CFP last date
20 May 2024
Reseach Article

Security Issues and Remidies in Wireless Sensor Networks- A Survey

by Rohit Vaid, Vijay Katiyar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 4
Year of Publication: 2013
Authors: Rohit Vaid, Vijay Katiyar
10.5120/13731-1528

Rohit Vaid, Vijay Katiyar . Security Issues and Remidies in Wireless Sensor Networks- A Survey. International Journal of Computer Applications. 79, 4 ( October 2013), 31-39. DOI=10.5120/13731-1528

@article{ 10.5120/13731-1528,
author = { Rohit Vaid, Vijay Katiyar },
title = { Security Issues and Remidies in Wireless Sensor Networks- A Survey },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 4 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number4/13731-1528/ },
doi = { 10.5120/13731-1528 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:09.922676+05:30
%A Rohit Vaid
%A Vijay Katiyar
%T Security Issues and Remidies in Wireless Sensor Networks- A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 4
%P 31-39
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to significant advancement in wireless communication, wireless sensor networks (WSNs) have attracted great attention in recent years. WSNs are randomly deployed, battery operated autonomous systems consisting of large number of sensors nodes which are responsible for transmitting the real-time sensed data for a specific application in the monitoring area to the base station where it can be further processed and analyzed. However, due to wireless communication, the network is easily compromised. Solutions dedicated to wire networks are not suited in the resource constrained wireless network. There is still a scope for wide research potential in the field of wireless sensor network security. In this paper, we analyzed the issues related to security in WSNs and also highlight the research area in the field of wireless sensor networks.

References
  1. Md Abdul Azeem and Dr. Khaleel-ur-Rahman khan, A. V. Pramod, "Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks-Survey", in International Journal of Computer Science & Engineering Survey (IJCSES) Vol. 2, No. 4, November 2011.
  2. X Luo, Xu Ji and Myong-Soon Park, "Location privacy against traffic analysis attacks in wireless sensor networks", in International Conference on Information Science and Applications (ICISA), Vol. 1. Seoul, Korea, pp. 1–6, April 2010.
  3. Tamara Bonaci, Linda Bushnell and Radha Poovendran, "Node capture attacks in wireless sensor networks: a system theoretic approach", in 49th IEEE Conference on Decision and Control (CDC), Vol. 1. Atlanta, Georgia, USA, pp. 6765–6772, December 2010.
  4. Bhoopathy, V. and R. M. S. Parvathi, "Energy Constrained Secure Hierarchical Data Aggregation in Wireless Sensor Networks", in American Journal of Applied Sciences, ISSN 1546-9239, Vol. 9, No. 6, pp. 858-864, 2012.
  5. Alvaro Araujo, Javier Blesa, Elena Romero and Daniel Villanueva, "Security in cognitive wireless sensor networks - Challenges and open problems", in EURASIP Journal on Wireless Communications and Networking 2012, 2012:48, February 2012.
  6. Kalyani, P. and C. Chellappan. , "Enhanced RSA CRT for Energy Efficient Authentication to Wireless Sensor Networks Security", American Journal of Applied Sciences 9 (10): 1660-1667, ISSN 1546-9239, 2012.
  7. S. Prasanna and Srinivasa Rao, "An Overview of Wireless Sensor Networks Applications and Security", in International Journal of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Vol. 2, Issue-2, May 2012.
  8. Nanrun Zhou, Qiongxi Jiang and Xun Chen, "Identity-based Key Management Scheme with Provable Security for Wireless Sensor Networks", in Journal of Information & Computational Science Vol. 8, No. 14, pp. 3075- 3081, 2011.
  9. Yuexin Zhang, Li Xu and Xinyi Huang, "Polynomial-based Key Pre-distribution Scheme in Wireless Mesh Networks", in Journal of Computational Information Systems, Vol. 8, No. 6, pp. 2539–2549, 2012.
  10. Manjusha Pandey and Shekhar Verma, "Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN", in I. J. Computer Network and Information Security, pp. 21-29, 2012.
  11. Xiaokang Xiong, Duncan S. Wong and Xiaotie Deng, "TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks", in Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, IEEE explore Press, Sydney, DOI: 10. 1109/WCNC. 2010. 5506580, pp: 1-6, April 18-21, 2010.
  12. Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta and Sheueling Chang Shantz, "Energy analysis of public-key cryptography for wireless sensor networks" in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, 18Xplore Press, DOI: 10. 1109/PERCOM-2005, pp: 324-328, March 8-12, 2005.
  13. Haowen Chan, Adrian Perrig and Dawn Song, "Random key pre distribution schemes for sensor networks", in IEEE Symposium on Security and Privacy, Berkeley, California, ISSN: 1081-6011, Print ISBN: 0-7695-1940-7, pp. 197–213, 11-14 May 2003.
  14. Laurent Eschenauer and Virgil D. Gligor, "A key-management scheme for distributed sensor networks", in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 18–22, 2002.
  15. BLOM, R. , "An optimal class of symmetric key generation systems", in proceedings of EUROCRYPT 84 (Thomas Beth, Norbert Cot, and Ingemar Ingemarsson, Eds. ): Advances in Cryptology-EUROCRYPT'84, LNCS 209, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, pp. 335–338, 1985.
  16. Shih-I Huang and Shiuhpyng Shieh, "SEA: Secure Encrypted Data Aggregation in Mobile Wireless Sensor Networks", in Proceedings of the International Conference on Computational Intelligence and Security, IEEE Explore Press, Harbin, DOI: 10. 1109/CIS. 2007. 207, pp: 848-852, December 15-19, 2007.
  17. Chan, H. , A. Perrig and D. Song, "Secure hierarchical in-network aggregation in sensor networks", in Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM, Alexandria, VA, USA, DOI: 10. 1145/1180405. 1180440, pp: 278-287, Oct. 30-Nov. 03,2006.
  18. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: attacks and countermeasures", in Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, May 2003, pp. 113–127.
  19. Wood, Anthony D. and John A. Stankovic. "Denial of service in sensor networks. " Computer 35. 10 (2002): 54-62.
  20. Rohit Vaid and Vijay Kumar, "Pairing based Encoding Schemes (PBES) for Secure Wireless Sensor Networks", in International Journal of Computer Applications, Volume 70, No. 17, pp. 43-49, ISSN (Online): (0975 – 8887), May 2013.
Index Terms

Computer Science
Information Sciences

Keywords

WSNs Attack Security Constrains Requirements Sensor node Base Station Characteristics Forward Secrecy Backward Secrecy