scispace - formally typeset
Search or ask a question

Security issues in wireless sensor networks: A review

TL;DR: This paper studies the various security issues and security threats in WSNs, gives brief description of some of the protocols used to achieve security in the network and compares the proposed methodologies analytically.
Abstract: A wireless sensor network typically consists of large number of low-cost densely deployed sensor nodes that have strictly constrained sensing, computation, and communication capabilities. Because of resource restricted sensor nodes, it is necessary to reduce the amount of information transmission so that average lifetime of sensor and thus the bandwidth consumption are improved. As wireless sensor networks are typically deployed in remote and hostile environments to transmit sensitive data, sensor nodes are in danger of node compromise attacks and security issues like data confidentiality and integrity are terribly necessary. Therefore, in this paper we have explored general security threats in wireless sensor network and made an extensive study to categorize available data gathering protocols and analyze possible security threats on them.
Citations
More filters
Journal Article•DOI•
Jin-Yong Yu1, Euijong Lee1, Se-Ra Oh1, Young-Duk Seo1, Young-Gab Kim1 •
TL;DR: This study analyzed various factors related to WSNs security based on reviewing the literature, and derived and mapped the different security factors based on the literature and illustrated the relationships of each security factor.
Abstract: As WSNs combine with a diversity of next-generation technologies, wireless sensor networks (WSNs) have gained considerable attention as a promising ubiquitous technology. Even though several studies on WSNs are being undertaken, few systematically analyze the security issues relating to them. Moreover, recent systems tend to be implemented without sufficient consideration about owns security requirements, which can lead to lethal threats. Systems that do not consider security requirements may provide attackers the opportunity to reduce the overall efficiency and performance of the system. This means that inadequately applied security requirements can result in defective security of systems. Therefore, in this study, we emphasized the importance of security requirements to raise awareness regarding them. In addition, we analyzed literature that could be improved by including WSNs security requirements such as characteristics, constraints, and threats. Furthermore, we adopted a systematic methodology by referring to reliable literature and performed a different analysis from previous studies. We derived and mapped the different security factors based on the literature and illustrated the relationships of each security factor. Finally, our research compared with studies of a similar type to evaluate whether it provided a significant contribution. In other words, in this study, we analyzed various factors related to WSNs security based on reviewing the literature and show our contribution, such as a systematic analysis framework and factor mapping compared with traditional studies. Though there are some considerations, we expect that this research derived the essential security requirements in any WSNs environments.

35 citations


Cites background from "Security issues in wireless sensor ..."

  • ...Some of these studies [18], [12], and [24] analyzed the security requirements of each component (i....

    [...]

Journal Article•DOI•
TL;DR: The results show that the proposed scheme enhances security by detecting the sinkhole attacker node before the attack is even activated and consumes less energy compared with similar works due to the use of lightweight watermarking and authentication techniques.
Abstract: In a wireless sensor network, the sensors periodically transmit sensed data from a specific environment to a centralized station by wireless communication. Deployment in an open environment leads to the potential of security attacks. A sinkhole attack is a destructive attack aimed at the network layer, where the sinkhole node attracts other nodes by advertising itself as the best path to the base station. Subsequently receiving other sensor node packets and compromising network security. Hence, this work proposes a lightweight, secure method based on the Threshold Sensitive Energy Efficient Sensor Network protocol and watermarking techniques to ensure data integrity during transmission. The homomorphic encryption used in this scheme is to provide fast and efficient and consumes less energy while identifying sensor nodes for the purpose of sinkhole detection and prevention. The proposed work has been evaluated using OMNET++ simulation environment to measure the proposed work performance in the following metrics: delay, packet delivery ratio, throughput, and average energy consumption. Compared with previous works, the proposed work shows better results in these metrics. In addition, the proposed scheme consumes less energy compared with similar works due to the use of lightweight watermarking and authentication techniques. The results show that the proposed scheme enhances security by detecting the sinkhole attacker node before the attack is even activated. In addition, the proposed method ensures the integrity and authenticity of the sensed data while transmitting them from the sensor node until receiving it in the base station, and it can detect any tampering of the data.

22 citations


Cites background from "Security issues in wireless sensor ..."

  • ...In addition, the many-to-one communication style used in WSNs adds extra vulnerabilities, as all nodes transfer their data to the BS [5]....

    [...]

