A Review on Wireless Sensor Network Security

I

Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network WSN is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31815.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/31815/a-review-on-wireless-sensor-network-security/vijay-kumar-kalakar

International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 5, August 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 340
A Review on Wireless Sensor Network Security
Vijay Kumar Kalakar1, Hirdesh Chack2, Syed Tariq Ali1
1,2Lecturer, Department of Electronics and Telecommunication,
1Government Women’s Polytechnic College, Bhopal, Madhya Pradesh, India
2Government Polytechnic College, Jatara, Madhya Pradesh, India
ABSTRACT
Wireless sensor networks are attracting more and more coverage. A number
of surveillance, regulation, and tracking systems have been developed for
different scenarios in recent years. Wireless Sensor Network (WSN) is an
emerging technology that shows great promise for various futuristic
applications both for mass public and military. The sensing technology
combined with processing power and wireless communication makes it
lucrative for being exploited in abundancein future. The inclusion ofwireless
communication technology also incurs various types of security threats. The
intent of this paper is to investigate the security related issues and challenges
in wireless sensor networks. We identifythe securitythreats,reviewproposed
security mechanisms for wireless sensor networks. We also discuss the
holistic view of security for ensuring layered and robust security in wireless
sensor networks.
KEYWORDS: Wireless sensor networks, Security, Attack, Holistic, Challenge
How to cite this paper: Vijay Kumar
Kalakar | Hirdesh Chack | Syed Tariq Ali
"A Review on Wireless Sensor Network
Security" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-5, August
2020, pp.340-345, URL:
www.ijtsrd.com/papers/ijtsrd31815.pdf
Copyright © 2020 by author(s) and
International Journal of TrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
I. INTRODUCTION
The Wireless Sensor Networks ( WSNs) can be defined as a
wireless, self-configured network without infrastructure,
which monitors physical, environmental and sound
conditions, temperature , vibration, pressures, movement
and pollutants and collectively transfers their information
via the network to a principal place or sink, where data can
be monitored and analyzed. A sink or base station acts as a
networking interface. By injecting queries and collecting
results from the sink, you can get the required information
from the network [1, 2].
Wireless sensor networks (WSN) are an ad hoc network
system where resource-contracted sensor nodes are usedto
track and manage functions of a specific type. One or more
detection units, a single processor, a memory, a
communication element and a power source comprise a
typical configuration of the sensor nodes. These sensors are
then used to calculate a certain physical magnitude from the
surrounding environment [3, 4].
In general, hundreds of thousands of sensor nodules in a
wireless sensor network. Radio signals may be used to
contact the sensor nodes. A wireless node has sensor and
computing equipment, radio transceivers and control
supplies [5]. The resource limitations of individualnodesina
wireless sensor network (WSN) are limited: there is little
speed of transmission, storage space and bandwidth of
communication. After the sensor nodes are installed, they
often coordinate themselves through multi-shop
connectivity to an effective network infrastructure. And
onboard sensors begin to capture useful details. Wireless
sensor devices also respond to "control site" queries to
provide sensing samples or to perform specific directives.
Whether constant or event controlled operation modeofthe
sensor nodes is feasible. For geographic details and
positioning purposes, global positioning system (GPS) and
local positioning algorithms may be used [1, 4].
Figure1. Wireless sensor network.
IJTSRD31815
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 341
The interaction between sensors takes place with wireless transceivers in the case of a wireless sensor network. Numerous
scholars focused on different problems relevant to these forms of networks owing to the enticing characteristics of wireless
sensor networks. Although routing approaches and the simulation of wireless sensors for networks are becoming a major
concern, the safety issues are not yet completely addressed. Throughout this article, we address protection concerns and
threats for wireless sensor networks of the next decade and explore the main criteria for comprehensive analysis [7].
II. STRUCTURE OF A WIRELESS SENSOR NETWORK
The Wireless Sensor Network structure consists of different radio communications networktopologies.Thefollowingisashort
discussion of the network topologies applicable to wireless sensor networks [5, 6]:
Star network (Single point-to – multipoint)
A star network isa topology forcommunication thatcan be sent and/or received from a single station tocertainremotenodes.
You cannot send messages to each other via remote nodes. This form of network has the benefit of being quick, enabling the
remote node to retain a minimal energy consumption. Low latency communication between the remote node and the base
station is also possible. The downside of such a network is that it needs to be inside the radio propagation spectrum of all
specific nodes and not as reliable as other networks because of the need to control the network on a single node.
Mesh Network
A mesh network can transmit data to a nodewithin the radio transmission range ofa network. Thisenableswhatisregardedas
multi-hop contact, i.e., to be done by an intermediary node where a node wants to transmita message toanothernodewhichis
not inside the radio transmission range. Redundancy and scalability benefit from this network topology. If a node fails, any
other node within its rangecan still be communicated by a distance node, whichcan transmission the message to therequired
place.
Hybrid Star-Mesh Network
A hybrid between the star and the mesh network offers the communication network to be robust and versatile whilst
maintaining the ability to minimize the power consumption of wireless sensors. The lowest power sensor nodes are not
capable of forwarding messages in this network topology. This ensures a minimum energy consumption. However, there are
other nodes in the network that can be transferred from low power nodes to other nodes on the network with multihop
capabilities [8].
III. STRUCTURE OF A WIRELESS SENSOR NODE
Four fundamentalcomponents suchas the sensor unit, processor unit, transceiver unit and power unit shown inthefigureare
presented at a sensor Node. There are additional components dependent on applications such as a location search system, a
power generator and a mobilizer. Two sub-units: sensors,and digitalconverter analog (ADCs) are usually made up of sensing
units [9].
Figure 2 Components of a sensor node
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 342
Figure 3 Functional block diagram of a sensor node
The sensors convert analog signals into digital signals through ADC and then relay them intothetreatmentunit.Theprocessing
unit is usually linked to a small storage unit andcan manage the processes by which the sensor node workswithothernodesto
perform tasks. The network node is attached to a transceiver array. The control generator is one of the key components of a
sensor node. A power-scavenging unit, such as solar cells, can support power units. The remaining sub-units of the node
depend on the application [10].
IV. SECURITY ISSUES IN WIRELESS SENSOR NETWORK
Many security risks and assaults in wireless networks are much like their wired equivalent, though others have wireless
networking included. Wireless networks are generally more vulnerable to differentsecuritythreatssincetheunguidedmedium
