SlideShare a Scribd company logo
1 of 9
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 34-42
www.iosrjournals.org
DOI: 10.9790/0661-17133442 www.iosrjournals.org 34 | Page
Issues and Challenges in Distributed Sensor Networks- A Review
Sharada Y Yalavigi, Dr. Krishnamurthy G.N, Dr. NandiniSidnal
Abstract:Distributed Sensor networks (DSN) is an emerging technology and have great potential to be
employed in critical situations like battlefields and commercial applications such as process management,
health care monitoring, environmental/earth sensing, industrial monitoring and many more scenarios. One of
the major challenges distributed sensor networks face today is security. While the deployment of sensor nodes in
an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power
and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing
technology combined with processing power and wireless communication makes it profitable for being exploited
in great quantity in future. The wireless communication technology also acquires various types of security
threats. This paper discusses a wide variety of security, research, computational and design issues along with
the challenges faced.
Keywords: Distributed Sensor Network, Design issues, Security issues, Defensive mechanisms, Challenges.
I. Introduction
A Distributed Sensor Network can be defined as a set of spatially scattered intelligent sensors designed
to obtain measurement from the environment, abstract relevant information from the data gathered, and to derive
appropriate interferences from the information gained. Typical examples include temperature, light, sound, and
humidity. These sensor readings are transmitted over a wireless channel to a running application that makes
decisions based on these sensor readings. Many applications have been proposed for distributed sensor
networks, and many of these applications have specific quality of service (QoS) requirements that offer
additional challenges to the application designer.[18],[19].
We consider two aspects [8] to motivate an application-based viewpoint: First, what aspects of wireless
sensors make the implementation of applications more challenging, or at least different?
One widely recognized issue is the limited power available to each wireless sensor node, but other
challenges such as limited storage or processing capabilities play a significant role in constraining the
application development. Second, what services are required for a wireless sensor network application toachieve
its intended purpose? A number of widely applicable services, such as time synchronization andlocation
determination are briefly discussed. Other services are needed to support database requirements, such as
message routing, topology management, and data aggregation and storage.In this paper we discuss a wide
variety of security, research, computational and design issues along with the challenges faced.
II. Design Issues And Challenges In Sensor Networks
Several design challenges [4],[5],[16],[20],[21]present themselves to designers of wireless sensor
networkapplications. The limited resources available to individual sensor nodesimplies designers must develop
highlydistributed, fault-tolerant, and energyefficientapplications in a small memory-footprint. For wireless
sensor network applications to have reasonable longevity, an aggressiveenergy-management policy is
mandatory. This is currently the greatest designchallenge in any wireless sensor network application. Several
key differences between more traditional ad hoc networks and wirelesssensor networks exist. [8]
1) Individual nodes in a wireless sensor network have limited computationalpower and storage capacity. They
operate on nonrenewable power sourcesand employ a short-range transceiver to send and receive messages.
2) The number of nodes in a wireless sensor network can be several orders of magnitudehigher than in an ad
hoc network. Thus, algorithm scalability is animportant design criterion for sensor network applications.
3) Sensor nodes are generally densely deployed in the area of interest. This densedeployment can be leveraged
by the application, since nodes in close proximitycan collaborate locally prior to relaying information back
to the base station.
4) Sensor networks are prone to frequent topology changes. This is due to severalreasons, such as hardware
failure, depleted batteries, intermittent radio interference,environmental factors, or the addition of sensor
nodes. As a result,applications require a degree of inherent fault tolerance and the ability toreconfigure
themselves as the network topology evolves over time.
5) Wireless sensor networks do not employ a point-to-point communication paradigmbecause they are usually
not aware of the entire size of the network andnodes are not uniquely identifiable. Consequently, it is not
possible to individuallyaddress a specific node. Paradigms, such as directed diffusion [,], employa data-
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 35 | Page
centric view of generated sensor data. They identify informationproduced by the sensor network as
<attribute, value> pairs. Nodes requestdata by disseminating interests for this named data throughout the
network.Data that matches the criterion are relayed back toward the querying node.