Journal Article•DOI•
TL;DR: The experimental results demonstrate that both the variants of EES-WCA are useful and classify seven different kinds of patterns, and the performance of network quality of services such as packet delivery rate, throughput, end to end delay, and energy consumption confirm the superiority of the EES -WCA algorithm.
Abstract: The Wireless Sensor Network (WSN) is an application-centric network, where the data is collected using sensor nodes and communicated to the server or base station to process raw data and to obtain the decisions. For this, it is essential to maintain efficiency and security to serve critical applications. To deal with this requirement, most of the existing techniques modify the routing techniques to secure the network from one or two attacks, but there are significantly fewer solutions that can face multiple kinds of attacks. Therefore, this paper proposed a data-driven and machine learning-based Energy Efficient and Secure Weighted Clustering Algorithm (EES-WCA). The EES-WCA is a combination of EE-WCA and machine learning-based centralized Intrusion detection system (IDS). This technique first creates network clusters, then, without disturbing the WSN routine activity, collect traffic samples on the base station. The base station consists of two machine learning models: Support Vector Machine (SVM) and Multi-Layer Perceptron (MLP) to classify the traffic data and identify the malicious nodes in the network. This technique is validated through the generated traffic from the NS2.35 simulator and is also examined in real-time scenarios. The experimental results demonstrate that both the variants of EES-WCA are useful and classify seven different kinds of patterns. According to the simulation results on validation test data, we found up to 90% detection accuracy. Additionally, in real-time scenarios, it replicates the performance by approximately 75%. The performance of EES-WCA in terms of network quality of services such as packet delivery rate, throughput, end to end delay, and energy consumption confirm the superiority of the EES-WCA algorithm.

17 citations

Journal Article•DOI•
TL;DR: A new key management protocol for group based communications for non hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP based multicast protocol, which establishes confidentiality, integrity, and authentication, using solely symmetric key based operations.
Abstract: This paper presents a new key management protocol for group-based communications in non-hierarchical wireless sensor networks (WSNs), applied on a recently proposed IP-based multicast protocol. Confidentiality, integrity, and authentication are established, using solely symmetric-key-based operations. The protocol features a cloud-based network multicast manager (NMM), which can create, control, and authenticate groups in the WSN, but is not able to derive the actual constructed group key. Three main phases are distinguished in the protocol. First, in the registration phase, the motes register to the group by sending a request to the NMM. Second, the members of the group calculate the shared group key in the key construction phase. For this phase, two different methods are tested. In the unicast approach, the key material is sent to each member individually using unicast messages, and in the multicast approach, a combination of Lagrange interpolation and a multicast packet are used. Finally, in the multicast communication phase, these keys are used to send confidential and authenticated messages. To investigate the impact of the proposed mechanisms on the WSN, the protocol was implemented in ContikiOS and simulated using COOJA, considering different group sizes and multi-hop communication. These simulations show that the multicast approach compared to the unicast approach results in significant smaller delays, is a bit more energy efficient, and requires more or less the same amount of memory for the code.

15 citations

Journal Article•DOI•
21 Aug 2020-Sensors
TL;DR: The proposed security system, based on the scaler distribution of a novel electronic device, the intrusion detection system (IDS), reduces the computational functions of the sensors and therefore maximizes their efficiency and eliminates the problem of security holes that may occur while adopting such a security technique.
Abstract: Following the significant improvement of technology in terms of data collection and treatment during the last decades, the notion of a smart environment has widely taken an important pedestal in the science industry. Built in order to better manage assets, smart environments provide a livable environment for users or citizens through the deployment of sensors responsible for data collection. Much research has been done to provide security to the involved data, which are extremely sensitive. However, due to the small size and the memory constraint of the sensors, many of these works are difficult to implement. In this paper, a different concept for wireless sensor security in smart environments is presented. The proposed security system, which is based on the scaler distribution of a novel electronic device, the intrusion detection system (IDS), reduces the computational functions of the sensors and therefore maximizes their efficiency. The IDS also introduces the concept of the feedback signal and "trust table" used to trigger the detection and isolation mechanism in case of attacks. Generally, it ensures the whole network security through cooperation with other IDSs and, therefore, eliminates the problem of security holes that may occur while adopting such a security technique.

11 citations

References
More filters
Proceedings Article•DOI•
04 Jan 2000
TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.
Abstract: Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our findings that the conventional protocols of direct transmission, minimum-transmission-energy, multi-hop routing, and static clustering may not be optimal for sensor networks, we propose LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transmitted to the base station. Simulations show the LEACH can achieve as much as a factor of 8 reduction in energy dissipation compared with conventional outing protocols. In addition, LEACH is able to distribute energy dissipation evenly throughout the sensors, doubling the useful system lifetime for the networks we simulated.