is more vulnerable to safety attacks than the guided medium. A simple eavesdropper candidate is the radio nature ofwireless
communication. In most cases, different security issues and threats associated with the wireless ad-hoc networks that we
consider also apply to wireless sensor networks.
While the ad-hoc networks are self-organized, decentralized topology, the peer-to - peer networks that comprise a group of
mobile nodes and the centralized entity is not available; the networks witha wireless sensor may include a command node or
base station (central entity often referred to as a sink). Thebigchallenge, however, is caused by theresourcelimitationofsmall
sensors [7, 8].
WSNs are vulnerable against so many attacks. Attackers can attack the radio transmission; add their own data bits to the
channel, replay old packets and any other type of attack. A secure network ought to support all security properties. Attackers
may deploy some malicious nodes in the network with similar capabilities as of normal node or may overwrite the memoryof
normal deployed node by capturing them.
Attacks in wireless sensor network are shown in Figure 4. They are roughly categorized as follows: A) Based on Routing B)
Based on Capability C) Based on Protocol Layer.
Figure 4 Attack classification in WSN
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 343
4.1. Based on Capability
The attacks can be categorized on the basis of the source of
the attacks i.e. Internal or External, and on the behavior of
the attack i.e. Passive or Active attack. This classification is
important because the attacker can exploit the network
either as internal, external or/ as well as active or passive
attack against the network.
External attackers are mainly outside the networks who
want to getaccess to the network and once they getaccessto
the network they start sending bogus packets, denial of
service in order to disrupt the performance of the whole
network. This attack is same, like the attacks that are made
against wired network. These attacks can be prevented by
implementing security measures suchasfirewall, where the
access of unauthorized person to the network can be
mitigated.
While in internal attack the attacker wants to have normal
access to the network as well as participate in the normal
activities of the network. The attacker gain access in the
network as new node either by compromising a current
node in the network or by malicious impersonationandstart
its malicious behavior. Internal attack ismore severeattacks
then external attacks.
When the attacker disrupts the performance of the network,
steal important information and try to destroy the data
during the exchange in the network. Active attacks can an
internal or an external attack. The active attacks are meant
to destroy the performance of network in such case the
active attack act as internal node in the network.
Being an active part of the network it is easy for the node to
exploit and hijack any internal node to use it to introduce
bogus packets injection or denial of service. This attack
brings the attacker in strong position where attacker can
modify, fabricate and replays the massages. Attackers in
passive attacks do not disrupt the normal operations of the
network. In Passive attack, the attacker listen to network in
order to get information, what is going on in the network? It
listens to the network in order to know and understandhow
the nodes are communicatingwith each other, how they are
located in the network. Before the attacker launch an attack
against the network, the attacker has enough information
about the network that it can easily hijack and inject attack
in the network.
4.2. Based on Protocol Layer
WSN is divided into different layers. The working of each
layer is different. The attacks on the basis of protocol layers
are explained below:
A. Physical Layer
Physical layer is used for transmitting information in raw
bits over the wireless or wired medium. It is easy to jam a
common radio signal. In general, physical layer attacks are
categorized as: Eavesdropping, Tampering and Jamming. In
eavesdropping attack, an unauthorized receiver reads the
messages. Jammingattack implements underDoSattack.Itis
the interference with the radio frequency used by the
network nodes. This completely changes the working of
network.
B. Link Layer
Data link layer is utilized to ensure the proper
communication on physical layer between nodes. This layer
is incharge ofmultiplexing, error detection, packetscollision
prevention, repeated transmission of data and so on. Link-
layer threats include collisions, interrogation, and packet
replay. Error detection and correcting codes can be used to
decrease the number of collisions but due to this the routing
overhead in the network is increased. Another connection
layer danger to WSNs is the denial-of-sleep attack, in which
node is unable to go to into the sleep mode. This decreases
the whole network lifetime.
C. Network Layer
For the data routing between nodes, nodes to sink, node to
BS, node to CH, and vice versa, this layer is responsible. A
direct attack on Routing protocols by the attackers can have
impact on network data traffic, indulge themselves into the
data path between the source and destination, and by this
control the data flow. Thisinfers that effective and powerful
routing protocols are required to manage node failure and
security attacks. Some routing protocol attacks are:
wormhole attacks, acknowledgement spoofing, selective
forwarding, black holes and so forth.
D. Transport Layer
Transport Layer isutilized to build upa communication link
for outer sensor network joined with the internet. This can
be considered as the most complex issue in WSNs. Attacksof
the transport layer protocol are flooding and
desynchronization. Flooding attack is used to deplete the
node's memory by sending numerous requests for
connection establishment. In the de-synchronization attack,
the attacker node forges packets to at least one or both ends
of a connection using different sequence numbers on the
packets. In this way, host requests for retransmission of the
missed packet frames.
V. SECURITY PROTOCOLS IN SENSOR NETWORKS
Cryptography isa basic technique to achieve thesecurityina
network. This establishesa secure relationshipbetweentwo
end points. In this, sender encrypts the original data and
receiver decrypts the received data to obtain an original
data. Different types of keys are used in the process of
cryptography. The various protocols that are proposed by
different authors for solving the security issue in WSN are:
A. SPINs
SPIN (Sensor Protocols for Information via Negotiation)
protocol works in three steps. First, a node advertises the
ADV packet containing the metadata. If the received node is
interested in the data then it sends the request fordatausing
REQ packet. Finally, the advertiser node after receiving
request sends the DATA packet to the requestor node. It
performs best in small size networks because ofitsefficiency
and high latency properties. Typical SPIN consists of two
secure building blocks named as μTESLA (Timed Efficient
Stream Loss-tolerant Authentication) and SNEP (Sensor
Network Encryption Protocol).
SNEP provides confidentiality, authentication and integrity.
It uses the concept of encryption. To authenticate the data,
MAC (Message authentication Code) is used. It adds 8 bytes
to the message. To reduce the communication overhead,
SNEP uses a shared counter between sender node and
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 344
receiver node. After each block counter gets incremented.
Counter helps in identifying the freshness of data. In TESLA,
digital signatures are used to authenticate the data packet.
Sink node computes a MAC on the packet after receiving the
packet with the secret key to send an authenticated packet
back to source. After receiving a packet, node confirms that
the sink does not disclose the computed MAC key to other
