WSN – An Emerging Technology and its Security Meaures

Authors

  • Abidin S Department of Information Technology, HMRITM (GGSIP University), Delhi, India

DOI:

https://doi.org/10.26438/ijcse/v6i9.260264

Keywords:

WSN, Network Security, Cryptography, Confidentiaity, Authenicity, Blackhole, Jammming.

Abstract

Wireless Sensor Network (WSN) is one of the merging network technologies. It is an extensively distributed network equipped with low powered and lightweight wireless sensor nodes. WSN are being deployed to monitor system and environment. WSN are being used in health sectors, military operations, automation industries, traffic monitoring, oil refineries etc. But with the emerging applications, WSN is prone to attacks and threats. These attacks and threats must be studied thoroughly in order to counter them. Today security issues are the major challenges faced by WSN. The deployment of wireless sensor nodes in hostile environments makes them the subject of lethal attacks, also due to the limitations of resources processing capability, power consumption & communication range WSN are vulnerable to many types of threats/attacks. There are serious consequences if security of WSN gets compromised by any means such as information theft, lack of privacy, etc. Thus it must be our utmost priority to save WSNs from malicious attacks. In this study we have highlighted the various fatal attacks that can destruct WSN with their impacts and consequences.

References

[1] Al-Sakib Khan Pathan ,Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, Proc. ICACT 2006, Volume 1, 20-22 Feb, 2006, pp. 1043-1048.

[2] N. Gura, A. Patel, et al. "Comparing elliptic curve cryptography and RSA on 8-bit CPUs." Cryptographic Hardware and Embedded Systems-CHES 2004, pp 925-943, 2004.

[3] Hung, X, L, et al. “An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge,” Sensors, Vol 8. 2008, 7753-7782.

[4] L. Jialiang, Valois, F.; Dohler, M.; Min-You Wu; , "Optimized Data Aggregation in WSNs Using Adaptive ARMA," Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, , pp.115-120, 18-25 July 2010.

[5] RobertSzewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN 04), January 2004.

[6] Kalpana Sharma, M.K. Ghose, Deepak Kumar, Raja Peeyush Kumar Singh,Vikas Kumar Pandey. “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”. In IJAST, Vol 7, April 2010.

[7] Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst, R.M., "Analyzing interaction between distributed denial of service attacks and mitigation technologies", Proc. DARPA Information Survivability Conference and Exposition, Volume 1, 22-24 April, 2003, pp. 26 - 36.

[8] Douceur, J. "The Sybil Attack", 1st International Workshop on Peer-to-Peer Systems (2002).

[9] Hu, Y.-c., Perrig, A., and Johnson, D.B., "Packet leashes: a defense against wormhole attacks in wireless networks", Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, 30 March-3 April 2003, pp. 1976 - 1986.

[10] Sheela D. Naveen K,C and Mahadevan G, A non cryptographic method of sink hole attack detectionin wireless sensor networks, Recent Trends in Information Technology (ICRTIT), 2011 International Conference IEEE.

[11] Hamid, M. A., Rashid, M-O., and Hong, C. S., “Routing Security in Sensor Network: Hello Flood Attack and Defense”, to appear in IEEE ICNEWS 2006.

[12] Choong Seon Hong. "Security in wireless sensor networks: issues and challenges", 2006 8th International Conference Advanced Communication Technology, 2006.

[13] Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, Wang Liangmin, “Lightweight Defense Scheme against Selective Forwarding Attacks in Wireless Sensor Networks’ pp 226-232, IEEE 2009.

[14] Ahmad Salehi, S., M.A. Razzaque, Parisa Naraei, and Ali Farrokhtala. "Security in Wireless Sensor Networks: Issues and challanges", 2013 IEEE International Conference on Space Science and Communication (IconSpace), 2013.

Downloads

Published

2018-09-30
CITATION
DOI: 10.26438/ijcse/v6i9.260264
Published: 2018-09-30

How to Cite

[1]
S. Abidin, “WSN – An Emerging Technology and its Security Meaures”, Int. J. Comp. Sci. Eng., vol. 6, no. 9, pp. 260–264, Sep. 2018.

Issue

Section

Research Article