12,497 citations

Book•
19 Aug 1998
TL;DR: The new edition of William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
Abstract: William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues.

3,787 citations


"Security issues in wireless sensor ..." refers background in this paper

  • ...Attacks on the computer system or network may be generally classified [39] as interruption, interception, modification...

    [...]

Proceedings Article•DOI•
09 Mar 2002
TL;DR: PEGASIS (power-efficient gathering in sensor information systems), a near optimal chain-based protocol that is an improvement over LEACH, is proposed, where each node communicates only with a close neighbor and takes turns transmitting to the base station, thus reducing the amount of energy spent per round.
Abstract: Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an energy efficient manner is critical to operate the sensor network for a long period of time. In W. Heinzelman et al. (Proc. Hawaii Conf. on System Sci., 2000), a data collection problem is defined where, in a round of communication, each sensor node has a packet to be sent to the distant base station. If each node transmits its sensed data directly to the base station then it will deplete its power quickly. The LEACH protocol presented by W. Heinzelman et al. is an elegant solution where clusters are formed to fuse data before transmitting to the base station. By randomizing the cluster heads chosen to transmit to the base station, LEACH achieves a factor of 8 improvement compared to direct transmissions, as measured in terms of when nodes die. In this paper, we propose PEGASIS (power-efficient gathering in sensor information systems), a near optimal chain-based protocol that is an improvement over LEACH. In PEGASIS, each node communicates only with a close neighbor and takes turns transmitting to the base station, thus reducing the amount of energy spent per round. Simulation results show that PEGASIS performs better than LEACH by about 100 to 300% when 1%, 20%, 50%, and 100% of nodes die for different network sizes and topologies.

3,731 citations


"Security issues in wireless sensor ..." refers background or methods in this paper

  • ...Few protocols returning beneath this class are LEACH [37], PEGASIS [22], TEEN [23], APTEEN [25], SOP [26], TREPSI [11], TCDGP [6], QCCA [4], TTDD [27], etc....

    [...]

  • ...For instance one in every classconscious protocol PEGASIS that is assessed as class-conscious protocol additionally uses location info for forming a sequence like path of the nodes....

    [...]

  • ...Few protocols returning beneath this class are LEACH [37], PEGASIS [22], TEEN [23], APTEEN [25], SOP [26], TREPSI [11], TCDGP [6], QCCA [4], TTDD [27], etc. 1) Doable attacks on class-conscious protocols In case of class-conscious routing, constellation could depend upon communication vary of the nodes, location info, distance between the nodes and remaining battery power....

    [...]

  • ...Existing information gathering protocol may be classified into four totally different classes supported the network structure and protocol operation: flat (Flooding [40], gossip mongering [40], Directed Diffusion [18], Rumor Routing [21], SPIN [20], Energy Aware Routing [24], etc), class-conscious (LEACH [37],PEGASIS[22], TEEN[23], QCCA[4], TREPSI[11], TCDGP[6], APTEEN[25], SOP[26], TTDD[27], etc), location (GAF[33], MECN [41], SMECN[34], GEAR[35], SPAN[28], etc) based mostly routing protocols and network flow or quality of service (QoS) aware routing (SAR[36], CEDAR[42], SPEED[5] etc)....

    [...]

Journal Article•DOI•
11 May 2003
TL;DR: This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Abstract: We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.

2,946 citations

Journal Article•
TL;DR: In this article, the authors proposed a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks by identifying nodes that are equivalent from a routing perspective and turning off unnecessary nodes, keeping a constant level of routing fidelity.
Abstract: We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and turning off unnecessary nodes, keeping a constant level of routing fidelity. GAF moderates this policy using application- and system-level information; nodes that source or sink data remain on and intermediate nodes monitor and balance energy use. GAF is independent of the underlying ad hoc routing protocol; we simulate GAF over unmodified AODV and DSR. Analysis and simulation studies of GAF show that it can consume 40% to 60% less energy than an unmodified ad hoc routing protocol. Moreover, simulations of GAF suggest that network lifetime increases proportionally to node density; in one example, a four-fold increase in node density leads to network lifetime increase for 3 to 6 times (depending on the mobility pattern). More generally, GAF is an example of adaptive fidelity, a technique proposed for extending the lifetime of self-configuring systems by exploiting redundancy to conserve energy while maintaining application fidelity.

2,829 citations