nodes. With this, receiving node assures that data packet is
original and no alterations are done in the packet.
B. LEAP
LEAP (Localized Encryptionand Authentication Protocol)is
a protocol with key management scheme that is very
efficient with its security mechanisms used for large scale
distributed sensor networks. It generally supports forinside
network processing such as data aggregation. In-network
processing results in reduction of the energyconsumptionin
network. To provide the confidentiality and authentication
to the data packet, LEAP uses multiple keys mechanism. For
each node four keys are used knownas individual, pair wise,
cluster and group key. All are symmetric keys and use as
follows:
 Individual Key: It is the unique key used for the
communication between source node and thesinknode.
 Pair wise Key: It is shared with another sensor nodes.
 Cluster Key: It is used for locally broadcast messages
and shares it between the node and all its surrounding
neighboring nodes.
 Group Key: globally shared key used by all the network
nodes
These keys can also be used by other non-secured protocols
to increase the network security. LEAP is satisfies several
security and performance requirements of WSN. LEAP is
used to defend against HELLO Floods Attack, Sybil Attack
and Wormhole Attack.
C. TINYSEC
TINYSEC is link layer security architecture for WSNs. It is a
lightweight protocol. It supports integrity, confidentiality
and authentication. Toachieve confidentiality, encryptionis
done by using CBC (Cipher-blockchaining)modewithcipher
text stealing, and authentication is done using CBC-MAC. No
counters are used in TINYSEC. Hence, it doesn’t check the
data freshness. Authorized senders and receivers share a
secret key to compute a MAC. TINYSEC has two different
security options. One is for authenticated and encrypted
messages (TinySec-AE) and another is for authenticated
messages (TinySec-Auth).In TinySec-AE, the data payloadis
encrypted and the received data packet isauthenticatedwith
a MAC. In TinySec-Auth mode, the entire packet is
authenticated with a MAC, but on the other hand the data
payload is not encrypted.
In CBC, Initialization Vector (IV) is used to achieve semantic
security. Some of the messages are same with only little
variation. In that case IV adds the variation to the encrypted
process. To decrypt the message receiver must use the IV.
IVs are not secret and are included in the same packet with
the encrypted data.
D. ZIGBEE
ZIGBEEisa typicalwireless communication technology. Itis
used in various applications such as military security, home
automation and environment monitoring. IEEE 802.15.4isa
standard used for ZIGBEE. It supports data confidentiality
and integrity. To implement the security mechanismZIGBEE
uses 128 bit keys. A trust center is used in ZIGBEE which
authenticates and allows other devices/nodes to join the
network and also distribute the keys. Generally, ZIGBEE
coordinator performs this function. Three different roles in
ZIGBEE are:
 Trust Manager: It authenticates the devices which are
requesting to join the network.
 Network Manager: It manages the network keys and
helps to maintain and distribute the network keys.
 Configuration Manager: It configures the security
mechanism and enables end-to-end security between
devices.
VI. HOLISTIC SECURITY IN WIRELESS SENSOR
NETWORKS
A holistic approach aims at improving the performance of
wireless sensor networks with respect to security, longevity
and connectivity under changing environmental conditions.
The holistic approach of security concerns about involving
all the layers for ensuring overall security in a network. For
such a network, a single security solution for a single layer
might not bean efficient solution rather employing a holistic
approach could be the best option.
The holistic approach has some basic principles like, in a
given network; security is to be ensured for all the layers of
the protocol stack, the cost for ensuring security should not
surpass the assessed security risk at a specific time, if there
is no physical security ensured for the sensors, the security
measures must be able to exhibit a graceful degradation if
some of the sensors in the network are compromised, out of
order or captured by the enemy and the security measures
should be developed to work in a decentralized fashion. If
security is not considered for all of the security layers, for
example; if a sensor is somehow captured or jammed in the
physical layer, the security for the overall network breaks
despite the fact that, there are some efficient security
mechanisms working in other layers. By building security
layers as in the holistic approach, protection could be
established for the overall network.
VII. CONCLUSIONS
This paper emphasizes the WSN's safety issue. Safety in the
network sensor is the major challenge. Safe contact is
needed for some applications such as the military. Certain
security requirements must be met for a secure
communication network. Centered on different criteria, this
paper discusses security risks. Specificprocedureshavebeen
developed to satisfy the safety requirements.
In many mission-critical applications, the wireless sensor
networks continue to grow and become widely utilized.
Therefore, the need for protection is paramount. The
wireless sensor network, however, suffers from several
limitations including low energy levels, processing and
storage, unreliable communication and unattended
operation, etc. However, it is a major research challenge to
develop and make this detection mechanism efficient.Again,
ensuring holistic security in wireless sensor network is a
major research issue. Many of todays proposed security
schemes are based on specific network models. As a
collective attempt to follow a specific model to guarantee
each layer’s protection is not feasible, in the future, the
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 345
development of security protocols for each layer would lead
to a challenging investigation integrating all procedures for
each layer in partnership.
REFERENCES
[1] Culler, D. E and Hong, W., “Wireless Sensor Networks”,
Communication of the ACM, Vol. 47, No. 6, June 2004,
pp. 30-33.
[2] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and
Cayirci, E., “Wireless Sensor Networks: A Survey”,
Computer Networks, 38, 2002, pp. 393-422.
[3] Dai, S, Jing, X, and Li, L, “Research and analysis on
routing protocols for wireless sensor networks”, Proc.
International Conference on Communications,Circuits
and Systems, Volume 1, 27-30 May, 2005, pp. 407-411.
[4] Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and
Hong, C. S., “A Framework for Providing E-Services to
the Rural Areas using Wireless Ad Hoc and Sensor
Networks”, to appear in IEEE ICNEWS 2006.
[5] Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J.,
“Security for Sensor Networks”, CADIP Research
Symposium, 2002, available at,
http://www.cs.sfu.ca/~angiez/personal/paper/sensor
-ids.pdf
[6] Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J.
D., “SPINS: Security Protocols for Sensor Networks”,
Wireless Networks, vol. 8, no. 5, 2002, pp. 521-534.
[7] Jolly, G., Kuscu, M. C., Kokate, P., and Younis, M.,“ALow-
Energy Key Management Protocol for Wireless Sensor
Networks”, Proc. Eighth IEEE InternationalSymposium
on Computers and Communication, 2003. (ISCC2003).
vol.1, pp. 335 - 340.
[8] Rabaey, J. M., Ammer, J., Karalar, T., Suetfei Li., Otis, B.,
Sheets, M., and Tuan, T., “PicoRadios for wireless
sensor networks: the next challenge inultra-lowpower
design” 2002 IEEE International Solid-State Circuits
Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp.
200 – 201.
[9] Hollar, S, “COTS Dust”, Master’s Thesis, Electrical
Engineering and Computer Science Department, UC
Berkeley, 2000.
[10] Saleh, M. and Khatib, I. A., “Throughput Analysis of
WEP Security in Ad Hoc Sensor Networks”, Proc. The
Second International Conference on Innovations in
Information Technology (IIT’05), September 26-28,
Dubai, 2005.

