Security in wireless sensor networks : issues and challenges
2013
https://doi.org/10.1109/ICONSPACE.2013.6599495Abstract
Wireless Sensor Networks (WSNs) are employed in numerous applications in different areas including military, ecology, and health; for example, to control of important information like the personnel position in a building, as a result, WSNs need security. However, several restrictions such as low capability of computation, small memory, limited resources of energy, and the unreliable channels employ communication in using WSNs can cause difficulty in use of security and protection in WSNs. It is very essential to save WSNs from malevolent attacks in unfriendly situations. Such networks require security plan due to various limitations of resources and the prominent characteristics of a wireless sensor network which is a considerable challenge. This article is an extensive review about problems of WSNs security, which examined recently by researchers and a better understanding of future directions for WSN security.
References (46)
- Y. Wang, G. Attebury, et al. "A survey of security issues in wireless sensor networks." Computer Science and Engineering. Vol.8, no. 2. 2006.
- E. Shi and A. Perrig, "Designing Secure Sensor Networks," Wireless Commun. Mag., vol. 11, no. 6, pp. 38-43, Dec. 2004.
- N. Gura, A. Patel, et al. "Comparing elliptic curve cryptography and RSA on 8-bit CPUs." Cryptographic Hardware and Embedded Systems-CHES 2004, pp 925-943, 2004.
- Razzaque, M., S. Ahmad Salehi. Security and Privacy in Vehicular Ad- Hoc Networks: Survey and the Road Ahead. Wireless Networks and Security, Springer: 107-132, 2013.
- A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-34 , Sept. 2002,.
- H. Du, X. Hu, et al. "Energy efficient routing and scheduling for real- time data aggregation in WSNs." Computer communications. Vol.29, no. 17. 3527-3535 ,2006.
- Hung, X, L, et al. "An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge," Sensors, Vol 8. 2008, 7753-7782
- L. Jialiang, Valois, F.; Dohler, M.; Min-You Wu; , "Optimized Data Aggregation in WSNs Using Adaptive ARMA," Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, , pp.115-120, 18-25 July 2010.
- S. Zhu et al., "An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks," Proc. IEEE Symp. Security and Privacy, Oakland, CA, pp. 259-71, May 2004,.
- J. Ben-Othman, and B. Yahya. "Energy efficient and QoS based routing protocol for wireless sensor networks." Journal of Parallel and Distributed Computing 70(8), 849-857 2010.
- D.W. Carman, P.S. Krus, and B.J. Matt, "Constraints and approaches for distributed sensor network security", Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD, 2000.
- H. Alemdar, and C. Ersoy. "Wireless sensor networks for healthcare: A survey." Computer Networks 54(15) , 2688-2710, 2010.
- N. Wang, N. Zhang, et al. "Wireless sensors in agriculture and food industry-Recent development and future perspective." Computers and Electronics in Agriculture 50(1). , 1-14, 2006.
- K. Ren, S. Yu, et al. "Multi-user broadcast authentication in wireless sensor networks." Vehicular Technology, IEEE Transactions on 58(8). , 4554-4564, 2009.
- C. Gomez, and J. Paradells. "Wireless home automation networks: A survey of architectures and technologies." Communications Magazine, IEEE 48(6) , 92-101, 2010.
- L. B. Oliveira, D. F. Aranha, et al. "TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks." Computer communications 34(3), , 485-493, 2011.
- K. Sunitha, and H. Chandrakanth. "A Survey on Security Attacks in Wireless Sensor Network." International Journal of Engineering Research and Applications (IJERA) 2(4), pp.1684-1691, 2012.
- N. Nasser, and Y. Chen. "SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks." Computer communications 30(11-12), 2401-2412, 2007.
- I. F. Akyildiz, and X. Wang, et al. "Wireless mesh networks: a survey." Computer Networks 47(4), 445-487, 2005.
- K. Akkaya. and M. Younis. "A survey on routing protocols for wireless sensor networks." Ad hoc networks 3(3), , 325-349, 2005.
- I. F. Akyildiz, W. Su, et al. "Wireless sensor networks: a survey." Computer Networks 38(4) , 393-422, 2002.
- I. F. Akyildiz. and I. H. Kasimoglu. "Wireless sensor and actor networks: research challenges." Ad hoc networks 2(4) , 351-367, 2004.
- I. F. Akyildiz T. Melodia, et al. "A survey on wireless multimedia sensor networks." Computer Networks 51(4). 2007, 921-960.