Even with the limitations individual sensor nodes possess and the designchallenges application developers face,
several advantages exist for instrumentingan area with a wireless sensor network:[8]
1) Due to the dense deployment of a greater number of nodes, a higher level offault tolerance is achievable in
wireless sensor networks.
2) Coverage of a large area is possible through the union of coverage of severalsmall sensors.
3) Coverage of a particular area and terrain can be shaped as needed to overcomeany potential barriers or holes
in the area under observation.
4) It is possible to incrementally extend coverage of the observed area and densityby deploying additional
sensor nodes within the region of interest.
5) An improvement in sensing quality is achieved by combining multiple,independent sensor readings. Local
collaboration between nearby sensornodes achieves a higher level of confidence in observed phenomena.
6) Since nodes are deployed in close proximity to the sensed event, this overcomesany ambient environmental
factors that might otherwise interfere withobservation of the desired phenomenon.
2.1 Data Aggregation:
Redundancy exists in sensordata in both the temporal and spatial domains. That is, readings collected
by asingle sensor at different times or among neighboring sensors may be highlycorrelated, and contain
redundant information. Instead of transmitting all thehighly correlated information to subscribers, it may be
more effective forsome intermediate sensor node(s) to digest the information received andcome up with a
concise digest, in order to reduce the amount of raw data tobe transmitted (and hence the power incurred, and
bandwidth consumed, intransmission). This technique is termed as dataaggregation (also called data
fusion).Data fusion can also be integrated with routing. Compared withtraditional address-centric routing, which
finds the shortest paths betweenpairs of end nodes, data-fusion–centric routing aims to locate routes thatlead to
the largest degree of data aggregation [41].
Theaggregation typically follows a tree topology rooted at thesink. Each leaf node would deliver its
collected data to itsparent node. Intermediate sensor nodes of the tree mayoptionally perform certain operations
(e.g., sum, maximum, minimum, mean, etc.) on the received data and forward theresult. Because the wireless
medium is shared, transmissionsto forward the data need to be coordinated in orderto reduce interference and
avoid collision. The fundamentalchallenge can be stated as: How can the aggregation transmissionsbe scheduled
in a wireless sensor network suchthat no collision may occur and the total number of timeslots used (referred to
as aggregation latency) is minimized?This is known as the Minimum-Latency Aggregation Scheduling(MLAS)
problem in the literature.The MLAS problem is typically approached in two steps:(i) data aggregation tree
construction and (ii) link transmissionscheduling. For (ii), we assume the simplest modein which every non-leaf
node in the tree will make onlyone transmission, after all the data from its child nodeshave been received. A
correct solution to the MLAS problemrequires that no concurrent transmissions interfering witheach other
should take place. If steps (i) and (ii) are carriedout simultaneously in a solution, we have a „„joint‟‟ design.
2.2 Time Synchronization
Sensor networks are used to monitor real-world phenomena. For such monitoringapplications, physical
time often plays a crucial role. For example,the times of occurrence of physical events are often crucial for the
observer to associate event reports with the originating physical events. Also, methods for localization of sensor
nodes based on the measurement of time of flight or difference of arrival time of certain signals also require
synchronized time. Providing synchronized physical time is a complex task dueto various challenging
characteristics of sensor networks like energy and other resources, network dynamics, infrastructure and
configuration.[17],[37].
Different applications like beam- forming array, data aggregation, recognition of duplicate detection of
same event from different sensors, ordering of logged events have different synchronization requirements and
also any single synchronization mechanism is not appropriate for all circumstances sensors should have multiple
methods available to them so that they can dynamically trade precision for energy, or scope for convergence
time. Existing time synchronization methods like NTP conserve use of bandwidth and try to keep the clock
synchronization at all times but are not aware of the stringent energy constraints and the heterogeneity of the
hardware that may be deployed in sensornets.
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 36 | Page
2.3 Localization
In emerging sensor network applications it is necessary to accurately orient the nodes with respect to a
global coordinate system in order to report data that is geographically meaningful. Furthermore, basic middle
ware services such as routing often rely on location information (e.g., geographic routing). Application contexts
and potential massive scale make it unrealistic to rely on careful placement or uniform arrangement of sensors.
