scispace - formally typeset
Search or ask a question
Journal Article

Security Issues and Solutions in Wireless Sensor Networks

15 Mar 2017-International Journal of Computer Applications (Foundation of Computer Science (FCS), NY, USA)-Vol. 162, Iss: 2, pp 14-19
TL;DR: This paper presents the unique characteristics of wireless sensor networks and how they pose new security threats and describes the various attacks that are possible at important layers such as data-link, network, physical and transport layer.
Abstract: This paper focuses and talks about the wide and varied areas of applications wireless sensor networks have taken over today, right from military surveillance and smart home automation to medical and environmental monitoring. It also gives a gist why security is a primary issue of concern even today for the same, discussing the existing solutions along with outlining the security issues and suggesting possible directions of research over the same. This paper is about the security of wireless sensor networks. These networks create new security threats in comparison to the traditional methods due to some unique characteristics of these networks. A detailed study of the threats, risks and attacks need to be done in order to come up with proper security solutions. Here the paper presents the unique characteristics of these networks and how they pose new security threats. There are several security goals of these networks. These goals and requirements must be kept in mind while designing of security solutions for these networks. It also describes the various attacks that are possible at important layers such as data-link, network, physical and transport layer.

Content maybe subject to copyright    Report

Citations
More filters
Proceedings Article
01 Jan 2003
TL;DR: Three hardware platforms that addresses the needs of wireless sensor netwoks are presented that produces Operating system concepts for refining concurrency mechanisms and the full realization of the general architecture is represented.
Abstract: The Wireless sensor network play a vital role in collecting a Real – Time data, monitoring environmental conditions based on technology adoption. These sensor network is the combination of sensing, computation, and communication through a single tiny device. Here many tiny nodes assemble and configure themselves. It also controls actuators that extend control from cyberspace into the physical world. Here the sensor nodes communicate with the local peers rather than the high – power control tower or base station. Instead, of relying on a predeployed infrastructure, each individual sensor or actuator become part of the overall infrastructure. Here we have three hardware platforms that addresses the needs of wireless sensor netwoks. The operating system here uses an event based execution to support concurrency. The platform serves as a baseline and does not contain any hardware accelerators. . First platform serves as a baseline and it produces Operating system concepts for refining concurrency mechanisms. The second node validates the architectural designs and improve the communicational rates. The third node represents the full realization of the general architecture. Keywords— node, platform, concurrency.

371 citations

Journal ArticleDOI
01 Jan 2020
TL;DR: A novel technique focused on Security based Data Aware Routing Protocol (SDARP) for high data gathering, to attain balancing between security and energy metrices is proposed.
Abstract: Ad hoc sensor networks are the very popular network and play a vital role for producing high performance. In existing networks techniques has not perfectly balanced both energy and security in ad hoc sensor networks and gathering sensed information in an energy efficient manner is critical to operating the sensor network for a long period of time. In this research, we concentrate about security and network traffic issues. To over come this issues we have proposed a novel technique focused on Security based Data Aware Routing Protocol (SDARP) for high data gathering, to attain balancing between security and energy metrices. The security model contains two phases in first phase is here Optimal Cluster Head (OCH) is used to monitor the behavior of CH and cluster members. In second phase, security based energy efficient model is enhanced with data gathering algorithm to encrypt and decrypt with energy metrics. The proposed protocol is simulated using network simulation tool.

32 citations

Journal ArticleDOI
TL;DR: This survey reviews related work on Sinkhole attack detection, prevention strategies, and attack techniques and also highlights open challenges in dealing with such attacks.
Abstract: Wireless sensor networks (WSNs) consist of a large number of nodes, communicating sensor readings to the base stations through other nodes. Due to their energy limitations and positioning in hostile environments, WSNs are vulnerable to various routing attacks. From a security point of view in WSN, data authenticity, confidentiality, Integrity, and availability are the important security goals. It is in common practice that a security protocol used to be created by focusing a particular attack in WSN. Most renowned attacks in WSN are Sybil attack, Denial of Service attack, wormhole attack, selective attack, HELLO Flooding attack, Sinkhole attack etc. This survey focuses on one of the most challenging routing attacks, called Sinkhole attack. A Sinkhole attack is one of the sternest routing attacks because it attracts surrounding nodes with misleading routing path information and performs data forging or selective forwarding of data passing through it. It can cause an energy drain on surrounding nodes resulting in energy holes in WSNs and it can cause inappropriate and potentially dangerous responses based on false measurements. Researchers had presented several ways to detect and identify sinkhole attacks. This survey reviews related work on Sinkhole attack detection, prevention strategies, and attack techniques and also highlights open challenges in dealing with such attacks. Among many discussed techniques, fuzzy logic-based systems are considered to be good in performance in intruder detection system (IDS).

