Chapter 17 Wireless Sensor Network Security : A Survey
@inproceedings{Walters2006Chapter1W, title={Chapter 17 Wireless Sensor Network Security : A Survey}, author={John Paul Walters and Zhengqiang Liang and Weisong Shi and Vipin Chaudhary}, year={2006} }
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. There is currently enormous…Â
18 Citations
Key management for wireless sensor network security
- Computer Science
- 2011
This thesis is an effort to develop a key management framework and specific schemes for WSNs by which different types of keys can be established and also can be distributed in a self-healing manner; explicit/implicit authentication can be integrated according to the security requirements of expected applications.
Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms
- Computer Science
- 2011
A lightweight ID system, called LIDeA, is developed, which follows an intelligent agent-based architecture, and it is demonstrated how such a system can be implemented, which components and interfaces are needed, and what is the resulting overhead imposed.
Authentication in Wireless Sensor Networks
- Computer Science
- 2018
Wireless Sensor Networking is a developing field of research that presents analysts with testing objectives under tight outline imperatives, since current security instruments are excessively asset serious as far as power, memory and preparing capacities of sensor organize hubs.
Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility
- Computer Science2008 IEEE International Conference on Communications
- 2008
This article describes the development of a novel access control system for WSN based on a distributed threshold scheme that gives support for mobility and limits the needed communication and consequent energy drain, which is a fundamental parameter for the lifetime of WSN.
An Energy-Efficient and Secure Hybrid Algorithm for Wireless Sensor Networks Using a Mobile Data
- Computer Science
- 2017
A new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches, is proposed to save energy of sensor nodes in a wireless sensor network (WSN) as these sensor nodes have limited energy.
An energy-efficient and secure hybrid algorithm for wireless sensor networks using a mobile data collector
- Computer ScienceDefense + Security
- 2017
A new hybrid algorithm for security, which incorporates both distributed and hierarchal approaches, is proposed to save energy of sensor nodes in a wireless sensor network (WSN) as these sensor nodes have limited energy.
Security in Monitoring Schemes: A Survey
- Computer ScienceArXiv
- 2014
This paper has discussed the components of monitoring, multiple monitoring schemes, their security parameters and various types of attacks possible on these monitoring components by manipulating assumptions of monitoring schemes.
A monitoring-based approach for WSN security using IEEE-802.15.4/6LowPAN and DTLS communication
- Computer ScienceInt. J. Auton. Adapt. Commun. Syst.
- 2019
A monitoring based approach for securing upper layer communications of WSN (Wireless Sensor Networks), the latter using IEEE802.15.4/6LowPAN and DTLS communication is feasible.
On Denial of Service Attacks for Wireless Sensor Networks
- Computer Science
- 2012
The simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802.15.4 based OPNET simulative model for WSN under constant and varying intensity ofJamming attacks.
Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2011
This survey presents the current state of affairs in the formulation of theoretical models for adversarial interference in sensor networks and the different algorithmic remedies developed by the research community, with a particular focus on jamming adversaries and Byzantine faults.
References
SHOWING 1-10 OF 92 REFERENCES
Security in wireless sensor networks
- Computer ScienceWirel. Commun. Mob. Comput.
- 2008
This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05
- Computer Science
- 2005
The ease with which nodes can be compromised is demonstrated as well as exactly what information can be obtained and how it can be used to disrupt, falsify data within, or eavesdrop on sensor networks.
Denial of Service in Sensor Networks
- Computer ScienceComputer
- 2002
To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.
Security and Privacy in Sensor Networks
- Computer ScienceComputer
- 2003
The miniature wireless sensor nodes developed from low-cost off-the-shelf components at the University of California, Berkeley, as part of its smart dust projects, establish a self-organizing sensor network when dispersed into an environment.
TinySec: a link layer security architecture for wireless sensor networks
- Computer ScienceSenSys '04
- 2004
TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.
Security for Sensor Networks
- Computer Science
- 2004
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.
Secure aggregation for wireless networks
- Computer Science2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.
- 2003
This work presents a protocol that provides a secure aggregation mechanism for wireless networks that is resilient to both intruder devices and single device key compromises, and takes advantage of the properties of wireless networking, as well as the power asymmetry between the devices and the base station.
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
- Computer Science
- 2000
This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.
The Sybil attack in sensor networks: analysis & defenses
- Computer ScienceThird International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004
- 2004
It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
INSENS: Intrusion-tolerant routing for wireless sensor networks
- Computer ScienceComput. Commun.
- 2006