Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review
DOI:
https://doi.org/10.26438/ijcse/v6i10.436444Keywords:
WSNs, Attacks in WSN, Security ProtocolsAbstract
Wireless sensor network (WSN) is a wireless network with large number of sensor nodes or it could be defined as a set of distributed devices which could be used to monitor sensible and natural conditions. These sensors can execute processing and sensing tasks, and additionally equipped for communicating with each other. Because of the extensive area of its applications it became one of the premier research topics recently. The main objective of wireless sensor network is regularly to gather sensing data from all sensors to particular sink nodes (base stations) and after that performing additionally operations at these sink nodes. Currently wireless sensor networks are available as a subject at advanced undergrad and graduate levels at some universities around the world. One of the challenges in WSNs is to devise and implement high security protocols with limited resources. This paper debated the security issues; challenges and protocols that are discussed and reviewed on the basis of attributes (confidentiality, availability, freshness, encryption methods, MAC authentication, key management, attacks protected and scalability) and tabulated WSNs security protocols, on the basis of (authors, protocols, advantages, disadvantages and applications) based on researches done by the researchers.
References
[1] S. Misra, I. Woungang and S. C. Misra, “Guide toWireless Sensor Networks”, c Springer-Verlag London Limited, pp. 1, 2009
[2] J. Zheng and A. Jamalipour, “Wireless Sensor Networks A Networking Perspective”, A John Wiley & Sons, Inc., Publication, pp. xxiii-2, 2009
[3] C. S. Raghavendra, K. M. Sivalingam and T. Znati, “wireless sensor networks”, Kluwer academic publishers New York, Boston, Dordrecht, London, Moscow, pp. xiv, 2004
[4] M. U. Aftab, O. Ashraf, M. Irfan, M. Majid, A. Nisar and M. A. Habib, “A Review Study of Wireless Sensor Networks and Its Security”, Communications and Network, Vol. 7, No.4, pp.172-179, 2015
[5] Kahina Chelli, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering, London, U.K. (Vol. 1, pp. 1-3, 2015
[6] Murat Dener, “Security Analysis in Wireless Sensor Networks”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Vol.10, No.10, pp.303501, 2014
[7] David Martins and Herve Guyennet, “Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey”, pp. 313-320, 2010
[8] C. Dhivya Devi and B.Santhi, “Study on Security Protocols in Wireless Sensor Networks”, International Journal of Engineering and Technology, Vol.5, No.5, pp.200-207, 2013
[9] M. Revathi and Dr. B. Amutha, “A Survey on Security Protocols in Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, 2017
[10] R. Sharma, Y. Chaba and Y. Singh, “Analysis of Security Protocols in Wireless Sensor Network”, IJANA 2010
[11] Y. Bazband and K. Fahimi, “Performance Comparison Wireless Sensor Network Security Protocols: LLSP and TinySEC”, International Journal of Engineering Sciences and Research Technology, 2014
[12] A. S. Ahmed, “An Evaluation of Security Protocols on Wireless Sensor Network”, TKK –T Seminar of Internetworking, 2009
[13] L. E. Lighfoot, J. Ren and T. Li, “An Energy Efficient Link- Layer Security Protocol for Wireless Sensor Networks”, IEEE EIT 2007 proceedings, pp. 233-238, 2007
[14] J. Ren, T. Li and D. Aslam, “A Power Efficient Link-Layer Security Protocol LLSP for Wireless Sensor Networks”, Military Communications Conference, pp. 1002-1007, 2005
[15] C. Karlof, N. Sastry and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Baltimore, Maryland, USA, pp. 162-175, 2004
[16] L. Tobarra, D. Cazorla, F. Cuartero, G. Diaz and E. Cambronero, “Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP”, in wireless sensor and actor networks, Springer, Boston, MA, pp.95-106, 2007
[17] L. Krontiris, T. Dimitriou, H. Soroush and M. Salajegheh, “WSN Link-Layer Security Frameworks”, wireless sensor network security, Athens Information Technology, Greece, pp. 142, 2008
[18] A. Perrig, R. Szewczyk, J. D. Tygar, V.Wen and D. E. Culler, “SPINS: Security Protocols for Sensor Networks”, Kluwer Academic Publishers. Manufactured in Netherlands, Vol.8 No.5 pp.521-534, 2002
[19] K. M Pattani and P. J Chauhan, “SPIN Protocol for Wireless Sensor Network”, International Journal of Advance Research in Engineering, Science and Technology, 2015
[20] S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks”, Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, Vol. 2, No.4, pp.500-528, 2003
[21] D. Alsoufi, K. Elleithy, T. Abuzaghleh and A. Nassar, “Security in Wireless Sensor Networks-Improving the LEAP Protocol”, International Journal of Computer Science and Engineering Survey, 2012
[22] A. A. Andhale and Prof. B. N. Jagdale, “Light Weight Security Protocol for Wireless Sensor Networks (WSN)”, International Journal of Engineering Research and Technology, 2014
[23] K. Ren, W. Lou and Y. Zhang, “LEDS: Providing Location- Aware End-to-End Data Security in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 7, No.5, pp.585-598. 2008
[24] J. G. Ndia, “A Survey of Security Protocols for Wireless Sensor Networks”, International Journal of Applied Computer Science, 2017
[25] T. Park and K. G. Shin, “LiSP: A Lightweight Security Protocol for Wireless Sensor Networks”, ACM Transactions on Embedded Computing Systems, Vol. 3, No.3, pp.634-660, 2004
[26] A. Sharma, G. Tripathi, M. S. Khan and K. A. Kumar, “A Survey Paper on Security Protocols of Wireless Sensor Networks”, International Research Journal of Engineering and Technology, 2015
[27] M. Luk, G. Mezzour and A. Perrig, “MiniSec: A Secure Sensor Network Communication Architecture”, IPSN Cambridge, Massachusetts, IEEE USA, pp. 479-488). 2007
[28] E. Sharifi, M. Khandan and M. Shamsi, “MAC Protocols Security in Wireless Sensor Networks: A Survey”, International Journal of Computer and Information Technology, A survey 1, 2014
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
