & Applied Information Technology, vol. 13, pp. 14-27, 2010.
  17. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures," in Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on, 2003, pp. 113- 127.
  18. J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: analysis & defenses," presented at the Proceedings of the 3rd international symposium on Information processing in sensor networks, Berkeley, California, USA, 2004.
  19. M. Pooja , Dr. Yudhvir Singh, "Security Issues and Sybil Attack in Wireless Sensor Networks," International Journal of P2P Network Trends and Technology, vol. 3, 2013.
  20. A. Jain, K. Kant, and M. R. Tripathy, "Security Solutions for Wireless Sensor Networks," presented at the Proceedings of the 2012 Second International Conference on Advanced Computing & Communication Technologies, 2012.