A Literature Survey on Security Issues in Next Gen WSN

Authors

  • Beant Kaur Department of Computer Science Engineering/IT, DIET, Kharar, Punjab India
  • Ramanjot Kaur Department of Computer Science Engineering/IT, DIET, Kharar, Punjab India

DOI:

https://doi.org/10.26438/ijcse/v9i4.5659

Keywords:

WSN, Security, Authentication, Attacks, Next Gen WSN

Abstract

Next Gen WSN plays an important role in many fields like environment monitoring, transportation security, military, catastrophic area, health, medical, industry so on. However, the most noticeable feature of Next Gen WSN propagates various types of data such as text, image , videos. There are a lot of papers about Next Gen WSN and maximum papers have focused on how to save the energy of WSN. Saving energy in the form of batteries is challenging when integrating security mechanisms. For efficient secure mechanisms we conducted a survey in this paper and tried to find a solution through which we can propose an approach in which secure communication performs with low battery consumption.

References

[1] Akyildiz, Ian F., et al. "A survey on sensor networks." Communications magazine, IEEE 40.8 : 102-114, 2002.

[2] Ling, Chung-Huei, et al. "A Secure and Efficient One-time Password Authentication Scheme for WSN." International Journal of Network Security19.2 : 177-181, 2017.

[3] Tsuji, Takasuke, and Akihiro Shimizu. "One-time password authentication protocol against theft attacks." IEICE transactions on communications 87.3 : 523-529, 2004.

[4] Arampatzis, Th, John Lygeros, and Stamatis Manesis. "A survey of applications of wireless sensors and wireless sensor networks." Intelligent Control, 2005. Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation. IEEE, 2005.

[5] Tsudik, Gene. "Message authentication with one-way hash functions." INFOCOM`92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE. IEEE, 1992.

[6] Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006).

[7] Dogra, Heena, and Jyoti Kohli. "Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey." Indian Journal of Science and Technology 9.47 (2016).

[8] Lamport, Leslie. "Password authentication with insecure communication."Communications of the ACM 24.11 (1981): 770-772.

[9] SHABANA, K., FIDA, N., KHAN, F., JAN, S., REHMAN, M.. Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), North America, 5, jul. 2016.

[10] F. Büsching and L. Wolf, "The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink," in IEEE Internet of Things Journal, vol. 2, no. 1, pp. 63-71, Feb. 2015.

[11] V. P. Singh, M. Hussain and C. K. Raina, "Authentication of base station by HDFS using trust based model in WSN," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, pp. 1-5, 2016.

[12] G. W. Choi and I. Y. Lee, "A key distribution system for user authentication using pairing-based in a WSN," 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-4.

[13] S. S. Abd El dayem, M. R. M. Rizk and M. A. Mokhtar, "An efficient authentication protocol and key establishment in dynamic WSN," 2016 6th International Conference on Information Communication and Management (ICICM), Hatfield, 2016, pp. 178-182.

[14] A. H. Moon, U. Iqbal and G. M. Bhat, "Light weight Authentication Framework for WSN," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 3099-3105.

[15] P. Joshi, M. Verma and P. R. Verma, "Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN," 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2015, pp. 527-532.

[16] P. Banerjee, T. Chatterjee and S. DasBit, "LoENA: Low-overhead encryption based node authentication in WSN," 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, 2015, pp. 2126-2132.

[17] Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet. A Lightweight IoT Security Protocol. 1st Cyber Security in Networking Conference (CSNet2017), Oct 2017, Rio de Janeiro, Brazil.

[18] Armando, Alessandro, et al. "The AVISPA tool for the automated validation of internet security protocols and applications." International conference on computer aided verification. Springer, Berlin, Heidelberg, 2005.

Downloads

Published

2021-04-30
CITATION
DOI: 10.26438/ijcse/v9i4.5659
Published: 2021-04-30

How to Cite

[1]
B. Kaur and R. Kaur, “A Literature Survey on Security Issues in Next Gen WSN”, Int. J. Comp. Sci. Eng., vol. 9, no. 4, pp. 56–59, Apr. 2021.

Issue

Section

Survey Article