Academia.eduAcademia.edu

Wireless Sensor Network Security

description846 papers
group19,407 followers
lightbulbAbout this topic
Wireless Sensor Network Security refers to the measures and protocols designed to protect wireless sensor networks from unauthorized access, data breaches, and various cyber threats. It encompasses strategies for ensuring data integrity, confidentiality, and availability within the network, addressing vulnerabilities specific to the unique characteristics of sensor nodes and their communication protocols.
lightbulbAbout this topic
Wireless Sensor Network Security refers to the measures and protocols designed to protect wireless sensor networks from unauthorized access, data breaches, and various cyber threats. It encompasses strategies for ensuring data integrity, confidentiality, and availability within the network, addressing vulnerabilities specific to the unique characteristics of sensor nodes and their communication protocols.

Key research themes

1. How do routing attacks manifest in wireless sensor networks and what detection techniques effectively mitigate them?

This theme explores the prevalence of routing attacks in wireless sensor networks (WSNs), their characteristics, mechanisms, and the corresponding detection methodologies. Due to WSNs’ decentralized architecture, constrained resources, and broadcast nature, routing protocols are particularly vulnerable to a variety of attacks that can severely degrade network performance and security. Understanding these attacks and developing robust detection frameworks is critical to ensuring network reliability and data integrity.

Key finding: This paper presents a comprehensive taxonomy of routing attacks in WSNs, classifying them into internal/external, physical/remote, and active/passive attacks, and systematically reviews 87 articles on detection techniques,... Read more
Key finding: The paper outlines key security requirements in WSNs related to routing, highlighting data confidentiality, integrity, availability, and authentication, and stresses the importance of secure routing protocols that prevent... Read more
Key finding: This work details the vulnerabilities specific to routing and network layers in WSNs caused by low processing power, memory constraints, and open deployment environments. It describes attack types including spoofing, Sybil,... Read more

2. What cryptographic and key management schemes are optimal for resource-constrained wireless sensor networks to enhance security?

This research focus addresses the design and evaluation of cryptographic protocols tailored to the limited energy, processing capability, and memory of sensor nodes in WSNs. It scrutinizes the trade-offs between public key cryptography and symmetric key schemes, key distribution protocols, and their impact on network resilience and scalability. Given the critical role of encryption in ensuring confidentiality, authentication, and data integrity, this theme develops guidelines for selecting and implementing security protocols suited to WSN constraints.

Key finding: The paper provides a detailed comparative analysis of cryptographic primitives for WSNs, highlighting that although public key cryptography (e.g., RSA, Diffie-Hellman) provides robust security, they are computationally... Read more
Key finding: This study implements AES encryption within WSNs to provide confidentiality of transmitted data, demonstrating that AES-192 with 10 rounds offers sufficient security with manageable computational overhead for sensor nodes. It... Read more
Key finding: This survey discusses protocols designed to preserve privacy and data integrity in WSNs through lightweight encryption techniques tailored to sensor limitations. Notably, it introduces heterogeneous and hybrid protocols for... Read more

3. How do secure routing architectures and protocol frameworks address diverse security threats in wireless sensor networks?

The theme investigates the design of comprehensive security architectures and secure routing protocols that collectively address multiple attack vectors in WSNs, including DoS, node capture, denial of service, and unauthorized access. It evaluates frameworks’ capability to provide confidentiality, integrity, authentication, availability, and resilience through layered protocol designs, trust models, and access controls, supporting secure operation even in hostile and resource-constrained environments.

