A Survey on Wireless Sensor Network Security

Sen, Jaydip
July 2009
International Journal of Communication Networks & Information Se;Jul2009, Vol. 1 Issue 2, p59
Academic Journal
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.


Related Articles

  • Energy Efficient Key Management Protocol in Wireless Sensor Networks. Jinsu Kim; Junghyun Lee; Keewook Rim // International Journal of Security & Its Applications;Apr2010, Vol. 4 Issue 2, p1 

    Wireless sensor networks (WSNs) are a technology of various uses from monitoring surrounding environment to collecting data. Because WSNs operate with limited resources of sensor nodes, its life is extended by cluster-based routing methods. However, WSNs which communicate through a wireless...

  • EFFICIENT AND SECURE ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS -RESULTS AND DISCUSSIONS. GANESH, S.; AMUTHA, R. // Journal of Theoretical & Applied Information Technology;11/20/2013, Vol. 57 Issue 2, p191 

    Advances in Wireless Sensor Network Technology (WSN) has provided the availability of small and low-cost sensor with capability of sensing various types of physical and environmental conditions, data processing and wireless communication. One of the most challenging issues so far is the...

  • Security Threats in Wireless Sensor Networks in Each Layer. Sastry, Anitha S.; Sulthana, Shazia; Vagdevi, S. // International Journal of Advanced Networking & Applications;2013, Vol. 4 Issue 4, p1657 

    As the Wireless Sensor Networks (WSN) prove to be more beneficial in real-world applications. At the same time threatened by vulnerabilities. The threats faced by these WSN are similar but not limited to those observed in a simple network of computers or Internet. Attacks at all the layers of...

  • AN EFFECTUAL APPROACH TO MITIGATE ARP POISONING BASED MAN-IN-THE-MIDDLE ATTACKS. Kaur, Goldendeep; Singh, Jaideep // Far East Journal of Electronics & Communications;2016 Special Volume, Vol. 3, p273 

    With the expeditious evolution in the field of computer networks, the cases of network intrusions and exploitations have increased to a great extent. ARP spoofing attack, an appalling technique that makes use of ARP protocol's defaults to assault the network and thereby destroying the...

  • Five steps to securing wireless. Broderick, J. Stuart // Communications News;Nov2003, Vol. 40 Issue 11, p37 

    Presents ways to secure wireless fidelity systems of companies. Information on designing and planning wireless environment; Significance of enabling greater wired equivalent privacy encryption; Suggestions on changing the default service set identifier.

  • An Integrated Protocol for Maintaining Connectivity and Coverage under Probabilistic Models for Wireless Sensor Networks. Hefeeda, Mohamed; Ahmadi, Hossein // Adhoc & Sensor Wireless Networks;2009, Vol. 7 Issue 3/4, p295 

    We propose a distributed connectivity maintenance protocol that explicitly accounts for the probabilistic nature of wireless communication links. The proposed protocol is simple to implement and it achieves a given target communication quality between nodes, which is quantified by the minimum...

  • A lossy channel aware parameterisation of a novel security protocol for wireless IP-enabled sensors. Astorga, Jasone; Jacob, Eduardo; Toledo, Nerea; Aguado, Marina; Higuero, Marivi // Wireless Networks (10220038);May2015, Vol. 21 Issue 4, p1289 

    IP-enabled sensors can be globally addressable by any Internet-connected entity, and therefore, their protection presents different challenges than that of traditional sensors, as they are subject to any potential attacker in the Internet. For this reason, specific security protocols must be...

  • Swarm Flooding Attack against Directed Diffusion in Wireless Sensor Networks. Abuhaiba, Ibrahim S. I.; Hubboub, Huda B. // International Journal of Computer Network & Information Security;Nov2012, Vol. 4 Issue 12, p18 

    The objective of this paper is to study the vulnerabilities of sensor networks, design, and implement new approaches for routing attack. As one of the cornerstones of network infrastructure, routing systems are facing more threats than ever; they are vulnerable by nature and challenging to...

  • Secure Data Aggregation and Authentication Protocol for Wireless Sensor Networks. Latha, A.; Mariappan, Ramasamy // Advances in Computational Sciences & Technology;2011 Supplement 1, Vol. 4, p201 

    A Sensor network is composed of a large number of sensor nodes, which are vulnerable to many types of security attacks, including false data injection. Sensor nodes can be compromised by intruders, which distort the integrity of the data by injecting false data during both data aggregation and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics