CFP last date
20 May 2024
Reseach Article

Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes

by Ulya Sabeel, Saima Maqbool, Nidhi Chandra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 64 - Number 16
Year of Publication: 2013
Authors: Ulya Sabeel, Saima Maqbool, Nidhi Chandra
10.5120/10718-5262

Ulya Sabeel, Saima Maqbool, Nidhi Chandra . Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes. International Journal of Computer Applications. 64, 16 ( February 2013), 19-28. DOI=10.5120/10718-5262

@article{ 10.5120/10718-5262,
author = { Ulya Sabeel, Saima Maqbool, Nidhi Chandra },
title = { Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 64 },
number = { 16 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 19-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume64/number16/10718-5262/ },
doi = { 10.5120/10718-5262 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:16:37.294423+05:30
%A Ulya Sabeel
%A Saima Maqbool
%A Nidhi Chandra
%T Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 64
%N 16
%P 19-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sensor networks have been regarded as one of the emerging technologies of the 21st century and have great future scope. They have been widely used in mission critical applications like military, health as well as civilian applications. The focus of this paper is on a security of sensor networks in various fields. Security is the major concern of a wireless sensor network especially in unattended areas. You will get a general introduction about wireless sensor networks in section I, section II explains the need for security in Wireless sensor networks, section III gives security challenges followed by section IV &V that give security and survivability requirements for a Wireless sensor network which follows attack categorization in section VI, followed by the security management schemes in section VII and finally conclusion in the last section VIII.

References
  1. "21 ideas for the 21st century," Business Week, pp. 78-167, Aug. 39, 1999.
  2. H. Karl and A. Willig, "Protocols and Architectures for Wireless Sensor Networks", John Wiley and Sons Ltd, the Atrium, Southern Gate, Chichester, West Sussex, England, 2005.
  3. D. Culler, D. Estrin, and M. Srivastava, "Overview of Sensor Networks", IEEE Computer, August 2004.
  4. K. Martinez, J. K. Hart, and R. Ong, "Environmental sensor networks", IEEE Computer Journal, Vol. 37 (8), 50-56, August 2004.
  5. A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk , and J. Anderson, "Wireless sensor networks for habitat monitoring", Proceedings of the 1st ACM International workshop on Wireless sensor networks and applications, Atlanta, Georgia, USA, 88-97, 2002.
  6. http://en. wikipedia. org/wiki/Sensor_Networks
  7. Akyildiz, I. F. , W. Su, Y. Sankarasubramaniam, E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, August, 102-114(2002).
  8. Hero Modares, Rosli Salleh, Amirhossein Moravejosharieh , "Overview of Security Issues in Wireless Sensor Networks" , 2011 Third International Conference on Computational Intelligence, Modelling & Simulation, , © 2011 IEEE
  9. Dirk Westhoff, Joao Girao, Amardeo Sarma , "Security Solutions for Wireless Sensor Networks"
  10. Dimitris M. Kyriazanos, Neeli R. Prasad, Charalampos Z. Patrikakis, "A Security, Privacy and Trust Architecture for Wireless Sensor Networks", 50th International Symposium ELMAR-2008, 10-12 September 2008, Zadar, Croatia
  11. A. Wood and J. Stankovic, "Denial of Service in Sensor Networks," IEEE Computer Mag. , vol. 35, no. 10, Oct. 2002, pp. 54–62
  12. Yi Qian and Kejie Lu, David Tipper, "A Design for secure and survivable wireless sensor networks", IEEE Wireless Communications • October 2007 © 2007 IEEE
  13. Chaudhari H. C. and Kadam L. U. , "Wireless Sensor Networks: Security, Attacks and Challenges", International Journal of Networking Volume 1, Issue 1, 2011
  14. http://www. thecourse. us/Students/Wireless_Sensor_Networks. htm
  15. W. Xu, et al. , "The feasibility of launching and detecting jamming attacks in wireless networks," 2005, pp. 46 57
  16. Madhukar Anand, Zachary Ives, Insup Lee, "Quantifying Eavesdropping Vulnerability in Sensor Networks" , Proceedings of the 2nd International VLDB Workshop on Data Management for Sensor Networks 2005 (DMSN 2005), pages 3-9. Copyright ACM, 2005
  17. Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges", International conference on Advanced Computing Technologies, Page1043-1045, year 2006
  18. Adrian Perrig, John Stankovic, David Wagner, "Security in Wireless Sensor Networks" Communications of the ACM, Page53-57, year 2004
  19. Pathan, A. S. K. ; Hyung-Woo Lee; Choong Seon Hong, "Security in wireless sensor networks: issues and challenges" Advanced Communication Technology (ICACT), Page(s):6, year 2006
  20. "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks", Dr. G. Padmavathi, Mrs. D. Shanmugapriya, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2
Index Terms

Computer Science
Information Sciences

Keywords

Attacks security security challenges security protocols Wireless Sensor Networks