Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Security Threats on Wireless Sensor Network Protocols
Authors: H. Gorine, M. Ramadan Elmezughi
Abstract:
In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.Keywords: Malicious nodes, network security, soft encryption, threats, wireless sensor networks.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1339478
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1880References:
[1] A. D. Jadhad and P. Goswami, “Evaluating the performance of routing protocols in wireless sensor networks,” International Journal of Computer Technology and Electronics Engineering (IJCTEE), 2012, pp. 88-92.
[2] Culpepper, B.J. and Seng, H.C. (2004) “Sinkhole intrusion indicators in DSR MANETs,” Proceedings 1stInternational Conference on Broad Band Networks, 2004, pp.681–688.
[3] Douceur, J.R. (2002) “The Sybil Attack,” 1st International Workshop on Peer-To-Peer Systems (IPTPS’02), March 2002, LNCS 2429, pp.251–260.
[4] Hu, L. and Evans, D. (2004) “Using Directional Antennas to Prevent Wormhole Attacks,” Proceedings of the IEEE Symposium on Network and Distributed System Security (NDSS), 2004.
[5] Perring, A., Hu, L. and D.B. Johnson, D.B. (2003) “Packet Leashes: A Defence against wormhole attacks in wireless sensor networks,” Proceedings of 22nd Annual Conference of IEEE Computer and Communication Societies, Vol 3, April 2003, pp.1976–1986.
[6] Saleh, M. and Khatib, I. A. “Throughput Analysis of WEP Security in AdHoc Sensor Networks,” Proceedings, 2nd International Conference on Innovations in Information Technology (IIT05), Sept.26–28, Dubai, 2005.
[7] Singh, S.K., Singh, M.P. and Singh, D.K. “A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks,” International Journal of Computer Trends and Technology, May-June Issue, 2001.
[8] Wood, A. D. and Stankovic, J.A. (2002) “Denial of service in sensor networks,” IEEE ComputerMagazine, vol.5, no.10, Oct. 2002, pp.54–62.
[9] Zheng, J. and Jamalipour, A. (2009), Wireless Sensor Networks: Networking Perspective, published by John & Sons, Inc and IEEE, 2009.
[10] Haddad, I. F. & Gordon, D., 2002. Network Simulator 2: A Simulation Tool for Linux, Linux Journal. (Online) Available at: http://www.linuxjournal.com/article/5929 (Accessed 12 january 2016).
[11] Kavitha, T. &Sridharan, D., 2010. Security vulnerabilities in wireless sensor networks: A survey. Journal of information Assurance and Security, 5(1), pp. 31-44.
[12] Yu, Y., Li, K., Zhou, W. & Li, P., 2012. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), pp. 867-880.