Security in Wireless Sensor Networks
DOI:
https://doi.org/10.24297/jap.v1i1.2137Keywords:
Sensor, Security, Attack, Holistic, Challenge.Abstract
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
Downloads
References
Culler, D. E and Hong, W., ?Wireless Sensor Networks?, Communication of the ACM, Vol.47, No. 6, June 2004, pp. 30-33.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., ?Wireless Sensor Networks: A Survey?, Computer Networks, 38, 2002, pp. 393-422.
Dai, S, Jing, X, and Li, L, ?Research and analysis on routing protocols for wireless sensor networks?, Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411.
Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., ?A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks?, to appear in IEEE ICNEWS 2006.
Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., ?Security for Sensor Networks?, CADIP Research Symposium, 2002,
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., ?SPINS: Security Protocols for Sensor Networks?, Wireless Networks, vol. 8, no. 5, 2002, pp. 521-534.
Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., ?A Low-Energy Key Management Protocol for Wireless Sensor Networks?, Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 - 340.
Rabaey, J.M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M., and Tuan, T., ?PicoRadios for wireless sensor networks: the next challenge in ultra-low power design?2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp. 200 – 201.
Hollar, S, ?COTS Dust?, Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley, 2000.
Saleh, M. and Khatib, I. A., ?Throughput Analysis of WEP Security in Ad Hoc Sensor Networks?, Proc. The Second International Conference on Innovations in Information Technology (IIT’05), September 26-28, Dubai, 2005.
Kurak, C and McHugh, J, ?A Cautionary Note on Image Downgrading in Computer Security Applications?, Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, 1992, pp. 153-159.
Mokowitz, I. S., Longdon, G. E., and Chang, L., ?A New Paradigm Hidden in Steganography?, Proc. of the 2000 workshop on New security paradigms, Ballycotton, County Cork, Ireland, 2001, pp. 41 – 50.
Kim, C. H., O, S. C., Lee, S., Yang, W. I., and Lee, H-W., ?Steganalysis on BPCS Steganography?, Pacific Rim Workshop on Digital Steganography (STEG’03), July 3-4, Japan , 2003.
Younis, M., Akkaya, K., Eltoweissy, M., and Wadaa, A., ?On handling QoS traffic in wireless sensor networks?, Proc. of the 37th Annual Hawaii International Conference on System Sciences, 2004, 5-8 January, 2004, pp. 292 – 301.
Orihashi, M., Nakagawa, Y., Murakami, Y., and Kobayashi, K., ?Channel synthesized modulation employing singular vector for secured access on physical layer?, IEEE GLOBECOM 2003, Volume 3, 1-5 December, 2003, pp. 1226 – 1230
Zhou, L. and Haas, Z. J., ?Securing ad hoc networks?, IEEE Network, Volume 13, Issue 6, Nov.-Dec. 1999, pp. 24 – 30.
Strulo, B., Farr, J., and Smith, A., ?Securing Mobile Ad hoc Networks — A Motivational Approach?, BT Technology Journal, Volume 21, Issue 3, 2003, pp. 81 – 89.
Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., ?Security in Mobile Ad Hoc Networks: Challenges and Solutions?, IEEE Wireless Communications, Volume 11, Issue 1, February 2004, pp. 38 – 47.
Pathan, A-S. K., Alam, M., Monowar, M., and Rabbi, F., ?An Efficient Routing Protocol for Mobile Ad Hoc Networks with Neighbor Awareness and Multicasting?, Proc. IEEE E-Tech, Karachi, 31 July, 2004, pp. 97-100.
Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst, R.M., ?Analyzing interaction between distributed denial of service attacks and mitigation technologies?, Proc. DARPA Information Survivability Conference and Exposition, Volume 1, 22-24 April, 2003, pp. 26 – 36.
Wang, B-T. and Schulzrinne, H., ?An IP traceback mechanism for reflective DoS attacks?, Canadian Conference on Electrical and Computer Engineering, Volume 2, 2-5 May 2004, pp. 901 – 904.
Pfleeger, C. P. and Pfleeger, S. L., ?Security in Computing?, 3rd edition, Prentice Hall 2003.
Douceur, J. ?The Sybil Attack?, 1st International Workshop on Peer-to-Peer Systems (2002).
Newsome, J., Shi, E., Song, D, and Perrig, A, ?The sybil attack in sensor networks: analysis & defenses?, Proc. of the third international symposium on Information processing in sensor networks, ACM, 2004, pp. 259 – 268. [25] Culpepper, B.J. and Tseng, H.C., ?Sinkhole intrusion indicators in DSR MANETs?, Proc. First International Conference on Broad band Networks, 2004, pp. 681 – 688.
Karlof, C. and Wagner, D., ?Secure routing in wireless sensor networks: Attacks and countermeasures?, Elsevier's Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, September 2003, pp. 293-315.
Hu, Y.-C., Perrig, A., and Johnson, D.B., ?Packet leashes: a defense against wormhole attacks in wireless networks?, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, 30 March-3 April 2003, pp. 1976 – 1986.
Kulkarni, S. S., Gouda, M. G., and Arora, A., ?Secret instantiation in adhoc networks,? Special Issue of Elsevier Journal of Computer Communications on Dependable Wireless Sensor Networks, May 2005, pp. 1–15. [29] Du, W., Deng, J., Han, Y. S., and Varshney, P. K., ?A pairwise key pre-distribution scheme for wireless sensor networks?, Proc. of the 10th ACM conference on Computer and communications security, 2003, pp. 42-51
Downloads
Published
How to Cite
Issue
Section
License
All articles published in Journal of Advances in Linguistics are licensed under a Creative Commons Attribution 4.0 International License.