Total views : 49

Security Issues in Wireless Sensor Networks

Affiliations

  • Yanbu University College Badr, Yanbu Al Sinaiyah, Yanbu Al Bahr – 46455, Saudi Arabia

Abstract


Objective: Wireless sensor networks are growing in popularity and in number of applications. They can be used in many areas such as health care, military, industrial processes, transportation, intelligent buildings, and many other applications. Methods/Statistical Analysis: Every WSN consists of very small nodes that act as data generators as well as network relays. Among other components, each node has one or more sensors which are designed and programmed to gather data from a physical phenomenon. Wireless sensor networks are, by nature, distributed systems. This means that every node in the deployment area has the ability to access the information shared in that area. Findings: Types of data transmitted through these networks are variants. Based on the type of data, different levels of security requirements are always needed. While looking for low-cost, diminished devices within a network is important, security must be taken in consideration as well. Applications: Due to the nature of deployment in Sensor networks being in public and hostile environment in many applications, the fact that these networks lack secure physical infrastructures compared to the traditional networks, and the nature of wireless communication between nodes, wireless sensor networks are highly vulnerable and more likely to be compromised when there is not enough security. This paper discusses the limitations in sensor networks and some other issues in wireless sensor networks, including the different security classes and the different kind of possible attacks.

Keywords

Network Attacks, Security, Wireless Sensor Networks, WSN

Full Text:

 |  (PDF views: 35)

References


  • Yang C, Tarng W, Hsieh K, Chen M. A Security Mechanism for Clustered Wireless Sensor Networks Based on Elliptic Curve Cryptography. IEEE SMC – eNewsletter; 2010.
  • Fleeger CP. Security in computing. 3rd edition. PrenticeHall Inc; NJ; 2003.
  • Undercoffer J, Avancha S, Joshi A, Pinkston J. Security for sensor networks. CADIP Research Symposium; 2002.
  • Karlof C, Wagner D. Secure routing in wireless sensor networks: Attacks and Countermeasures. Elsevier’s Ad Hoc Networks Journal. Special Issue on Sensor Network Applications and Protocols. 2003; 1(2-3):293–315.
  • Zhang H, Olariu S, Cao J, Johnson D. Mobile ad-hoc sensor networks. Third International Conference. Springer; Berlin, Germany; 2007. Crossref
  • Wagner D. Resilient aggregation in sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press; 2004. p. 78–87. Crossref
  • Zheng J, Jamalipour A. Wireless Sensor Networks: A Networking Perspective. John Wiley & Sons Publisher; Hoboken, NJ; 2009.
  • Hu C. International Journal of Future Generation Communication and Networking. 2016; 9(7).
  • Arunmozhi S, Venkataramani Y. International Journal of Computer Applications. 2011; 3(3).
  • Nunoo MH, Boateng K, Gadze J. International Journal of Network Security and its Applications. 2015; 109(11).
  • Padmavathi G, Shanmugapriya D. Journal of Computer Science and Information Security. 2009; 4(1&2).
  • Chelli K. Security Issues in Wireless Sensor Networks: Attacks and Countermeasures. Proceedings of the World Congress on Engineering; London, UK; 2015 Jul 1-3.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.