Rather than use globally accessible beacons or expensive GPS to localize each sensor, we would like the sensors
to self-organize a coordinate system.
Some of the design goals of localization in wireless sensor networks are:
 RF-based: Normally, the sensors have some kind of short-range radio transceivers for communication. By
leveraging this radio for localization the high cost and size requirements of GPS can be avoided.
 Receiver-based: For greater scalability, the responsibility for localization must lie with the receiving node
that needs to be localized and not with the reference points.
 Ad Hoc: For easy deployment, the solution should not require preplanning or extensive infrastructure.
 Low Energy: Since the sensors have modest processing capabilities, the mechanisms should minimize
computation and message costs to reduce power consumption.
 Adaptive Fidelity: The accuracy of the localization algorithms should be adaptive to the granularity of
available reference points.
Localization methods typically rely on some form of communication between reference points with
known positions and the receiver node that needs to be located. Various localization techniques can be classified
into two broad categories based on the granularity of information inferred during the communication. Fine-
grained localization systems (e.g., GPS) provide high precision location information, typically estimated ranges
or angles relative to beacons (reference points) and compute location of the unknown node using trilateration
(position estimation from distance to three points) or triangulation (position estimation from angles to three
points). Coarse-grained localization systems estimate unknown node location from proximity to beacons or
landmarks
2.4 Node Deployment
Node deployment[11][45] in WSNs is application dependent and affects the performance of the routing
protocol. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors
are manually placed and data is routed through pre-determined paths. However, in random node deployment, the
sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. If the resultant distribution
of nodes is not uniform, optimal clustering becomes necessary to allow connectivity and enable energy efficient
network operation. Intersensor communication is normally within short transmission ranges due to energy and
bandwidth limitations. Therefore, it is most likely that a route will consist of multiple wireless hops.
2.5 Network Dynamics
Most of the network architectures assume that sensor nodes are stationary. However, mobility of both
BS‟s and sensor nodes is sometimes necessary in many applications. Routing messages from or to moving nodes
is more challenging since route stability becomes an important issue, in addition to energy, bandwidth etc.
Moreover, the sensed phenomenon can be either dynamic or static depending on the application, e.g., it is
dynamic in a target detection/tracking application, while it is static in forest monitoring for early fire prevention.
Monitoring static events allows the network to work in a reactive mode, simply generating traffic when
reporting. Dynamic events in most applications require periodic reporting and consequently generate significant
traffic to be routed to the BS [12].
2.6 Energy Efficiency
Once the WSN is functional it becomes difficultto replace or recharge the battery of sensor nodes. This
further posesthe challenge to maintain sensors in hostile and harsh environmentand scaling of sensor network to
hundreds or thousands of nodes.Therefore, an energy-efficient mechanism is required to save energyand prolong
the network lifetime [12].
2.7 Node/Link Heterogeneity
In many studies, all sensor nodes wereassumed to be homogeneous, i.e., having equal capacity in terms
ofcomputation, communication, and power. However, depending onthe application a sensor node can have
different role or capability.The existence of heterogeneous set of sensors raises many technicalissues related to
data routing. These special sensors can be eitherdeployed independently or the different functionalities can
beincluded in the same sensor nodes. Even data reading and reportingcan be generated from these sensors at
different rates, subject todiverse quality of service constraints, and can follow multiple datareporting models.
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 37 | Page
For example, hierarchical protocols designate acluster-head (CH) node different from the normal sensors.
Thesecluster heads can be chosen from the deployed sensors or can bemore powerful than other sensor nodes in
terms of energy, bandwidth,and memory. Hence, the burden of transmission to the BS is handledby the set of
cluster-heads [12].
2.8 Fault tolerance and reliability
For many WSN applications, datamust be delivered reliably over the noisy, error-prone, and
timevaryingwireless channel. In such cases, data verification andcorrection on each layer of the network are
critical to provide accurate results. Additionally, sensor nodes are expected to performself-testing, self-
calibrating, self-repair and self-recovery proceduresduring their lifetime.
2.9 Scalability
Sensor networks should be scalable or flexible. Sensor networks dynamically adopt changes in node
density and topology. Sometimes few nodes are added to the sensor networks existed nodes for the purpose of
coverage issue. So sensor network is flexible to adapt these changes.