Recomendados

Grid-Based Multipath with Congestion Avoidance Routing Protocol por
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
12 visualizações7 slides
International Journal of Computational Engineering Research(IJCER) por
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
455 visualizações5 slides
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters por
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
20 visualizações4 slides
WSN IN IOT por
WSN IN IOTWSN IN IOT
WSN IN IOTskumartarget
21.4K visualizações33 slides
A044060107 por
A044060107A044060107
A044060107IJERA Editor
455 visualizações7 slides
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices por
IRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET-  	  A Novel Mechanism for Clone Attack Detection in Hybrid IoT Devices
IRJET- A Novel Mechanism for Clone Attack Detection in Hybrid IoT DevicesIRJET Journal
13 visualizações5 slides

Mais conteúdo relacionado

Mais procurados

29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit) por
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)IAESIJEECS
8 visualizações13 slides
Concepts and evolution of research in the field of wireless sensor networks por
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
762 visualizações18 slides
A Paired Key Mechanism for Wirelesslink Security for WSNS por
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
23 visualizações8 slides
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs por
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
50 visualizações6 slides
Some aspects of wireless sensor networks por
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
418 visualizações10 slides
Identifying Security Vulnerabilities Survey por
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyClayton Hatathlie
237 visualizações13 slides

Mais procurados(20)

29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit) por IAESIJEECS
29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)29 6 jul17 29may 7308 ijeecs  paper_july_6 edit septian(edit)
29 6 jul17 29may 7308 ijeecs paper_july_6 edit septian(edit)
IAESIJEECS8 visualizações
Concepts and evolution of research in the field of wireless sensor networks por IJCNCJournal
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal762 visualizações
A Paired Key Mechanism for Wirelesslink Security for WSNS por IRJET Journal
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
IRJET Journal23 visualizações
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs por INFOGAIN PUBLICATION
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION50 visualizações
Some aspects of wireless sensor networks por pijans
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans418 visualizações
Identifying Security Vulnerabilities Survey por Clayton Hatathlie
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
Clayton Hatathlie237 visualizações
574 501-507 por idescitation
574 501-507574 501-507
574 501-507
idescitation382 visualizações
Basics of Wireless sensor networks por Rushin Shah
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
Rushin Shah26K visualizações
10.1109@maes.2020.2970262 por MKEERTHIKA1
10.1109@maes.2020.297026210.1109@maes.2020.2970262
10.1109@maes.2020.2970262
MKEERTHIKA159 visualizações
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS por IJCNCJournal
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGSOPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
OPTIMIZING SMART THINGS ADDRESSING THROUGH THE ZIGBEE-BASED INTERNET OF THINGS
IJCNCJournal198 visualizações
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me... por IJAAS Team
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
IJAAS Team12 visualizações
Wireless Micro-Sensor Network Models por IOSR Journals
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
IOSR Journals582 visualizações
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network... por IRJET Journal
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal39 visualizações
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime por ijtsrd
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
ijtsrd14 visualizações
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ... por IJERA Editor
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
IJERA Editor241 visualizações
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N... por IJERA Editor
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
IJERA Editor33 visualizações
An Efficient Security Way of Authentication and Pair wise Key Distribution wi... por IJMER
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER2K visualizações
Protocols for Wireless Sensor Networks and Its Security por IJERA Editor
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor60 visualizações
Wireless body area network por subhradeep mitra
Wireless body area network Wireless body area network
Wireless body area network
subhradeep mitra4.2K visualizações
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security por IRJET Journal
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal17 visualizações

Similar a A Review on Wireless Sensor Network Security

Oj3425062509 por
Oj3425062509Oj3425062509
Oj3425062509IJERA Editor
271 visualizações4 slides
S04404116120 por
S04404116120S04404116120
S04404116120IJERA Editor
170 visualizações5 slides
International Journal of Engineering Research and Development (IJERD) por
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
598 visualizações4 slides
IRJET- Energy Efficient Protocol in Wireless Sensor Network por
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
14 visualizações4 slides
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola por
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha YeolaIJET - International Journal of Engineering and Techniques
242 visualizações5 slides
A Review Paper on Energy Capable Routing in Wireless Sensor Network por
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Networkijtsrd
5 visualizações5 slides

Similar a A Review on Wireless Sensor Network Security(20)

Oj3425062509 por IJERA Editor
Oj3425062509Oj3425062509
Oj3425062509
IJERA Editor271 visualizações
S04404116120 por IJERA Editor
S04404116120S04404116120
S04404116120
IJERA Editor170 visualizações
International Journal of Engineering Research and Development (IJERD) por IJERD Editor
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor598 visualizações
IRJET- Energy Efficient Protocol in Wireless Sensor Network por IRJET Journal
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET Journal14 visualizações
A Review Paper on Energy Capable Routing in Wireless Sensor Network por ijtsrd
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
ijtsrd5 visualizações
Design Issues and Applications of Wireless Sensor Network por ijtsrd
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd700 visualizações
Wireless Sensors Essay por Renee Franco
Wireless Sensors EssayWireless Sensors Essay
Wireless Sensors Essay
Renee Franco3 visualizações
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou... por journalBEEI
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
journalBEEI16 visualizações
Stimulating The Wireless Sensor Network por Tracy Williams
Stimulating The Wireless Sensor NetworkStimulating The Wireless Sensor Network
Stimulating The Wireless Sensor Network
Tracy Williams2 visualizações
wireless sensor network por Pramod Kuruvatti
wireless sensor networkwireless sensor network
wireless sensor network
Pramod Kuruvatti921 visualizações
Wireless sensor network report por Ganesh Khadsan
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan12.7K visualizações
seminar report on wireless Sensor network por Jawhar Ali
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali3.4K visualizações
H017133442 por IOSR Journals
H017133442H017133442
H017133442
IOSR Journals180 visualizações
Issues and Challenges in Distributed Sensor Networks- A Review por IOSR Journals
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
IOSR Journals287 visualizações
Review of Wireless Sensor Networks por Dr. Amarjeet Singh
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
Dr. Amarjeet Singh42 visualizações
50120140507012 por IAEME Publication
5012014050701250120140507012
50120140507012
IAEME Publication164 visualizações
Wireless Sensor Network – Theoretical Findings and Applications por AshishDPatel1
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
AshishDPatel1102 visualizações
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal por IAESIJEECS
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
IAESIJEECS17 visualizações
A Brief Research Study Of Wireless Sensor Network por Cassie Romero
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero4 visualizações

Mais de ijtsrd

Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H... por
Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H...Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H...
Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H...ijtsrd
3 visualizações8 slides
Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F... por
Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F...Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F...
Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F...ijtsrd
7 visualizações4 slides
Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ... por
Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ...Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ...
Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ...ijtsrd
9 visualizações4 slides
Estimating Evaporation using Machine Learning Based Ensemble Technique por
Estimating Evaporation using Machine Learning Based Ensemble TechniqueEstimating Evaporation using Machine Learning Based Ensemble Technique
Estimating Evaporation using Machine Learning Based Ensemble Techniqueijtsrd
4 visualizações6 slides
Effectiveness of Basic Life Support Training on Knowledge among Nursing Students por
Effectiveness of Basic Life Support Training on Knowledge among Nursing StudentsEffectiveness of Basic Life Support Training on Knowledge among Nursing Students
Effectiveness of Basic Life Support Training on Knowledge among Nursing Studentsijtsrd
5 visualizações3 slides
Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State... por
Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State...Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State...
Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State...ijtsrd
8 visualizações12 slides

