Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks

@inproceedings{Lpez2009AnalysisOS,
  title={Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks},
  author={Javier L{\'o}pez and Rodrigo Rom{\'a}n and Cristina Alcaraz},
  booktitle={FOSAD},
  year={2009}
}
As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can influence the security mechanisms. This paper offers both an overview and an analysis of the relationship between the different security threats, requirements, applications, and security technologies. Besides, it also overviews some of the existing sensor network standards, analyzing their security mechanisms. 
Wireless Sensor Network Security for Cyber-Physical Systems
TLDR
This chapter reviews the existing literature and discusses the security issues related to WSN and the challenges in addressing them.
An advanced Study on Cryptography Mechanisms for Wireless Sensor Networks
TLDR
This paper presents an illustration of different attacks and vulnerabilities in WSN, and describes and analyzes security requirement, countermeasures based on cryptography mechanisms in literature, and presents possible directions in future research.
Improving the Resilience of Wireless Sensor Networks Against Security Threats: A Survey and Open Research Issues
TLDR
The safety of and threats to each WSN communication layer are reviewed and the importance of trust and reputation, and the features related to these, are highlighted, to address the safety vulnerabilities in WSNs.
Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks
TLDR
An overview of the particularities, constraints, attacks, challenges and current security mechanisms of UWSNs is presented and challenging, open and hot research topics are outlined.
A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems
  • C. Alcaraz, Javier López
  • Computer Science
    IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
  • 2010
TLDR
A set of threats and potential attacks in their routing protocols are identified and a set of recommendations and countermeasures are provided to help Industry protect its infrastructures.
Security in Wireless Sensor Networks: an Overview
TLDR
This seminar paper surveys the security aspects of Wirel ess Sensor Networks (WSN) and three security solutions for WSNs are covered: TinySec solution based on TinyOS, ContikiSec based on Contiki OS and ZigBee security, which is platform independent.
WSN Security Mechanisms for CPS
TLDR
The chapter is structured as such to provide classification of layer-to-layer, external and internal attacks to wireless sensor network and cyber-physical system.
A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN
TLDR
A new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced is proposed and evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.
Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
TLDR
This paper tackles the question of whether the devices of a WSN should be completely integrated into the Internet or not from the perspective of security and focuses on the issues that take place at the network level.
...
...

References

SHOWING 1-10 OF 75 REFERENCES
Integrating wireless sensor networks and the internet: a security analysis
TLDR
By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely and it is possible to develop a secure sensor network that can provide its services to internet hosts with certai...
An application-driven perspective on wireless sensor network security
TLDR
It is argued that the WSN security research generally considers mechanisms that are modeled after and evaluated against abstract applications and WSN organizations, and that an effective solution for WSNs must be sensitive to the application and infrastructure.
Secure time synchronization protocols for wireless sensor networks
TLDR
The most commonly used time synchronization algorithms are reviewed and evaluated based on factors such as their countermeasures against various attacks and the types of techniques used.
Secure routing in wireless sensor networks: attacks and countermeasures
  • Chris Karlof, D. Wagner
  • Computer Science
    Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • 2003
TLDR
This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Comprehensible security synthesis for wireless sensor networks
TLDR
A framework that first devises feasible security setups based on the characteristics of the envisioned application and second provides a security evaluation of theses possibilities from which the application designer is able to choose the fitting setup for his application is proposed.
Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses
TLDR
This survey of denial-of-service threats and countermeasures considers wireless sensor platforms' resource constraints as well as the denial- of-sleep attack, which specifically targets the energy-efficient protocols unique to sensor network deployments.
Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks
TLDR
This project evaluates different physical attacks against sensor node hardware and details about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.
Secure data aggregation in wireless sensor networks: A comprehensive overview
Investigation of feasible cryptographic algorithms for wireless sensor network
  • K. Choi, Jong-In Song
  • Computer Science
    2006 8th International Conference Advanced Communication Technology
  • 2006
TLDR
The RC4 and MD5 turned out to be most suitable algorithms for a wireless sensor network utilizing MICAz-type motes in terms of the total cryptographic processing time used.
Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios
TLDR
This paper describes in detail a procedure (the KMS Guidelines), developed under the CRISIS project, that allows network designers to choose a certain Key Management System, or at least to know which protocol need to improve in order to satisfy the network requirements.
...
...