Security in Wireless Sensor Networks

@article{Sen2013SecurityIW,
  title={Security in Wireless Sensor Networks},
  author={Jaydip Sen},
  journal={ArXiv},
  year={2013},
  volume={abs/1301.5065}
}
  • Jaydip Sen
  • Published 21 January 2013
  • Computer Science
  • ArXiv
Wireless sensor networks have attracted a lot of interest over the last decade in wireless and mobile computing research community. Applications of these networks are numerous and growing, which range from indoor deployment scenarios in the home and office to outdoor deployment in adversary's territory in a tactical battleground. However, due to distributed nature and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their… 

Figures and Tables from this paper

A Hybrid Secure Scheme for Wireless Sensor Networks against Timing Attacks Using Continuous-Time Markov Chain and Queueing Model
TLDR
Through tradeoff analysis, it is shown that the proposed scheme can enhance the security of WSNs, and the optimal rekeying rate of the performance and security tradeoff can be obtained.
WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks
TLDR
A specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks and Artificial Neural Network (ANN) has been trained on the dataset to detect and classified different DoS attacks.
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
  • M. Heigl, M. Schramm, Dalibor Fiala
  • Computer Science
    2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
  • 2019
TLDR
A future-proof lightweight and resource-aware security concept for sensor networks with a processing stage permeated filtering mechanism is proposed to mitigate a special kind of Denial-of-Service attack performed on CC1350 LaunchPad ARM Cortex-M3 microcontroller boards.
An overview of Wireless Sensor Networks towards internet of things
  • Mustafa Kocakulak, I. Butun
  • Computer Science
    2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC)
  • 2017
TLDR
A detailed overview of wireless sensor network (WSN) is presented and a review of WSN applications and IoT applications are provided.
Security Property Validation of the Sensor Network Encryption Protocol (SNEP)
TLDR
This paper validated the security properties of SNEP by using an automated security protocol validation tool, named AVISPA, using the protocol specification language, HLPSL, to model two combined scenarios—node to node key agreement and counter exchange protocols—followed by data transmission.
Wireless Body Area Network Security and Privacy Issue in E-Healthcare
TLDR
An overview of WBAN, how they utilized for healthcare monitoring, its architecture then major security and privacy requirements and assaults at different network layer in a WBAN are highlighted, various cryptographic algorithms and laws are talked about for providing solution of security and Privacy in WBAN.
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
TLDR
A Threshold Attendance Protocol (TAP) that keeps the number of DISABLED nodes below a predefined threshold is sought, based on Shamir secret sharing, and its correctness, optimizations and efficiency are discussed.
Security Issues in Internet of Things: Principles, Challenges, Taxonomy
TLDR
The survey in this paper reviewed and analyzed security principles, attacks and countermeasures at different layers of IoT-layered architecture, considering the bottlenecks of IoT systems.
...
...

References

SHOWING 1-10 OF 180 REFERENCES
Security in wireless sensor networks
TLDR
This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.
Routing Security Issues in Wireless Sensor Networks: Attacks and Defenses
TLDR
The focus of this chapter is on routing security in WSNs, where the defender has the liabilities of insecure wireless communication, limited node capabilities, and possible insider threats, and the adversaries can use powerful laptops with high energy and long range communication to attack the network.
Security in wireless sensor networks
TLDR
The state of the art in research on sensor network security is surveyed, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply.
A survey of security issues in wireless sensor networks
TLDR
This article outlines the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs, and presents a holistic view of security issues, classified into five categories: cryptography, key management, secure routing, secure data aggregation, and intrusion detection.
A Secure Routing Protocol for Wireless Sensor Networks
TLDR
A secure routing mechanism for wireless sensor networks that is resilient in the presence of malicious nodes that may launch selective packet dropping attack on the routing path, and more efficient than some of the existing similar schemes.
Security and Privacy in Sensor Networks
TLDR
The miniature wireless sensor nodes developed from low-cost off-the-shelf components at the University of California, Berkeley, as part of its smart dust projects, establish a self-organizing sensor network when dispersed into an environment.
Secure routing in wireless sensor networks: attacks and countermeasures
  • Chris Karlof, D. Wagner
  • Computer Science
    Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • 2003
TLDR
This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods.
Designing secure sensor networks
TLDR
The authors discuss issues and consider mechanisms to achieve secure communication in wireless sensor networks and suggest careful decisions and trade-offs among various security measures.
Security support for in-network processing in Wireless Sensor Networks
TLDR
This paper addresses the challenges associated with securing in-network processing within WSNs, and proposes a collection of mechanisms for delegating trust to aggregators that are not initially trusted by individual sensor nodes.
A survey on sensor networks
TLDR
The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
...
...