CFP last date
22 April 2024
Reseach Article

Wireless Sensor Networks: An Overview on its Security Threats

Published on None 2010 by Kalpana Sharma, M K Ghose
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 1
None 2010
Authors: Kalpana Sharma, M K Ghose
8c0aff33-77a3-4805-813e-cefb891ca036

Kalpana Sharma, M K Ghose . Wireless Sensor Networks: An Overview on its Security Threats. Mobile Ad-hoc Networks. MANETS, 1 (None 2010), 42-45.

@article{
author = { Kalpana Sharma, M K Ghose },
title = { Wireless Sensor Networks: An Overview on its Security Threats },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 1 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 42-45 },
numpages = 4,
url = { /specialissues/manets/number1/1008-44/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Kalpana Sharma
%A M K Ghose
%T Wireless Sensor Networks: An Overview on its Security Threats
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 1
%P 42-45
%D 2010
%I International Journal of Computer Applications
Abstract

Wireless sensor networks have become a growing area of research and development due to the tremendous number of applications that can greatly benefit from such systems and has lead to the development of tiny, cheap, disposable and self contained battery powered computers, known as sensor nodes or “motes”, which can accept input from an attached sensor, process this input data and transmit the results wirelessly to the transit network. Despite making such sensor networks possible, the very wireless nature of the sensors presents a number of security threats when deployed for certain applications like military ,surveillances etc . The problem of security is due to the wireless nature of the sensor networks and constrained nature of resources on the wireless sensor nodes, which means that security architectures used for traditional wireless networks are not viable. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In this paper we discuss some security threats and challenges faced by WSNs.

References
  1. A.D. Wood and J.A. Stankovic, (2002) “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, 2002, pp. 54–62.
  2. David R. Raymond and Scott F. Midkiff,(2008) "Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses," IEEE Pervasive Computing, vol. 7, no. 1, 2008, pp. 74-81.
  3. Chris Karlof, Naveen Sastry, David Wagner, (2004)Tiny Sec:a link layer security architecture for wireless sensor networks, Proceedings of the 2nd international conference on Embedded networked sensor systems , Nov 03-05,2004,Baltimore,MD,USA.
  4. E. C. H. Ngai, J. Liu, and M. R. Lyu, (2006)“On the intruder detection for sinkhole attack in wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC ’06), Istanbul,Turkey..
  5. Jamal N. Al-Karaki & Ahmed E. Kamal, (2004) “Routing Techniques in Sensor Networks: A survey”, IEEE communications, Volume 11, No. 6, Dec. 2004, pp. 6-28.
  6. M. Tubaishat, S. Madria, (2003) “Sensor Networks : An Overview “, IEEE Potentials, April/May 2003
  7. Al-Sakib khan Pathan et.al,(2006) ”Security in wireless sensor networks: Issues and challenges” in feb.20-22,2006,ICACT2006,ISBN 89-5519-129-4 pp(1043-1048)
  8. C. Karlof and D. Wagner, (2003). “Secure routing in wireless sensor networks:Attacks and countermeasures,” AdHoc Networks Journal, vol. 1, no. 2–3,pp. 293–315, September
  9. Feng Zhao,Leonidas Guibas,,”Wireless Sensor Networks”, Morgan Kaufmann Publications.
  10. Adrian Perrig, John Stankovic, and David Wagner, (2004) “Security in wireless sensor networks”, Commun.ACM,47(6):53-57.
  11. J. R. Douceur,(2002) “The Sybil Attack,” in 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02).
  12. Zaw Tun and Aung Htein Maw,(2008),” Worm hole Attack Detection in Wireless Sensor networks”, proceedings of world Academy of Science, Engineering and Technology Volume 36, December 2008, ISSN 2070-3740.
  13. Rouba El Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy, (2005)” DAWWSEN: A Defense Mechanism against Wormhole ttack In Wireless Sensor Network”,Proceedings of the Second International Conference on Innovations in Information Technology (IIT’05).
  14. A. D. Wood and J. A. Stankovic,(2002) “Denial of service in sensor networks”,Computer, 35(10):54–62, 2002.
  15. M. Zorzi and R. R. Rao, (2003) "Geographic Random Forwarding (GeRaF) for Ad Hoc and Sensor Networks: Multihop Performance," IEEE Transactions on Mobile Computing, vol. 2, no. 4, pp. 337-348, 2003.
  16. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-resilient, energy-efficient multipath routing in wireless sensor networks,”Mobil Computing and Communications Review, vol. 4, no. 5, October 2001.
Index Terms

Computer Science
Information Sciences

Keywords

Security Wireless Sensor Networks (WSN) threats Denial of Service (DoS)