Mais de ijtsrd(20)

Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H... por ijtsrd
Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H...Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H...
Photovoltaic Connected Cascaded H bridge Multilevel Inverters with Improved H...
ijtsrd3 visualizações
Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F... por ijtsrd
Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F...Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F...
Narratives on Lost Terrains A Neocolonialist Reading of Select Contemporary F...
ijtsrd7 visualizações
Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ... por ijtsrd
Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ...Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ...
Pre Extension Demonstration and Evaluation of Improved Hot Pepper Technology ...
ijtsrd9 visualizações
Estimating Evaporation using Machine Learning Based Ensemble Technique por ijtsrd
Estimating Evaporation using Machine Learning Based Ensemble TechniqueEstimating Evaporation using Machine Learning Based Ensemble Technique
Estimating Evaporation using Machine Learning Based Ensemble Technique
ijtsrd4 visualizações
Effectiveness of Basic Life Support Training on Knowledge among Nursing Students por ijtsrd
Effectiveness of Basic Life Support Training on Knowledge among Nursing StudentsEffectiveness of Basic Life Support Training on Knowledge among Nursing Students
Effectiveness of Basic Life Support Training on Knowledge among Nursing Students
ijtsrd5 visualizações
Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State... por ijtsrd
Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State...Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State...
Beef Cattle Value Chain Analysis in East Hararghe Zone, Oromia Regional State...
ijtsrd8 visualizações
Optimization of Cutting Fluid using VIKOR Method por ijtsrd
Optimization of Cutting Fluid using VIKOR MethodOptimization of Cutting Fluid using VIKOR Method
Optimization of Cutting Fluid using VIKOR Method
ijtsrd4 visualizações
A Study to Assess the Effectiveness of Educational Package on Knowledge Regar... por ijtsrd
A Study to Assess the Effectiveness of Educational Package on Knowledge Regar...A Study to Assess the Effectiveness of Educational Package on Knowledge Regar...
A Study to Assess the Effectiveness of Educational Package on Knowledge Regar...
ijtsrd12 visualizações
Education and Women A Study por ijtsrd
Education and Women A StudyEducation and Women A Study
Education and Women A Study
ijtsrd2 visualizações
A Study of Central Nervous System CNS Effect of Xanthium Strumarium in Swiss ... por ijtsrd
A Study of Central Nervous System CNS Effect of Xanthium Strumarium in Swiss ...A Study of Central Nervous System CNS Effect of Xanthium Strumarium in Swiss ...
A Study of Central Nervous System CNS Effect of Xanthium Strumarium in Swiss ...
ijtsrd6 visualizações
The Effect of Logistic Service Quality on Loyalty with Satisfaction Mediation... por ijtsrd
The Effect of Logistic Service Quality on Loyalty with Satisfaction Mediation...The Effect of Logistic Service Quality on Loyalty with Satisfaction Mediation...
The Effect of Logistic Service Quality on Loyalty with Satisfaction Mediation...
ijtsrd6 visualizações
Overview of Vedic Education System of Nabadwip in Ancient India por ijtsrd
Overview of Vedic Education System of Nabadwip in Ancient IndiaOverview of Vedic Education System of Nabadwip in Ancient India
Overview of Vedic Education System of Nabadwip in Ancient India
ijtsrd23 visualizações
Discussion on Difficulties and Countermeasures in the Construction of Financi... por ijtsrd
Discussion on Difficulties and Countermeasures in the Construction of Financi...Discussion on Difficulties and Countermeasures in the Construction of Financi...
Discussion on Difficulties and Countermeasures in the Construction of Financi...
ijtsrd3 visualizações
A Comparative Study of Human Resource Practices between Private and Public Se... por ijtsrd
A Comparative Study of Human Resource Practices between Private and Public Se...A Comparative Study of Human Resource Practices between Private and Public Se...
A Comparative Study of Human Resource Practices between Private and Public Se...
ijtsrd3 visualizações
A Review on the Frying Stability of Vegetable Oil Blends por ijtsrd
A Review on the Frying Stability of Vegetable Oil BlendsA Review on the Frying Stability of Vegetable Oil Blends
A Review on the Frying Stability of Vegetable Oil Blends
ijtsrd3 visualizações
Auto Immune Disorders and Its Homoeopathic Approach por ijtsrd
Auto Immune Disorders and Its Homoeopathic ApproachAuto Immune Disorders and Its Homoeopathic Approach
Auto Immune Disorders and Its Homoeopathic Approach
ijtsrd17 visualizações
Unraveling the Mind How Cognitive Biases Shape Nurses Decision Making por ijtsrd
Unraveling the Mind How Cognitive Biases Shape Nurses Decision MakingUnraveling the Mind How Cognitive Biases Shape Nurses Decision Making
Unraveling the Mind How Cognitive Biases Shape Nurses Decision Making
ijtsrd3 visualizações
Homoeopathic Management of Hemoptysis por ijtsrd
Homoeopathic Management of HemoptysisHomoeopathic Management of Hemoptysis
Homoeopathic Management of Hemoptysis
ijtsrd7 visualizações
Ayurvedic Management in Case of Depression W.S.R. to Kapahaj Unmad A Case Study por ijtsrd
Ayurvedic Management in Case of Depression W.S.R. to Kapahaj Unmad A Case StudyAyurvedic Management in Case of Depression W.S.R. to Kapahaj Unmad A Case Study
Ayurvedic Management in Case of Depression W.S.R. to Kapahaj Unmad A Case Study
ijtsrd8 visualizações
Data Analytics and Efficiency of Public Hospitals in Rivers State, Nigeria por ijtsrd
Data Analytics and Efficiency of Public Hospitals in Rivers State, NigeriaData Analytics and Efficiency of Public Hospitals in Rivers State, Nigeria
Data Analytics and Efficiency of Public Hospitals in Rivers State, Nigeria
ijtsrd3 visualizações

Último

STERILITY TEST.pptx por
STERILITY TEST.pptxSTERILITY TEST.pptx
STERILITY TEST.pptxAnupkumar Sharma
125 visualizações9 slides
Structure and Functions of Cell.pdf por
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdfNithya Murugan
368 visualizações10 slides
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx por
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
598 visualizações81 slides
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
317 visualizações50 slides
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}DR .PALLAVI PATHANIA
240 visualizações195 slides
Lecture: Open Innovation por
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open InnovationMichal Hron
96 visualizações56 slides

Último(20)