Key finding: This paper surveys security architectures encompassing constraints, classification of attacks, and matching defensive measures, focusing on secure routing protocols. It highlights hierarchical and clusterbased routing models... Read more
Key finding: The paper presents a layered security analysis of WSNs and examines protocols like SPINS (featuring SNEP and µTESLA) and LEAP, which provide encryption, authentication, and data freshness through lightweight operations. It... Read more
Key finding: This work elaborates on the security threats at multiple layers in WSN, emphasizing Denial of Service (physical jamming, spoofing), Sybil and wormhole attacks, and illustrates countermeasures involving fault detection,... Read more

All papers in Wireless Sensor Network Security

In an era marked by hyperconnectivity and digital dependence, malicious websites have emerged as covert yet formidable threats to user privacy and data security. This paper critically examines the evolving architecture of spyware-laden... more
Packet sniffers are designed to intercept network traffic in shared communication channels. This is accomplished by re-configuring network interface cards to permit device drivers to process all network traffic, including packets that are... more
In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is... more
only propenies of the received signal, without using the decisions of the receiver to detennine the timing" These Bit synchronization techniques for the coherent de- circuits are generally simpler than data-aided bit synchro-... more
Due to their complexity and large attack surface, 5G networks pose threats and potential for cybersecurity. This paper examines these issues. The study seeks to uncover 5G network design cybersecurity challenges and assess new solutions.... more
Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently many WSNs applications rely on trusted communication to... more
In recent years, a wireless sensor network is gaining much more importance due to its immense contribution in numerous applications. Deployment of sensor nodes that would reduce computation, minimize cost and gaining high degree of... more
Kenya's rapid digitalization of government and educational services has increased their exposure to cyberattacks. There has been an increase in phishing, ransomware, and Distributed Denial of Service (DDoS) attacks, which are now... more
An essential component of the educational system is e-learning. this study delves into the potential risks and threats that e-learning systems face from unauthorized access by third parties and ways to protect data from unauthorized use,... more
Wireless Sensor Networks (WSN) are networks of typically small, battery-powered, wireless devices, equipped with on-board processing, communication, and sensing capabilities. Especially wireless sensor network suffers from excessive... more
Metering Infrastructure (AMI) networks. However, few works have studied the efficient use of public key cryptography certificates in such a network and most of them focus on certificates' revocation. In this paper, we extensively... more
The great qualities as well as fast data transfer through one location to the other using wireless technologies for communication is causing a rapid progress in this field. Security constitutes one of the biggest challenges in Wireless... more
Wireless Mesh Networking is an emerging technology in order to provide a possibility to build a network that can grow in terms of coverage to offer service access (i.e. internet access) for a large number of people with different needs.... more
Healthcare institutions require advanced technology to collect patients’ data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious... more
Redundant data retransmission problem in wireless sensor networks (WSNs) can be eliminated using the data aggregation process which combines similar data to reduce the resource-consumption and consequently, saves energy during data... more
In this work, we consider the general problem of distributed detection in the presence of Byzantines using wireless sensor networks. Instead of attempting to mitigate Byzantine attacks as a system designer, we investigate the issue from... more
In wireless sensor networks, sensor nodes are spread randomly over the coverage area to collect information of interest. Data fusion is used to process these collected information before they are sent to the base station, the observer of... more
Wireless sensor networks place sensors into an area to collect data and send them back to a base station. Data fusion, which fuses the collected data before they are sent to the base station, is usually implemented over the network. Since... more
The purpose of a wireless sensor network (WSN) is to provide the users with access to the information of interest from data gathered by spatially distributed sensors. Generally the users require only certain aggregate functions of this... more
Wireless sensor networks (WSNs) have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of WSNs are numerous and growing, which range from indoor deployment scenarios in the... more
As the Internet of Things (IoT) gradually emerges as the next step in the evolution of the Internet, it is important to identify the various potential domains of IoT applications and the research agenda associated with these applications.... more
This case study explores the experience of Tools and Solutions (T&S), a small business that encountered a devastating ransomware attack and successfully restored its operations through strategic resilience. Initially exposed due to... more
