Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks
@inproceedings{Lpez2009AnalysisOS, title={Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks}, author={Javier L{\'o}pez and Rodrigo Rom{\'a}n and Cristina Alcaraz}, booktitle={FOSAD}, year={2009} }
As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms.
114 Citations
Wireless Sensor Network Security for Cyber-Physical Systems
- Computer Science
- 2018
This chapter reviews the existing literature and discusses the security issues related to WSN and the challenges in addressing them.
An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks
- Computer ScienceArXiv
- 2016
This paper presents an illustration of different attacks and vulnerabilities in WSN, and describes and analyzes security requirement, countermeasures based on cryptography mechanisms in literature, and presents possible directions in future research.
Improving the Resilience of Wireless Sensor Networks Against Security Threats: A Survey and Open Research Issues
- Computer ScienceInternational Journal of Technology
- 2018
The safety of and threats to each WSN communication layer are reviewed and the importance of trust and reputation, and the features related to these, are highlighted, to address the safety vulnerabilities in WSNs.
Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks
- Computer ScienceSensors
- 2018
An overview of the particularities, constraints, attacks, challenges and current security mechanisms of UWSNs is presented and challenging, open and hot research topics are outlined.
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
- Computer ScienceIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
- 2010
A set of threats and potential attacks in their routing protocols are identified and a set of recommendations and countermeasures are provided to help Industry protect its infrastructures.
Security in Wireless Sensor Networks: an Overview
- Computer Science
- 2009
This seminar paper surveys the security aspects of Wirel ess Sensor Networks (WSN) and three security solutions for WSNs are covered: TinySec solution based on TinyOS, ContikiSec based on Contiki OS and ZigBee security, which is platform independent.
WSN Security Mechanisms for CPS
- Computer Science
- 2018
The chapter is structured as such to provide classification of layer-to-layer, external and internal attacks to wireless sensor network and cyber-physical system.
A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN
- Computer Science
- 2016
A new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced is proposed and evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
- Computer ScienceIWSEC 2010
- 2010
This paper tackles the question of whether the devices of a WSN should be completely integrated into the Internet or not from the perspective of security and focuses on the issues that take place at the network level.
References
SHOWING 1-10 OF 75 REFERENCES
Integrating wireless sensor networks and the internet: a security analysis
- Computer Science, BusinessInternet Res.
- 2009
By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely and it is possible to develop a secure sensor network that can provide its services to internet hosts with certai...
An application-driven perspective on wireless sensor network security
- Computer ScienceQ2SWinet '06
- 2006
It is argued that the WSN security research generally considers mechanisms that are modeled after and evaluated against abstract applications and WSN organizations, and that an effective solution for WSNs must be sensitive to the application and infrastructure.
Secure time synchronization protocols for wireless sensor networks
- Computer ScienceIEEE Wireless Communications
- 2007
The most commonly used time synchronization algorithms are reviewed and evaluated based on factors such as their countermeasures against various attacks and the types of techniques used.
Secure routing in wireless sensor networks: attacks and countermeasures
- Computer ScienceProceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
- 2003
This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Comprehensible security synthesis for wireless sensor networks
- Computer ScienceMidSens '08
- 2008
A framework that first devises feasible security setups based on the characteristics of the envisioned application and second provides a security evaluation of theses possibilities from which the application designer is able to choose the fitting setup for his application is proposed.
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
- Computer ScienceIEEE Pervasive Computing
- 2008
This survey of denial-of-service threats and countermeasures considers wireless sensor platforms' resource constraints as well as the denial- of-sleep attack, which specifically targets the energy-efficient protocols unique to sensor network deployments.
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
- Computer ScienceSPC
- 2006
This project evaluates different physical attacks against sensor node hardware and details about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.
Secure data aggregation in wireless sensor networks: A comprehensive overview
- Computer ScienceComput. Networks
- 2009
Investigation of feasible cryptographic algorithms for wireless sensor network
- Computer Science2006 8th International Conference Advanced Communication Technology
- 2006
The RC4 and MD5 turned out to be most suitable algorithms for a wireless sensor network utilizing MICAz-type motes in terms of the total cryptographic processing time used.
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
- Computer ScienceCRITIS
- 2006
This paper describes in detail a procedure (the KMS Guidelines), developed under the CRISIS project, that allows network designers to choose a certain Key Management System, or at least to know which protocol need to improve in order to satisfy the network requirements.