STERILITY TEST.pptx por Anupkumar Sharma
STERILITY TEST.pptxSTERILITY TEST.pptx
STERILITY TEST.pptx
Anupkumar Sharma125 visualizações
Structure and Functions of Cell.pdf por Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan368 visualizações
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx por Debapriya Chakraborty
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty598 visualizações
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP317 visualizações
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1} por DR .PALLAVI PATHANIA
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
ANATOMY AND PHYSIOLOGY UNIT 1 { PART-1}
DR .PALLAVI PATHANIA240 visualizações
Lecture: Open Innovation por Michal Hron
Lecture: Open InnovationLecture: Open Innovation
Lecture: Open Innovation
Michal Hron96 visualizações
American Psychological Association 7th Edition.pptx por SamiullahAfridi4
American Psychological Association  7th Edition.pptxAmerican Psychological Association  7th Edition.pptx
American Psychological Association 7th Edition.pptx
SamiullahAfridi482 visualizações
11.28.23 Social Capital and Social Exclusion.pptx por mary850239
11.28.23 Social Capital and Social Exclusion.pptx11.28.23 Social Capital and Social Exclusion.pptx
11.28.23 Social Capital and Social Exclusion.pptx
mary850239281 visualizações
Narration ppt.pptx por TARIQ KHAN
Narration  ppt.pptxNarration  ppt.pptx
Narration ppt.pptx
TARIQ KHAN119 visualizações
AI Tools for Business and Startups por Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov101 visualizações
Are we onboard yet University of Sussex.pptx por Jisc
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
Jisc77 visualizações
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively por PECB
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB 545 visualizações
Psychology KS4 por WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch68 visualizações
Universe revised.pdf por DrHafizKosar
Universe revised.pdfUniverse revised.pdf
Universe revised.pdf
DrHafizKosar112 visualizações
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) por AnshulDewangan3
 Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation) Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
Compare the flora and fauna of Kerala and Chhattisgarh ( Charttabulation)
AnshulDewangan3316 visualizações
Narration lesson plan.docx por TARIQ KHAN
Narration lesson plan.docxNarration lesson plan.docx
Narration lesson plan.docx
TARIQ KHAN104 visualizações
Women from Hackney’s History: Stoke Newington by Sue Doe por History of Stoke Newington
Women from Hackney’s History: Stoke Newington by Sue DoeWomen from Hackney’s History: Stoke Newington by Sue Doe
Women from Hackney’s History: Stoke Newington by Sue Doe
History of Stoke Newington141 visualizações
Material del tarjetero LEES Travesías.docx por Norberto Millán Muñoz
Material del tarjetero LEES Travesías.docxMaterial del tarjetero LEES Travesías.docx
Material del tarjetero LEES Travesías.docx
Norberto Millán Muñoz68 visualizações

