We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview

by S.V.Annlin Jeba, B. Paramasivan, D.Usha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 6
Year of Publication: 2011
Authors: S.V.Annlin Jeba, B. Paramasivan, D.Usha
10.5120/3570-4925

S.V.Annlin Jeba, B. Paramasivan, D.Usha . Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview. International Journal of Computer Applications. 29, 6 ( September 2011), 15-22. DOI=10.5120/3570-4925

@article{ 10.5120/3570-4925,
author = { S.V.Annlin Jeba, B. Paramasivan, D.Usha },
title = { Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 6 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 15-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number6/3570-4925/ },
doi = { 10.5120/3570-4925 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:04.306563+05:30
%A S.V.Annlin Jeba
%A B. Paramasivan
%A D.Usha
%T Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 6
%P 15-22
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSN) have lot of interest in research due to their wide range of typical application areas such as environmental, military and commercial enterprises. Sensor network possesses unique challenges to protocol builders, because these tiny wireless devices are often deployed in unattended environment with limited capabilities. Hence these networks are vulnerable to different types of malicious attacks. This paper surveyed the different types of attacks and security related issues in WSN. Moreover an analysis about some of the security protocols in two major domains namely, cryptography based protocols and en-route filtering schemes have been done.

References
  1. I.F.Akyildiz Su, Y. Sankarasubramaniam, ”A survey on sensor Networks”,IEEE communication magazine vol.40,no.8,pp.102-114,Aug 2002
  2. Daojing He,Lin cui,Hejiao Hang,”Design and verification of Enhanced secure localization scheme in wireless sensor network “IEEE Transaction On parallel and distributed systems vol. 20 no.7 July 2009
  3. S. Uluagac, C. Lee, R. Beyah, and J. Copeland, “Designing Secure Protocols for Wireless Sensor Networks,” Wireless Algorithms, Systems, and Applications, vol. 5258, pp. 503-514, Springer, 2008
  4. Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks, IEEE Communications Surveys & Tutorials 8 (2) (2006) 2–23.
  5. Yun Zhou,Y.fany,”securing wireless sensor networks a survey”IEEE communication survey & Tutorials vol. 10,no.3,2008
  6. Yang xiao, Venkata Krishna Rayi,Bo Sun,Xiao jiang Du,”A Survey of key management schemes in wireless sensor networks”Elsevier publication vol 30,pp2314-2341,2007
  7. C, Kerlof, N.Sastry, D.wagner”Tinysec, a link layer security architecture for wireless sensor networks”, proceeding of the second ACM conference on Embedded network sensor systems, 2004
  8. Yee Wei Law, Jeroen Doumen, Pieter Hartel, Survey and benchmark of block ciphers for wireless sensor networks, ACM Transactions on Sensor Networks (2006) 65–93.
  9. A perrig, R.Szewczyk, V.Wen, D.Culler and. J Tygar,”SPINS: Security protocols for sensor networks”ACM wireless networks vol 8, no 5, Sept 2002, pp 521-534
  10. Sencan Zhu, sanjeev setia, Sushil Jajodia,”LEAP: Efficient security mechanism for large scale distributed sensor networks”, Tech report (ACM), Aug 2004
  11. M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “Minisec: A Secure Sensor Network Communication Architecture,” Proc. Sixth Int’l Symp. Information Processing in Sensor Networks (IPSN ’07), pp. 479-488, Apr. 2007
  12. Bo Sun, Chung-chih Li, Kui,Wu, Yang Xiao,”A Light weight secure protocol for WSN”Elsevier computer communications vol 29,pp 2556-2568,2006.
  13. K.Ren, W.Lou, Y.zhang,”LEDS: providing location aware End to End data security in wireless sensor networks”,IEEE Transactions on mobile computing Vol. 7, no. 5, may 2008.
  14. Alzcuid.H, Alfaraj.M, ”MASA: End to End data security in sensor networks using a mix of Asymmetric and symmetric approaches “IEEE conference mobility and security, vol 25,pp 1-5,2008
  15. Arif Selcuk Uluagac, Yingshu Li, ”VEBEK: Virtual Energy Based Encryption and keying for wireless sensor networks”IEEE Transaction on mobile computing vol. 9, No.7, July 2010
  16. F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en-route detection and filtering of injected false data in sensor networks,” in Proc. IEEE INFOCOM, 2004, vol. 4, pp. 2446–2457
  17. S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An interleaved hop-by-Hop authentication scheme for filtering of injected false data in sensor networks,” in Proc. IEEE Symp. Security Privacy, 2004, pp. 259–271.
  18. H. Yang and S. Lu, “Commutative cipher based en-route filtering in wireless sensor networks,” in Proc. IEEE VTC, 2004, vol. 2, pp.1223–1227.
  19. H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward resilient security in wireless sensor networks,” in Proc. ACM MobiHoc, 2005,pp. 34–45
  20. Zhen Yu and Yong Guan ,”A Dynamic En-route Filtering Scheme for Data Reporting in Wireless Sensor Networks “ IEEE/ACM Transactions On Networking, Vol. 18, No. 1, February 2010.
  21. H. Hou, C. Corbett, Y. Li, and R. Beyah, “Dynamic Energy- Base Encoding and Filtering in Sensor Networks,” Proc. IEEE Military Comm. Conf. (MILCOM ’07), Oct. 2007
  22. C. Kraub, M. Schneider, K. Bayarou, and C. Eckert, “STEF: A Secure Ticket-Based En-Route Filtering Scheme for Wireless Sensor Networks,” Proc. Second Int’l Conf. Availability, Reliability and Security (ARES ’07), pp. 310-317, Apr. 2007.
  23. S. A. C¸ amtepe and B. Yener.,”Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks” In IEEE/ACM Transaction on Networking, vol. 15, no. 2, pp. 346-358,Apr,2007.
  24. Shahriar Mohammadi1 and Hossein Jadidoleslamy,” a comparison of link layer attacks on wireless sensor networks”, International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC)”, Vol.3, No.1, March 2011.
  25. Garth V. Crosby, Lance Hester,” Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks”, International Journal of Network Security, Vol.12, No.2, PP.107-117, Mar. 2011.
Index Terms

Computer Science
Information Sciences

Keywords

wireless sensor networks security protocol attacks security services en-route filtering