- M. Hefeeda, and M. Bagheri. "Forest fire modeling and early detection using wireless sensor networks." Ad Hoc & Sensor Wireless Networks 7, , 169-224, 2009.
- K. Chris, S. Naveen, W. David, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks", Proceedings of 2nd international conference on Embedded networked sensor systems,November 3-5, 2004, pages 162172,Baltimore, Maryland, USA. ISBN:158113-879-2.
- G. Gunnar, K. Jens-Peter, S. Berk, "Public Key Cryptography in Sensor networks-Revisited", Book Series Lecture Notes in Computer Science Pages 2-18, 11 january 2005.
- H. M. Kirk. Wong, Z. Yuan, C. Jiannong, W. Shengwei," A Dynamic User Authentication Scheme for Wireless Sensor Networks", IEE International Conference on Sensor Networks Ubiquitous and Trustworthy Computing (SUTC 06), 2006.
- D. Jing, H. Richard, Shivakant Mishra,"Secure Code Distribution in Dynamically Programmable Wireless Sensor Networks", 5th international conference on Information processing in sensor networks, April 19-21, 2006, Pages 292-300.
- S. Naveen, W. David, "Security Consideration for IEEE802.15.4
- Networks", WiSE 04, October 1, 2004 Philadelphia, Pennsylvania,USA.
- C. Xiao, and Drissi, J., "An efficient key management scheme in hierarchical sensor networks," Mobile Adhoc and Sensor Systems Conference, 2005. IEEE International Conference on , 7-7 Nov. 2005, pp.-846
- A. S. K. Pathan, L. Hyung-Woo, S. H. Choong, "Security in wireless sensor networks: issues and challenges," Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference , vol.2, pp. 20-22, Feb. 2006
- K. K. Woo, L. Hwaseong, H. K. Yong, H. L. Dong, "Implementation and Analysis of New Lightweight Cryptographic Algorithm Suitable for Wireless Sensor Networks," Information Security and Assurance, 2008. ISA 2008. International Conference on , 24-26 April 2008, pp.73-76.
- M. Dohler. "Wireless sensor networks: the biggest cross-community design exercise to-date." Bentham Recent Patents on Computer Science 1(1). 2008,pp. 9-25.
- P. Yi, Y. Wu, et al. "A survey on security in wireless mesh networks." IETE Technical Review 27(1). 2010.
- Y. Zhang, X. Li, et al. "A Hierarchy-based Dynamic Key Management for Clustered Wireless Sensor Network." Energy Procedia 13. 2011, pp. 7967- 7974.
- F. Bao, R. Chen, et al. "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection." Network and Service Management, IEEE Transactions on 9(2). 2012, pp. 169-183.
- H. A. Farooqi, and F. A. Khan. "A survey of Intrusion Detection Systems for Wireless Sensor Networks." International Journal of Ad Hoc and Ubiquitous Computing 9(2). 2012, pp. 69-83.
- P. Kumar, and H. J. Lee. "Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey." Sensors 12(1). 2011, pp. 55-91.
- A. G. Fragkiadakis, E. Z. Tragos, et al. "Design and performance evaluation of a lightweight wireless early warning intrusion detection prototype." EURASIP Journal on Wireless Communications and Networking 2012(1). 2012.
- M. Al-Ameen, J. Liu, et al. "Security and privacy issues in wireless sensor networks for healthcare applications." Journal of Medical Systems 8(December) 2010, pp. 1988-1988.
- Pal, S., A. Mukhopadhyay, et al. "Defending Mechanisms Against Sybil Attack in Next Generation Mobile Ad Hoc Networks." IETE Technical Review 25(4). 2008: 209-220.
- K. Li, C. F. Lai, et al. "Energy efficiency routing with node compromised resistance in wireless sensor networks." Mobile Networks and Applications 17(1). 2012, pp. 75-89.
- B. Xiao, B. Yu, et al. "CHEMAS: Identify suspect nodes in selective forwarding attacks." Journal of Parallel and Distributed Computing 67(11). 2007, pp. 1218-1230.
- C. Jiang, X. Ren, "A Novel Random Key Algorithm in Wireless Sensor Networks," Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific -Asia Workshop on , vol.1, pp.687-691, 19-20 Dec. 2008.
- X. Zhang, J. He, et al. . "Secure and Energy-Efficient Routing for Wireless Sensor Networks." Journal of Networks 6 (9). 2011, pp. 1288-1295.