A Review on Wireless Sensor Network Security

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 5, August 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 340 A Review on Wireless Sensor Network Security Vijay Kumar Kalakar1, Hirdesh Chack2, Syed Tariq Ali1 1,2Lecturer, Department of Electronics and Telecommunication, 1Government Women’s Polytechnic College, Bhopal, Madhya Pradesh, India 2Government Polytechnic College, Jatara, Madhya Pradesh, India ABSTRACT Wireless sensor networks are attracting more and more coverage. A number of surveillance, regulation, and tracking systems have been developed for different scenarios in recent years. Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundancein future. The inclusion ofwireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identifythe securitythreats,reviewproposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks. KEYWORDS: Wireless sensor networks, Security, Attack, Holistic, Challenge How to cite this paper: Vijay Kumar Kalakar | Hirdesh Chack | Syed Tariq Ali "A Review on Wireless Sensor Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-5, August 2020, pp.340-345, URL: www.ijtsrd.com/papers/ijtsrd31815.pdf Copyright © 2020 by author(s) and International Journal of TrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) I. INTRODUCTION The Wireless Sensor Networks ( WSNs) can be defined as a wireless, self-configured network without infrastructure, which monitors physical, environmental and sound conditions, temperature , vibration, pressures, movement and pollutants and collectively transfers their information via the network to a principal place or sink, where data can be monitored and analyzed. A sink or base station acts as a networking interface. By injecting queries and collecting results from the sink, you can get the required information from the network [1, 2]. Wireless sensor networks (WSN) are an ad hoc network system where resource-contracted sensor nodes are usedto track and manage functions of a specific type. One or more detection units, a single processor, a memory, a communication element and a power source comprise a typical configuration of the sensor nodes. These sensors are then used to calculate a certain physical magnitude from the surrounding environment [3, 4]. In general, hundreds of thousands of sensor nodules in a wireless sensor network. Radio signals may be used to contact the sensor nodes. A wireless node has sensor and computing equipment, radio transceivers and control supplies [5]. The resource limitations of individualnodesina wireless sensor network (WSN) are limited: there is little speed of transmission, storage space and bandwidth of communication. After the sensor nodes are installed, they often coordinate themselves through multi-shop connectivity to an effective network infrastructure. And onboard sensors begin to capture useful details. Wireless sensor devices also respond to "control site" queries to provide sensing samples or to perform specific directives. Whether constant or event controlled operation modeofthe sensor nodes is feasible. For geographic details and positioning purposes, global positioning system (GPS) and local positioning algorithms may be used [1, 4]. Figure1. Wireless sensor network. IJTSRD31815
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 341 The interaction between sensors takes place with wireless transceivers in the case of a wireless sensor network. Numerous scholars focused on different problems relevant to these forms of networks owing to the enticing characteristics of wireless sensor networks. Although routing approaches and the simulation of wireless sensors for networks are becoming a major concern, the safety issues are not yet completely addressed. Throughout this article, we address protection concerns and threats for wireless sensor networks of the next decade and explore the main criteria for comprehensive analysis [7]. II. STRUCTURE OF A WIRELESS SENSOR NETWORK The Wireless Sensor Network structure consists of different radio communications networktopologies.Thefollowingisashort discussion of the network topologies applicable to wireless sensor networks [5, 6]: Star network (Single point-to – multipoint) A star network isa topology forcommunication thatcan be sent and/or received from a single station tocertainremotenodes. You cannot send messages to each other via remote nodes. This form of network has the benefit of being quick, enabling the remote node to retain a minimal energy consumption. Low latency communication between the remote node and the base station is also possible. The downside of such a network is that it needs to be inside the radio propagation spectrum of all specific nodes and not as reliable as other networks because of the need to control the network on a single node. Mesh Network A mesh network can transmit data to a nodewithin the radio transmission range ofa network. Thisenableswhatisregardedas multi-hop contact, i.e., to be done by an intermediary node where a node wants to transmita message toanothernodewhichis not inside the radio transmission range. Redundancy and scalability benefit from this network topology. If a node fails, any other node within its rangecan still be communicated by a distance node, whichcan transmission the message to therequired place. Hybrid Star-Mesh Network A hybrid between the star and the mesh network offers the communication network to be robust and versatile whilst maintaining the ability to minimize the power consumption of wireless sensors. The lowest power sensor nodes are not capable of forwarding messages in this network topology. This ensures a minimum energy consumption. However, there are other nodes in the network that can be transferred from low power nodes to other nodes on the network with multihop capabilities [8]. III. STRUCTURE OF A WIRELESS SENSOR NODE Four fundamentalcomponents suchas the sensor unit, processor unit, transceiver unit and power unit shown inthefigureare presented at a sensor Node. There are additional components dependent on applications such as a location search system, a power generator and a mobilizer. Two sub-units: sensors,and digitalconverter analog (ADCs) are usually made up of sensing units [9]. Figure 2 Components of a sensor node
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 342 Figure 3 Functional block diagram of a sensor node The sensors convert analog signals into digital signals through ADC and then relay them intothetreatmentunit.Theprocessing unit is usually linked to a small storage unit andcan manage the processes by which the sensor node workswithothernodesto perform tasks. The network node is attached to a transceiver array. The control generator is one of the key components of a sensor node. A power-scavenging unit, such as solar cells, can support power units. The remaining sub-units of the node depend on the application [10]. IV. SECURITY ISSUES IN WIRELESS SENSOR NETWORK Many security risks and assaults in wireless networks are much like their wired equivalent, though others have wireless networking included. Wireless networks are generally more vulnerable to differentsecuritythreatssincetheunguidedmedium is more vulnerable to safety attacks than the guided medium. A simple eavesdropper candidate is the radio nature ofwireless communication. In most cases, different security issues and threats associated with the wireless ad-hoc networks that we consider also apply to wireless sensor networks. While the ad-hoc networks are self-organized, decentralized topology, the peer-to - peer networks that comprise a group of mobile nodes and the centralized entity is not available; the networks witha wireless sensor may include a command node or base station (central entity often referred to as a sink). Thebigchallenge, however, is caused by theresourcelimitationofsmall sensors [7, 8]. WSNs are vulnerable against so many attacks. Attackers can attack the radio transmission; add their own data bits to the channel, replay old packets and any other type of attack. A secure network ought to support all security properties. Attackers may deploy some malicious nodes in the network with similar capabilities as of normal node or may overwrite the memoryof normal deployed node by capturing them. Attacks in wireless sensor network are shown in Figure 4. They are roughly categorized as follows: A) Based on Routing B) Based on Capability C) Based on Protocol Layer. Figure 4 Attack classification in WSN
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 343 4.1. Based on Capability The attacks can be categorized on the basis of the source of the attacks i.e. Internal or External, and on the behavior of the attack i.e. Passive or Active attack. This classification is important because the attacker can exploit the network either as internal, external or/ as well as active or passive attack against the network. External attackers are mainly outside the networks who want to getaccess to the network and once they getaccessto the network they start sending bogus packets, denial of service in order to disrupt the performance of the whole network. This attack is same, like the attacks that are made against wired network. These attacks can be prevented by implementing security measures suchasfirewall, where the access of unauthorized person to the network can be mitigated. While in internal attack the attacker wants to have normal access to the network as well as participate in the normal activities of the network. The attacker gain access in the network as new node either by compromising a current node in the network or by malicious impersonationandstart its malicious behavior. Internal attack ismore severeattacks then external attacks. When the attacker disrupts the performance of the network, steal important information and try to destroy the data during the exchange in the network. Active attacks can an internal or an external attack. The active attacks are meant to destroy the performance of network in such case the active attack act as internal node in the network. Being an active part of the network it is easy for the node to exploit and hijack any internal node to use it to introduce bogus packets injection or denial of service. This attack brings the attacker in strong position where attacker can modify, fabricate and replays the massages. Attackers in passive attacks do not disrupt the normal operations of the network. In Passive attack, the attacker listen to network in order to get information, what is going on in the network? It listens to the network in order to know and understandhow the nodes are communicatingwith each other, how they are located in the network. Before the attacker launch an attack against the network, the attacker has enough information about the network that it can easily hijack and inject attack in the network. 