In wireless sensor networks for the Internet of Things (WSN-IoT), the topology deviates very frequently because of the node mobility. The topology maintenance overhead is high in flat-based WSN-IoTs. WSN clustering is suggested to not... more
Cortina is a distributed Real-Time Location System (RTLS) designed to track assets or people moving indoors. Our solution leverages a low-cost, low-power Wireless Sensor Network (WSN) based on the IEEE 802.15.4 radio standard. The... more
Advancements in information technology, and transfer of data online leading to the vulnerabilities and giving an invitation to cyber threats. Security and privacy are important issues in cloud storage and networking fields. Cloud... more
Radio frequency (RF) jamming is a denial of service attack targeted at wireless networks. In resource-hungry scenarios with constant traffic demand, jamming can create connectivity problems and seriously affect communication. Therefore,... more
Mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection methodology to identify abnormal node or malicious attackers. The proposed idea in this paper is to develop a new approach of... more
Wireless Sensor Networks (WSNs) are widely used in diverse applications due to their cost-effectiveness and versatility. However, they face substantial difficulties because of their innate resource constraints and susceptibility to... more
The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The... more
In this paper, we present a monitoring assisted robust routing scheme for wireless mesh networks which exploits the broadcast nature of wireless transmissions at special routers with added monitoring functionalities. These routers... more
With enterprise cloud-native environments growing, a single cluster of Kubernetes is rarely sufficient. Compliance mandates, latency management, regional availability, or service segregation all compel the use of multi-cluster Kubernetes... more
This study explores the role of Information and Communication Technology (ICT) in enhancing accessibility for special needs students at Kebbi State School for Special Needs. It investigates the current integration of educational... more
Ethical hacking and penetration testing are essential for identifying and mitigating security vulnerabilities in an era of increasing cyber threats. Traditional penetration testing methods, while effective, face challenges such as high... more
The study explored the extent to which cybercrime incidents affected the performance of a commercial bank in Uganda. The Specific objectives were: To determine the extent to which cybercrime activities affect bank profitability and to... more
Wireless networks have emerged as a fundamental component of modern communication systems, facilitating ubiquitous connectivity and data exchange. However, this convenience comes with an inherent vulnerability to security threats, ranging... more
In the modern digital era, organizations are increasingly dependent on information systems and technology to operate effectively. This reliance, however, comes with an inherent risk: cyberattacks. These attacks are growing both in... more
An important reason to protect provider and medical care patient information and data is digital terrorism. Patient health records and healthcare provider information are sensitive issues that can affect patients' health or even national... more
Wireless sensor networks (WSNs) have developed during the past twenty years as a result of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN technology sends the real-time sense information of a specific... more
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious... more
This paper explores the methodologies employed in the study of mobile and social media phishing, aiming to enhance the understanding of these evolving threats and develop robust countermeasures. By synthesizing existing research, we... more
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research challenges and various application domains. Today, WSN applications can be used in environmental detection, Monitoring system,... more
Wireless Sensor Networks (WSNs) are becoming widespread and pervasive, even in context where dependability and security of the deployed network could be crucial to critical and life-saving tasks. Due to the evolution rush experienced in... more
Amidst an unprecedented period of technological progress, incorporating digital platforms into diverse domains of existence has become indispensable, fundamentally altering the operational processes of governments, businesses, and... more
In today's increasingly digital and decentralized work environment, securing endpoints has become a critical concern for organizations aiming to protect sensitive data and maintain operational integrity. Distributed workforces, which rely... more
Cybersecurity is not an exception of the various fields that have been influenced by the advancement of artificial intelligence hence its evolution. Nevertheless, AI is also used by hackers for the increasing number, scale, and efficacy... more
As sensor networks are deployed in adversarial environments and used for critical applications such as battlefield surveillance and medical monitoring, security weaknesses become a big concern. The severe resource constraints of WSNs give... more
The difficulty with safety in Wireless Sensor Networks (WSNs) requires comprehensive, holistic security techniques that can offer a long-term solution. Quantum security is anticipated to assist in the overall security strategy for WSN... more
Download research papers for free!