• Corpus ID: 46533275

Secure Wireless Sensor Networks: Problems and Solutions

  title={Secure Wireless Sensor Networks: Problems and Solutions},
  author={Fei Hu and Jim Ziobro and Jason C. Tillett and Neeraj Kumar Sharma},
  journal={Journal on Systemics, Cybernetics and Informatics},
  • Fei Hu, J. Ziobro, N. Sharma
  • Published 1 August 2003
  • Computer Science
  • Journal on Systemics, Cybernetics and Informatics
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial… 

Figures from this paper

A Secure Lightweight Architecture for Wireless Sensor Networks

  • M. CollinsS. DobsonP. Nixon
  • Computer Science
    2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • 2008
A secure lightweight architecture that takes account of the constraints of sensor networks is proposed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary and supports the detection and isolation of aberrant nodes.

A lightweight secure architecture for wireless sensor networks

A secure lightweight architecture that takes account of the constraints of sensor networks is proposed that enables end-to-end communication between sensor nodes with the aid of intermediary nodes where necessary and supports the detection and isolation of aberrant nodes.

A Lightweight Security Framework for Wireless Sensor Networks

Experimental results prove that the proposed framework can achieve high degree of security with negligible overheads and takes into consideration the communication and computation limitations of sensor networks.

Secure Communication Schemes in Wireless Sensor Network

Wireless sensor networks have many potential applications for both civil and military tasks. However, sensor networks are susceptible to many types of attacks because they are deployed in open and

Securing Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs

A secure lightweight architecture (ASLAN) that takes account of the constraints of sensor networks is proposed, allowing end-to-end communication between sensor nodes and also supports identifying and isolating aberrant sensor nodes.

An Authentication Protocol for Sensor Networks Using Pairings

An authentication protocol for WSN is described with an estimation of costs on operations over the base field and a countermeasure against node impersonation and message’s injection is proposed.

Trusted Third Party Authentication Protocol Development for Clustered Wireless Sensor Networks

A combined security system for WSN that enhances the security of the network and it is energy consumption and combines three mechanisms, asymmetric, trusted third party, and pre-distribution to enhance its security.

Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector

The goal of this research is to develop a network that has efficient and flexible key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks as well as the network able to conserve energy.

Security Threats in Wireless Sensor Networks

  • H. SarmaA. Kar
  • Computer Science
    Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology
  • 2006
Different types of security threats possible for a sensor net setting are identified and effort has been made to model the threats mathematically.

Analysis of security mechanisms against Denial-of-Service attack in wireless sensor networks

The effects of DoS in WSN, effective security methods for achieving the security against this attack are explored, and two important types of doS attacks called jamming and reply attack are studied and possible solutions are recommended.




This document describes the sensor network constraints and key management approaches research for FY 2000, and examines both existing and NAI Labs-developed keying protocols for their suitability at satisfying identified requirements while overcoming battlefield energy constraints.

Denial of Service in Sensor Networks

To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.

Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks

This report presents a suit of fully distributed and localized protocols that facilitate practical deployment that supports ubiquitous security for mobile nodes, scales to network size, and is robust against adversary break-ins.

A secure routing protocol for ad hoc networks

This work details security threats against ad hoc routing protocols, specifically examining AODV and DSR, and proposes a solution to one, the managed-open scenario where no network infrastructure is pre-deployed, but a small amount of prior security coordination is expected.

A pairwise key pre-distribution scheme for wireless sensor networks

This paper proposes a new key pre-distribution scheme, which substantially improves the resilience of the network compared to the existing schemes, and exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that any nodes other than these compromised nodes are affected is close to zero.

Security for Sensor Networks

This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities.

Assessing Security-Critical Energy-Efficient Sensor Networks

This study has benchmarked some well-known cryptographic algorithms in search for the best compromise in security and energy-efficiency, on a typical sensor node, and proposes an assessment framework based on system profile.

Securing ad hoc networks

This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.

Secure routing for mobile ad hoc networks

The threat model for ad hoc routing is formulated and several specific attacks that can target the operation of a protocol are presented that can provide the basis for future research in this rapidly evolving area.

The quest for security in mobile ad hoc networks

An overview of security problems for mobile ad hoc networks is provided, distinguishing the threats on basic mechanisms and on security mechanisms and the solution to protect the security mechanisms is described.