Challenges for Security in Wireless Sensor Networks (WSNs)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Challenges for Security in Wireless Sensor Networks (WSNs)

Authors: Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher

Abstract:

Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, computational power and lower memory. Researchers working in this area have proposed a number of security techniques for this purpose. Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks. This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.

Keywords: Wireless senor networks (WSNs), security, denial of service, black hole, cryptography, stenography.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1334423

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2930

References:


[1] N. Boudriga, A new scheme for mobility, sensing and security management in WSB" IEEE Annual simulation symposium (ANSS), 2006.
[2] J. Albath, S. Madaria, Practical Algorithms for Data Security (PADS) in wireless sensor networks Mobi-De 07, Beijing, China 2007.
[3] N. D. Vasumathyl, G. Velmathil, N.SkalavosII, On the Rijndael Encryption Algorithm Matalb Based implementation Department of Electronics and Communication Engineering, Sirsiva Subramania Nadar college of Engineering Tamalnadu, India, 2008.
[4] www.wikipedia.com ttp://en.wikipedia.org/wiki/Advanced Encryption Standard, Jan 2009.
[5] L. Tobarra, D. Cazorla, F. Cuartero, Formal Analysis of Sensor Network Encryption Protocol (SNEP) IEEE Internatonal Conference on Mobile Ad-hoc and Sensor Systems, MASS 2007, PISA, 8-11 Oct. 2007.
[6] S. Zhu, S. Setia, S. Jajodia, LEAP, Efficient Security Mechanism For Large Scale Distributed sensor Networks Proceeding of ACM Conference on Computer and Communication Security, (CSS,03) pp,62- 72, 2003.
[7] M. Sherin. M. Yousef, A. Baith. Mohamd, mark A. Mikial, An Enhanced Security Architecture For Wireless Sensor Network Recent Advances on Data Networks, Communications, Computers, ISBN-1790- 5109, Sep 2009.
[8] C. karlof, D. Wagner, Secure Routing in Wireless Sensor Networks, Attacks and Countermeasures Elsevier-s Ad-hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, pp, 293- 315, September 2003.
[9] B.J. Culpepper, H.C. Tseng, Sink hole intrusion indicators in DSR MANET-s Proceeding of International Conference Broad Band Networks. PP, 681-688, 2004.
[10] Blackrert, W.J. Gregg, D.M. Castner, A. k. Kyle, E.M. Home, Jokerst. R.M, Analyzing Interaction between Distributed Denial of service Attacks and Mitigation Technoologies Proceeding of International Conference information Survivability and Exposition, DARPA, pp, 26- 36, 22-24, April 2003.
[11] Wang. B.T, Schulzarinne.H, An IP Traceback Mechanism for Reflective DOS Attacks Canadian Conference on Electrical and Computer Engineering, pp, 901-904, 2-5, May 2004.
[12] Al-Sakib khan pathan, Hyung-Woo Lee, Choong Seon Hong, Security in Wireless Sensor Networks: Issues and Challenges International Conference ICACT-o6. 20-22 Feb, 2006.
[13] Douceur. J, The Sybil Attacks First International workshop on Peer to Peer Systems 2002.
[14] Newsome. J, Shi. E, Song. D, Perrig. A, The Sybil Attacks in sensor Networks Analysis and Defenses Proceeding of International Symposium on Information Processing in Sensor Networks, ACM, pp 269-268, 2004.
[15] Pfleeger C. P, Pleeger. S. L, security in Computing 3rd Edition Prentice Hall, 2003.
[16] Mona sharifnejad, Mohsen Sharifi, Mansoureh Ghiasabdai, S. Beheshti "A Survey on Wireless Sensor Networks Security" International Conference Science of Electronics, Technologies of Information and Telecommunication, Tunisia, March 25-29, 2007.
[17] B. Parno, A. Perrig, V. Gligor, Distributed Detection of Node Replication Attacks in Sensor Networks Proceeding of IEEE Symposium on Security and Privacy, May 2005.
[18] R. Anderson, M. Khun, Low Cost Attacks on Tamper Resistant Devices International Workshop on security Protocols, LNCS-1997-98.
[19] Yang Xaio Security in Distributed, Grid and Pervasive Computing Auerbach Publications, CRC Press 2006.
[20] H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang Security in Mobile Ad-hoc Networks: Challenges Solutions IEEE Wireless Communiaction, Vol- 11, pp 38-47, Feb 2004.
[21] K. Sharma, m. K. Ghose, D. Kumar, R. P. Kumar, V. K. pandy, A Comparative Study of various Security Approaches used in wireless Sensor Networks International Journal of Advanced Science and Technology. Vol-17, April, 2010.
[22] S. Capkun and J. P. Hubaux Secure Positioning in Wireless Networks IEEE Journal on selected Areas in Communication, pp, 221-232, 2006.
[23] Y. C. Hu., A. Perrig, D. B. Johnson, Packet Leashes. A Defense against Wormhole Attacks in Wireless Networks 22nd Annual Conference of IEEE Computer and Communication Societies, IEEE ONFOCOM 2003, pp, 1976-1986, 3 April, 2003.
[24] W. Du, J. Deng, S. Han, P. K. Varshney, A Pairwise Key Predistribution scheme for Wireless Sensor Networks Proceeding of ACM international Conference on Computer and Communication Security, pp, 42-51, 2003.
[25] Z. Karakehayov, Using REWARD, to Detect Team Balckhole Attacks in Wireless sensor Networks Workshop on Real world Wireless Sensor Networks, (REAL WSN, 05) Stockholm, Swedan, June 2005.
[26] C. Karlof, N. Sandy, D. Wagner, TinySec: A Link Layer Security Architecture for Wireless Sensor Networks In Proceeding. of the 2nd international conference on Embedded networked sensor systems, Baltimore, MD, USA, pp. 162-175, 2004.
[27] B. Przydatek, D. Song, A. Perrig, SIA: Secure information aggregation in Sensor Networks Proceedings of International conference on Embedded Networked Sensor Systems.-ACM,-pp.-255-265,-2003.
[28] L. F. van Hoesel, P. J. Havinga, A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks Reducing Preamble Transmissions and Transceiver State Switches," in INSS, June 2004.
[29] S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava, On Communication Security in Wireless Ad-hoc Sensor Networks 11th IEEE International Workshops on Enabling Technologies, Infrastructure for Collaborative Enterprises, pp.139-144, 10-12 June, 2002.
[30] Fan. Ye, H. Luo, Songwu. Lu. L. Zhang. Statistical en-route Filtering of injected False Data in Sensor Networks IEEE Journal on Selected Areas in Communications, Vol-23, (4), pp. 839-850, April 2005.
[31] T. Aura, P. Nikader, J. Leiwo. DoS Resistant Authentication with Client Puzzels In Revised Papers from 8th International Workshop on security Protocols, pages 170-177, Springer, Verlag, 2001.
[32] A.D. Wood, J. A. Stankovic Denial of Service in Sensor Network Computer, IEEE, Volume 35, pp.54-62, Oct, 2002.
[33] H. Zhu, F. Bao, R.H.Deng, k. Kim Computing of Trust in Wireless Networks In proceeding of IEEE International Conference on Vehicular Technology, Los Angles, California, September 2004.
[34] Z. Yan, P. Zhang, T. Virtanen Trust Evaluation Based Security Solution in Ad-hoc Networks Proceeding of 7th Nordic Workshop on Secure IT System, 2003.
[35] H. Chan, A. Perrig, and D. X. Song, Random key pre-distribution schemes for Sensor Networks in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2003.