4.2. Based on Protocol Layer WSN is divided into different layers. The working of each layer is different. The attacks on the basis of protocol layers are explained below: A. Physical Layer Physical layer is used for transmitting information in raw bits over the wireless or wired medium. It is easy to jam a common radio signal. In general, physical layer attacks are categorized as: Eavesdropping, Tampering and Jamming. In eavesdropping attack, an unauthorized receiver reads the messages. Jammingattack implements underDoSattack.Itis the interference with the radio frequency used by the network nodes. This completely changes the working of network. B. Link Layer Data link layer is utilized to ensure the proper communication on physical layer between nodes. This layer is incharge ofmultiplexing, error detection, packetscollision prevention, repeated transmission of data and so on. Link- layer threats include collisions, interrogation, and packet replay. Error detection and correcting codes can be used to decrease the number of collisions but due to this the routing overhead in the network is increased. Another connection layer danger to WSNs is the denial-of-sleep attack, in which node is unable to go to into the sleep mode. This decreases the whole network lifetime. C. Network Layer For the data routing between nodes, nodes to sink, node to BS, node to CH, and vice versa, this layer is responsible. A direct attack on Routing protocols by the attackers can have impact on network data traffic, indulge themselves into the data path between the source and destination, and by this control the data flow. Thisinfers that effective and powerful routing protocols are required to manage node failure and security attacks. Some routing protocol attacks are: wormhole attacks, acknowledgement spoofing, selective forwarding, black holes and so forth. D. Transport Layer Transport Layer isutilized to build upa communication link for outer sensor network joined with the internet. This can be considered as the most complex issue in WSNs. Attacksof the transport layer protocol are flooding and desynchronization. Flooding attack is used to deplete the node's memory by sending numerous requests for connection establishment. In the de-synchronization attack, the attacker node forges packets to at least one or both ends of a connection using different sequence numbers on the packets. In this way, host requests for retransmission of the missed packet frames. V. SECURITY PROTOCOLS IN SENSOR NETWORKS Cryptography isa basic technique to achieve thesecurityina network. This establishesa secure relationshipbetweentwo end points. In this, sender encrypts the original data and receiver decrypts the received data to obtain an original data. Different types of keys are used in the process of cryptography. The various protocols that are proposed by different authors for solving the security issue in WSN are: A. SPINs SPIN (Sensor Protocols for Information via Negotiation) protocol works in three steps. First, a node advertises the ADV packet containing the metadata. If the received node is interested in the data then it sends the request fordatausing REQ packet. Finally, the advertiser node after receiving request sends the DATA packet to the requestor node. It performs best in small size networks because ofitsefficiency and high latency properties. Typical SPIN consists of two secure building blocks named as μTESLA (Timed Efficient Stream Loss-tolerant Authentication) and SNEP (Sensor Network Encryption Protocol). SNEP provides confidentiality, authentication and integrity. It uses the concept of encryption. To authenticate the data, MAC (Message authentication Code) is used. It adds 8 bytes to the message. To reduce the communication overhead, SNEP uses a shared counter between sender node and
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 344 receiver node. After each block counter gets incremented. Counter helps in identifying the freshness of data. In TESLA, digital signatures are used to authenticate the data packet. Sink node computes a MAC on the packet after receiving the packet with the secret key to send an authenticated packet back to source. After receiving a packet, node confirms that the sink does not disclose the computed MAC key to other nodes. With this, receiving node assures that data packet is original and no alterations are done in the packet. B. LEAP LEAP (Localized Encryptionand Authentication Protocol)is a protocol with key management scheme that is very efficient with its security mechanisms used for large scale distributed sensor networks. It generally supports forinside network processing such as data aggregation. In-network processing results in reduction of the energyconsumptionin network. To provide the confidentiality and authentication to the data packet, LEAP uses multiple keys mechanism. For each node four keys are used knownas individual, pair wise, cluster and group key. All are symmetric keys and use as follows:  Individual Key: It is the unique key used for the communication between source node and thesinknode.  Pair wise Key: It is shared with another sensor nodes.  Cluster Key: It is used for locally broadcast messages and shares it between the node and all its surrounding neighboring nodes.  Group Key: globally shared key used by all the network nodes These keys can also be used by other non-secured protocols to increase the network security. LEAP is satisfies several security and performance requirements of WSN. LEAP is used to defend against HELLO Floods Attack, Sybil Attack and Wormhole Attack. C. TINYSEC TINYSEC is link layer security architecture for WSNs. It is a lightweight protocol. It supports integrity, confidentiality and authentication. Toachieve confidentiality, encryptionis done by using CBC (Cipher-blockchaining)modewithcipher text stealing, and authentication is done using CBC-MAC. No counters are used in TINYSEC. Hence, it doesn’t check the data freshness. Authorized senders and receivers share a secret key to compute a MAC. TINYSEC has two different security options. One is for authenticated and encrypted messages (TinySec-AE) and another is for authenticated messages (TinySec-Auth).In TinySec-AE, the data payloadis encrypted and the received data packet isauthenticatedwith a MAC. In TinySec-Auth mode, the entire packet is authenticated with a MAC, but on the other hand the data payload is not encrypted. In CBC, Initialization Vector (IV) is used to achieve semantic security. Some of the messages are same with only little variation. In that case IV adds the variation to the encrypted process. To decrypt the message receiver must use the IV. IVs are not secret and are included in the same packet with the encrypted data. D. ZIGBEE ZIGBEEisa typicalwireless communication technology. Itis used in various applications such as military security, home automation and environment monitoring. IEEE 802.15.4isa standard used for ZIGBEE. It supports data confidentiality and integrity. To implement the security mechanismZIGBEE uses 128 bit keys. A trust center is used in ZIGBEE which authenticates and allows other devices/nodes to join the network and also distribute the keys. Generally, ZIGBEE coordinator performs this function. Three different roles in ZIGBEE are:  Trust Manager: It authenticates the devices which are requesting to join the network.  Network Manager: It manages the network keys and helps to maintain and distribute the network keys.  Configuration Manager: It configures the security mechanism and enables end-to-end security between devices. VI. HOLISTIC SECURITY IN WIRELESS SENSOR NETWORKS A holistic approach aims at improving the performance of wireless sensor networks with respect to security, longevity and connectivity under changing environmental conditions. The holistic approach of security concerns about involving all the layers for ensuring overall security in a network. For such a network, a single security solution for a single layer might not bean efficient solution rather employing a holistic approach could be the best option. The holistic approach has some basic principles like, in a given network; security is to be ensured for all the layers of the protocol stack, the cost for ensuring security should not surpass the assessed security risk at a specific time, if there is no physical security ensured for the sensors, the security measures must be able to exhibit a graceful degradation if some of the sensors in the network are compromised, out of order or captured by the enemy and the security measures should be developed to work in a decentralized fashion. If security is not considered for all of the security layers, for example; if a sensor is somehow captured or jammed in the physical layer, the security for the overall network breaks despite the fact that, there are some efficient security mechanisms working in other layers. By building security layers as in the holistic approach, protection could be established for the overall network. VII. CONCLUSIONS This paper emphasizes the WSN's safety issue. Safety in the network sensor is the major challenge. Safe contact is needed for some applications such as the military. Certain security requirements must be met for a secure communication network. Centered on different criteria, this paper discusses security risks. Specificprocedureshavebeen developed to satisfy the safety requirements. In many mission-critical applications, the wireless sensor networks continue to grow and become widely utilized. Therefore, the need for protection is paramount. The wireless sensor network, however, suffers from several limitations including low energy levels, processing and storage, unreliable communication and unattended operation, etc. However, it is a major research challenge to develop and make this detection mechanism efficient.Again, ensuring holistic security in wireless sensor network is a major research issue. Many of todays proposed security schemes are based on specific network models. As a collective attempt to follow a specific model to guarantee each layer’s protection is not feasible, in the future, the
  • 6. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31815 | Volume – 4 | Issue – 5 | July-August 2020 Page 345 development of security protocols for each layer would lead to a challenging investigation integrating all procedures for each layer in partnership. REFERENCES [1] Culler, D. E and Hong, W., “Wireless Sensor Networks”, Communication of the ACM, Vol. 47, No. 6, June 2004, pp. 30-33. [2] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and Cayirci, E., “Wireless Sensor Networks: A Survey”, Computer Networks, 38, 2002, pp. 393-422. [3] Dai, S, Jing, X, and Li, L, “Research and analysis on routing protocols for wireless sensor networks”, Proc. International Conference on Communications,Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411. [4] Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F. and Hong, C. S., “A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks”, to appear in IEEE ICNEWS 2006. [5] Undercoffer, J., Avancha, S., Joshi, A., and Pinkston, J., “Security for Sensor Networks”, CADIP Research Symposium, 2002, available at, http://www.cs.sfu.ca/~angiez/personal/paper/sensor -ids.pdf [6] Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D., “SPINS: Security Protocols for Sensor Networks”, Wireless Networks, vol. 8, no. 5, 2002, pp. 521-534. [7] Jolly, G., Kuscu, M. C., Kokate, P., and Younis, M.,“ALow- Energy Key Management Protocol for Wireless Sensor Networks”, Proc. Eighth IEEE InternationalSymposium on Computers and Communication, 2003. (ISCC2003). vol.1, pp. 335 - 340. [8] Rabaey, J. M., Ammer, J., Karalar, T., Suetfei Li., Otis, B., Sheets, M., and Tuan, T., “PicoRadios for wireless sensor networks: the next challenge inultra-lowpower design” 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), Volume 1, 3-7 Feb. 2002, pp. 200 – 201. [9] Hollar, S, “COTS Dust”, Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley, 2000. [10] Saleh, M. and Khatib, I. A., “Throughput Analysis of WEP Security in Ad Hoc Sensor Networks”, Proc. The Second International Conference on Innovations in Information Technology (IIT’05), September 26-28, Dubai, 2005.