28 citations

Journal ArticleDOI
TL;DR: A secured lightweight cryptosystem is designed based on lookup table operations that reduce computational overhead, resource requirement and power consumption compared to traditional security mechanisms and yields security primacy in various areas of cryptography.
Abstract: Digital image communication over public networks requires a high level of security to protect picture elements that represent information. Security is an important and challenging issue that can be solved using cryptography techniques. Generally, image encryption techniques are based on multiple rounds and iterations. In this paper, a secured lightweight cryptosystem is designed based on lookup table operations that reduce computational overhead, resource requirement and power consumption compared to traditional security mechanisms. In this context, one-dimensional elementary cellular automaton has been combined with Henon chaotic map to design a cryptosystem, which can produce unprecedented results in cryptography. Initially, state attractors for rule space are investigated and analyzed in Wolfram’s cellular automata to extract the properties and functional abilities to perform cryptographic operations. A novel algorithm of keyed transposition cipher is applied to digital image in P-Box module to produce shuffled image. Then, the extracted properties of ECA are preserved in a tabular form and further used in the diffusion process. Based on the simulation and comparison with other existing mechanisms, it is evident that the proposed algorithm is promising and obstructive to all kinds of statistical attacks, and it yields security primacy in various areas of cryptography. Encryption/Decryption is based on indexed based lookup tables principal using ECA and can be easily implemented using logic gates. The proposed algorithm provides confidentiality and can be adopted in IoT networks that require lightweight cryptography modules. Experimental results of color and gray images demonstrate flourishing results in the real-time environment of cryptography.

23 citations

Journal ArticleDOI
01 Nov 2021
TL;DR: This paper will help researchers identify the most vulnerable attacks in the communication and defensive mechanisms to encounter the attacks in WSN to design effective countermeasures for secured communication.
Abstract: Wireless sensor network has attracted significant attention in research and development due to its tremendous applications in medical, military and defence, medical, environmental, industrial, infrastructure protection, and commercial applications to enable to interact with each other controlled remotely. A Wireless Sensor Network (WSN) has wide applications such as environmental monitoring and tracking of the target nodes for communication. The sensor nodes are equipped with wireless interfaces used for communication between the nodes and another network. Wireless Sensor Network suffers from many constraints that make security a primary challenge. When the sensor node is deployed in a communication environment unattended, the nodes are vulnerable to various attacks. This paper deals with the different types of Active and Passive security attacks in Wireless Sensor Networks to design effective countermeasures for secured communication. This paper will help researchers identify the most vulnerable attacks in the communication and defensive mechanisms to encounter the attacks in WSN.

23 citations

References
More filters
Journal ArticleDOI
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Abstract: The advancement in wireless communications and electronics has enabled the development of low-cost sensor networks. The sensor networks can be used for various application areas (e.g., health, military, home). For different application areas, there are different technical issues that researchers are currently resolving. The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections. This article also points out the open research issues and intends to spark new interests and developments in this field.

14,048 citations

Proceedings ArticleDOI
04 Jan 2000
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Abstract: Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our findings that the conventional protocols of direct transmission, minimum-transmission-energy, multi-hop routing, and static clustering may not be optimal for sensor networks, we propose LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base station. Simulations show the LEACH can achieve as much as a factor of 8 reduction in energy dissipation compared with conventional outing protocols. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks we simulated.

12,497 citations

Journal ArticleDOI
TL;DR: A survey of routing protocols for Wireless Sensor Network is given and their strengths and limitations are compared.
Abstract: Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.

582 citations

Proceedings Article
01 Jan 2003
TL;DR: Three hardware platforms that addresses the needs of wireless sensor netwoks are presented that produces Operating system concepts for refining concurrency mechanisms and the full realization of the general architecture is represented.
Abstract: The Wireless sensor network play a vital role in collecting a Real – Time data, monitoring environmental conditions based on technology adoption. These sensor network is the combination of sensing, computation, and communication through a single tiny device. Here many tiny nodes assemble and configure themselves. It also controls actuators that extend control from cyberspace into the physical world. Here the sensor nodes communicate with the local peers rather than the high – power control tower or base station. Instead, of relying on a predeployed infrastructure, each individual sensor or actuator become part of the overall infrastructure. Here we have three hardware platforms that addresses the needs of wireless sensor netwoks. The operating system here uses an event based execution to support concurrency. The platform serves as a baseline and does not contain any hardware accelerators. . First platform serves as a baseline and it produces Operating system concepts for refining concurrency mechanisms. The second node validates the architectural designs and improve the communicational rates. The third node represents the full realization of the general architecture. Keywords— node, platform, concurrency.

371 citations


"Security Issues and Solutions in Wi..." refers background in this paper

  • ...It is a major problem in the highly crowded network [12]....

    [...]

  • ...So, the links between sensors may not be symmetric [4][12][13][14]....

    [...]

01 Jan 2001
TL;DR: The trade-offs associated with adding detail to simulation models for protocol design are described and visualization techniques that can help pinpoint incorrect details and manage detail overload are suggested.
Abstract: Experience with wired networks has provides guidance about what level of detail is appropriate for simulation-based protocol studies Wireless simulations raise many new questions about appropriate levels of detail in simulation models for radio propagation and energy consumption This paper describes the trade-offs associated with adding detail to simulation models We evaluate the effects of detail in fi ve case studies of wireless simulations for protocol design Ultimately the researcher must judge what level of detail is required for a given question, but we suggest two approaches to cope with varying levels of detail When error is not correlated, networking algorithms that are robust to a range of errors are often stressed in similar ways by random error as by detailed models We also suggest visualization techniques that can help pinpoint incorrect details and manage detail overload

219 citations