Security in wireless sensor networks

@article{Giruka2008SecurityIW,
  title={Security in wireless sensor networks},
  author={V. C. Giruka and M. Singhal and J. Royalty and Srilekha Varanasi},
  journal={Wirel. Commun. Mob. Comput.},
  year={2008},
  volume={8},
  pages={1-24}
}
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make-up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone… Expand
Wireless Sensor Network Security: A Survey
TLDR
This work surveys the major topics in wireless sensor network security, and presents the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures. Expand
A STUDY OF SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS
Wireless Sensor Networks (WSN) is a recent advanced technology of computer networks and electronics. The WSN increasingly becoming more practicable solution to many challenging applications. TheExpand
Chapter 17 Wireless Sensor Network Security : A Survey
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattendedExpand
Research on Wireless Sensor Network Security
TLDR
A thorough analysis of the major security issue in wireless sensor networks is made and the ongoing aspect of further development to designers in their struggle to implement the most cost effective and appropriate method of securing their network is presented. Expand
Secure Data in Wireless Sensor Network By Using DES
TLDR
Encryption Algorithm like - DES is implemented to provide sufficient levels of security for protecting the confidentiality of the data in the WSN network to address security concerns of sensor networks. Expand
Secure Multipath routing in Wireless Sensor Networks
Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed inExpand
Protocols Security for Wireless Sensor Networks
As wireless sensor networks are growing fast so they need for effective security mechanisms as well. Sensor networks interact with sensitive data and operate in a hostile unattended environment,Expand
An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations
TLDR
This chapter provides the basics of information security with special emphasis on WSNs, and gives an overview of the information security requirements in these networks. Expand
A Study on Threats in Wireless Sensor Networks
Wireless Sensor Networks are networked systems, characterized by several energy resources, and the security mechanisms are actually used to detect, prevent and recover from the security attacks. InExpand
An Engineering Approach for Secure Wireless Sensor Networks
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattendedExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 48 REFERENCES
Secure sensor networks for perimeter protection
TLDR
A new lightweight security model that operates in the base station mode of sensor communication, where the security model is mindful of the resource constraints of sensor networks is proposed. Expand
Security in Sensor Networks
TLDR
This issue of it will extensively cope with the issue of security in sensor network applications and features a total of five articles, organized in three thematic blocks which cover important areas of the subject. Expand
Enhancing Base Station Security in Wireless Sensor Networks
TLDR
This paper considers strategies for securing the sensor network against a variety of threats that can lead to the failure of the base station, which represents a central point of failure. Expand
Secure routing in wireless sensor networks: attacks and countermeasures
TLDR
This work proposes security goals for routing in sensor networks, shows how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensors, and introduces two classes of novel attacks against sensor networks sinkholes and HELLO floods. Expand
Denial of Service in Sensor Networks
TLDR
To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment. Expand
Securing ad hoc networks
TLDR
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework. Expand
INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02
TLDR
An INtrusion-tolerant routing protocol for wireless SEnsor NetworkS that tolerates intrusions by bypassing the malicious nodes and a prototype implementation in the ns2click simulator is presented to demonstrate and assess INSENS's tolerance to malicious attacks launched by intruder nodes in random places. Expand
SPINS: security protocols for sensor networks
TLDR
A suite of security building blocks optimized for resource-constrained environments and wireless communication, and shows that they are practical even on minimal hardware: the performance of the protocol suite easily matches the data rate of the network. Expand
A key-management scheme for distributed sensor networks
TLDR
A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes. Expand
Energy efficient security protocol for wireless sensor networks
TLDR
The energy-efficient security protocol proposed in this paper uses symmetric cryptographic algorithms to support security, and the session key is changed dynamically, in addition to employing code-hopping technique in non-blocking OVSF codes. Expand
...
1
2
3
4
5
...