• Corpus ID: 16619658

Security of Wireless Sensor Network

  title={Security of Wireless Sensor Network},
  author={Jinat Rehana},
Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN into that constrained environment. However, security is crucial to the success of applying WSN. So, familiarity with the security aspects… 

Security For Wireless Sensor Network

The security of wireless sensor network and attack at different layered architecture of WSN and their prevention is given and many type of security threats or attacks are given.

Secured and energy efficient architecture for sensor networks

A Secure and energy efficient architecture that takes account of the constraints of sensor networks is proposed and a hierarchical network topology is formed that enables end-to-end communication between sensor nodes and the architecture also supports the detection and isolation of malicious nodes.

Distributed Wormhole Attack Mitigation Technique in WSNs

This paper proposes a trust-based wormhole attack mitigation technique that is easy with no further hardware demand and no tight clock synchronization, and the most stress of this analysis work is to mitigate the worm hole attack.

Intrusion Resilient Concealed Data Aggregation in Wireless Sensor Networks

The results prove that IRCDA performs better than most of the existing techniques in providing security to the process of data aggregation, and is the first work which remains secure even after compromising many sensor nodes and base station though not simultaneously.

A secure anonymous on-demand routing protocol to defend wormhole attack in Vehicular Adhoc Network

Vehicular Ad-Hoc Network is a sub class of MANETs (Mobile Ad-Hoc Networks). It`s a technology that provide secure driving environment by wireless communication between the vehicles. The technique of

Trustworthy Ubiquitous Computing

The goal of this book is to provide a state the art of Trustworthy Ubiquitous Computing to address recent research results and to present and discuss the ideas, theories, technologies, systems, tools, applications and experiences on all theoretical and practical issues.


En this articulo, se revisa the construccion of un prototipo de sistema de seguridad usando ECC para la firma digital de datos (ECDSA = Elliptic Curve Digital Signature Algorithm) usando un control logico basado en redes definidas por software (SDN = Software Defined Networking) for el control of funcionalidades basicas.



Research on the Security in Wireless Sensor Network

This paper proposes various security requirements with regard to Wireless Sensor Network (WSN) and points out its development direction based on the analysis and remark of problems remaining unsolved in WSN.

Wireless Sensor Network Security: A Survey

This work surveys the major topics in wireless sensor network security, and presents the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures.

Security in wireless sensor networks

This paper surveys the state of art in securing wireless sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection.

How to Secure a Wireless Sensor Network

  • Yee Wei LawP. Havinga
  • Computer Science
    2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing
  • 2005
A guidelines according to which WSN security can be implemented in practice is proposed by proposing a comprehensive framework that attempts to tie the bits and pieces together to ease the implementors' adoption of the technologies.

Secure Multipath Routing Protocol for Wireless Sensor Networks

  • N. NasserYunfeng Chen
  • Computer Science
    27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07)
  • 2007
A new routing protocol called SEER is proposed: secure and energy-efficient multipath routing protocol that surpasses the Directed diffusion protocol in terms of throughput, control overhead and network lifetime.

SPINS: Security Protocols for Sensor Networks

This paper presents a model that works on SPINS security building blocks because Sensor network works in very resource constraint environment and only SP INS security protocol can fulfill those requirements of the proposed model.

TinySec: a link layer security architecture for wireless sensor networks

TinySec is introduced, the first fully-implemented link layer security architecture for wireless sensor networks, and results on a 36 node distributed sensor network application clearly demonstrate that software based link layer protocols are feasible and efficient, adding less than 10% energy, latency, and bandwidth overhead.

Routing Security in Sensor Network : HELLO Flood Attack and Defense

This work adopt a probabilistic secret sharing protocol where secrets shared between two sensor nodes are not exposed to any other nodes and incorporates these secrets with bidirectional verification and multipath routing to multiple base stations to defend against HELLO flood attacks.

The Sybil attack in sensor networks: analysis & defenses

It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.

Denial of Service in Sensor Networks

To identify denial-of-service vulnerabilities, the authors analyzed two effective sensor network protocols that did not initially consider security and demonstrate that consideration of security at design time is the best way to ensure successful network deployment.