We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey of Security in Wireless Sensor Network

by Bhawana Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 8
Year of Publication: 2018
Authors: Bhawana Singh
10.5120/ijca2018917642

Bhawana Singh . A Survey of Security in Wireless Sensor Network. International Journal of Computer Applications. 182, 8 ( Aug 2018), 26-33. DOI=10.5120/ijca2018917642

@article{ 10.5120/ijca2018917642,
author = { Bhawana Singh },
title = { A Survey of Security in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 182 },
number = { 8 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 26-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number8/29841-2018917642/ },
doi = { 10.5120/ijca2018917642 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:48.028673+05:30
%A Bhawana Singh
%T A Survey of Security in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 8
%P 26-33
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today, majority of people living in urban areas, Smart city concept become necessary. Smart city refer to the development of communication technologies (ICT), internet of thing (IOT) and provide solution to secure communication in cities. These services provide cities more efficient, confidential and reliable. Internet of network, connecting humans via cellular system, computers via objects or broadband connections and sensor connected via low cost data link. Sensing and communication techniques like wireless sensor network provide services such as monitoring and controlling the living environments. Wireless sensor network used to agriculture monitoring, water distribution, traffic monitoring, military surveillance, health monitoring etc. A wireless sensor network is a wireless network designed by sensor nodes that are spatially distributed and keep track of the physical environmental conditions. Wireless sensor network integrated with IOT and connected globally. This integration brings new threats, such as exposure of sensor node to attacks. In this context, authentication, confidentiality and secure key distribution must be place to end to end secure communication. Security achievement in wireless sensor network and prevention of compromising of node from attacker are important aspect of wireless sensor network .Wireless sensor network security system based on symmetric encryption. The main issues in these approaches are establishment of symmetric keys. Key pre-distribution in network refers, key distribution perform in sensor nodes before deployment of network. In this paper, we propose a new key pre-distribution scheme based on random pre-distribution. Comparative analysis demonstrates that proposed approach provide high security and reduce compromised node ratio.

References
  1. Meshal Alansheet.Imad F.T. Alshekly Abdul Rahman Alkandari.”smart city survey”june 2012.
  2. Schaffers H,Komnios N.,Pallot M.,Trouses B.,Nilsson M.,Oliveria A. “Smart Cities and the Future Internet:Towards Cooperation Frameworks for Open Innovation”2011.
  3. mohammed-Lamine Messai, Hamida Seba ” A Self-healing key pre-distribution scheme for multiphase wireless sensor networks,” 2017
  4. Saurabh Chandra, Sidharth Bhattacharya,Smita Paira SK Asfikul Alam “A study and analysis on Symmetric cryptographic” 27-29 november 2014.
  5. Y.xiao,V.K Rayi,Sun,S.Du,Fei Hu and M.Galloway”A survey of key management schemes in WSN,2007.
  6. Wu Haibing,Chen Dong,LiuPing,Li Mingxi,Yuan Hongwei Gao Haomin”WSN key Distribution Method Based on PTPP,11-13 july 2014.
  7. M.A.Simplicio-jr.,P.S.Barreto,C.B.MargiaT.C.Carvalho. ”A survey on key management mechanisms for distributed wireless sensor networks,2010.
  8. I.F.Akyildiz,W.Su,Y.Sankarasubramaniam,and E. Cayirce," Wireless sensor networks :a survey,March 2002.
  9. D.Estrin.”Instrumenting the world with Wirelsess Sensor Networks”May 2001.
  10. Yong Wang Garhan Attebury,and Byrav Ramamurthy,”a Survey of security issues in wireless sensor networks,2006.
  11. J.Alemdar,C.Ersoy,”wireless sensor networks for healthcare:A survey,”computer networks,2010.
  12. Mayank Saraogi,”Security in Wireless Sensor Network”,University of Tennessee,Knoxville.
  13. Hung,X,L,et al.,”An Energy-Efficient Secure Routing and key Management Scheme for Mobile Sinks in Wireless Sensor Networks using Deployment knowledge,2008.
  14. E.Shi and A. Perrig,”Designing secure sensor networks”,Wireless Communication Magazine, December 2004.
  15. X.Wang,W.Gu,K.Schosk,S.Chellappanand D. Xuan,” sensor network configuration under physical attacks”,Ohio State university,july 2004.
  16. Y.Zhou,Y.Fang and Y.Zhang:security wireless sensor network:A survey ,Ieee communication Surveys,2006.
  17. AI-Sakib Khan Pathan,Hyung Woo Lee,Choong Seon Hong,”Security in wireless sensor Networks:Issues and Challenges”,ICACT,February 2006.
  18. J.Newsome,E.Shi,D.Song and A.Perrig,”The Sybil attack in sensor networks:Analysis and defenses”,2004.
  19. C.Karlof and D.Wagner,”Secure routing in wireless sensor networks,IEEE Computer,2002.
  20. Sumitra, B.,C.R.Pethuru,and M.Misbahuddin.”A survey of cloud authentication attacks and solution approaches.”International jpurnal of innovative research in computer and communication engineering, 2014.
  21. V.Gligor and L.Eschenauer”A key-management scheme for distributed sensor networks,”in Computer and communication security ,2002.
  22. H.Chan,A.Perrig and D.Song ,”Random key predidtribution schemes for sensor networks ,”in symposium on security and privacy,mayn2003.
  23. Cui,V.Wen, M.Chen,W. and A.Woo,”security and development issues in a sensor network,”Ninja project,A scalable Internet services architecture,Berkeley.
  24. B.Zhou,Q.Li,S.Li,X.Wang and X.Sun”an efficient and scalable pairwise key predistribution scheme for sensor networks using deployment knowledge “computer communication ,2009.
  25. Y.S.Han, J.Deng ”Multipath key establishment for wireless sensor network using just enoughredundancy transmission “IEEE Transaction on dependable and secure computing,2008.
  26. S.D.Sandberg,M.B.Pursle ”Incremental redundancy tans-mission for meter or burst incremental –redundancy transmission for meteor –burst communication ,”IEEE Trans. communication ,1991.
  27. S.B.Wicker and M.J.Bartz”Type-2 hybrid –ARO protocol using punctured MDS codes”.IEEE Trans. on communications, 1994.
  28. W.Du,Y.S.Han,J.Dengand“A pairwise key predistribution scheme for wireless sensor networks,in Proc .10th ACM Conference on computer and communication security,2003.
  29. C.Blundo,A.Herzberg,A.D.Santis,S.Kutten,U.Vaccaro and M.Yung”perfectly-secure key distribution for dynamic conference”inProc.CRYPTO’92’12th annual international cryptology conference on advance in cryptologylondon,Springer,1992.
  30. S. Capkun and J.-P. Hubaux, “Secure positioning of wireless devices with application to sensor networks,” Proc. of the IEEE InfoCom,2005.
  31. Chin-Luang Lei, Yen- Hua Liao AiNung Wang and Wen-Chi Tsai, “Tame Pool based Pairwise Key Pre-distribution for Large Scale Sensor Networks”, February 2011, National Taiwan University.
  32. Liu, D., Ning, P “Establishing Pairwise keys in distributed sensor networks”, In Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS’03), 2003.
  33. Wood, A.,Stankovic, J. A., “Denial of Service in Sensor Networks”, IEEE Computer, pp. 54-62, October 2002.
  34. Huang, D., Mehta, M., Mehdi, D, Harm and L. “Location-aware Key Management Scheme for Wireless Sensor Networks”, Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks. October 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Smartcity keymanagement WSN random key pre-distribution security issues