2.10 Data Centric Routing
In data-centric routing protocol, whenever a sink requires any data it sends a query message to the
different part of the sensor network field. After receiving this query message sensors node replies and sends data
to the sink. In data-centric protocol attribute based naming is used which specifies the properties of the data.
III. Security Issues And Challenges In Dsn
3.1 Security Requirements [2]-[6],[13][14][42]:
1) Availability
Availability determines whether a node has the ability touse the resources and whether the network is
available forthe messages to communicate. However, failure of thebase station will eventuallythreaten the entire
sensor network. Thus availability is ofprimary importance for maintaining an operationalnetwork.
2) Authentication
Authentication ensures the reliability of the message byidentifying its origin. Attacks in sensor
networks do notjust involve the alteration of packets; adversaries can alsoinject additional false packets []. Data
authenticationverifies the identity of the senders and receivers. Dataauthentication is achieved through
symmetric orasymmetric mechanisms where sending and receivingnodes share secret keys. Due to the wireless
nature of themedia and the unattended nature of sensor networks, it isextremely challenging to ensure
authentication.
3) Confidentiality
Confidentiality is the ability to conceal messages froma passive attacker so that any message
communicated viathe sensor network remains confidential. This is the mostimportant issue in network security.
A sensor node shouldnot reveal its data to the neighbors.
4) Integrity
Data integrity in sensor networks is needed to ensurethe reliability of the data and refers to the ability
toconfirm that a message has not been tampered with, altered or changed. Even if the network has
confidentialitymeasures, there is still a possibility that the data integrityhas been compromised by alterations.
The integrity of thenetwork will be in trouble when:
‱ A malicious node present in the network injectsfalse data.
‱ Unstable conditions due to wireless channel causedamage or loss of data. [4]
5) Data Freshness
Even if confidentiality and data integrity are assured, thereis a need to ensure the freshness of each
message.Informally, data freshness [] suggests that the data isrecent, and it ensures that no old messages have
beenreplayed. To solve this problem a nonce, or another time related counter, can be added into the packet to
ensure data freshness
3.2 Security Attacks:
Attackers can be classified into two types: i) external attackers that are not authorized participants of
the sensor network and ii) internal attackers that have compromised a legitimate sensor and use it to launch
attacks in the network.Furthermore, attackers can be classified into passive and active. Passive attackers monitor
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 38 | Page
network traffic without interfering with it. Their aim is to eavesdrop on the exchanged information and to
acquire private data or to infer about information-sensitive applications that execute in the sensors. Active
attackers disrupt network operation by launching several types of attacks that cause DoS (denial of service) in
the DSN.
1) Denial of Service (DoS)
A Denial of Service attack in sensor networks in general is defined as any event that eliminates the
network‟s capacity to perform its desired function. DoS attacks in distributed sensor networks may be carried
out at different layers like the physical, link, network and transport layers. This occurs by the unintentional
failure of sensor nodes. The simplest DoS attack tries to exhaust the resources available to the victim node, by
transmitting additional unwanted packets and thus prevents legitimate sensor network users from tapping work
or resources to which these nodes are deployed. In DSNs, several types of Denial of Service attacks in different
layers might be performed, i.e. at physical layer, the Denial of Service attacks could be jamming and tampering,
at link layer, collision, exhaustion, unfairness, at network layer, neglect and greed, homing, misdirection, black
holes and at transport layer this attack could be performed by malicious flooding and resynchronizations.
2) Spoofed, altered or replay of routing information
The most outstanding attack on routing is to alter, spoof, or just replay routing information and it is
known as false routing information.Malicious nodes simply drop data packets quietly, modify the data content,
generate false error messages or redirects the traffic.[17]
3) Selective forwarding
In this attack an attacker comprise itself in a data stream lane and can selectivelydrop only distinct
packets. In sensor networks it is assumed that nodes faithfully forward received messages butsome
compromised node might refuse to forward packets, though neighbors may start using another route.
4) Sinkhole attacks
The main goal of an adversary in sinkhole attack is to attract all the traffic toward itselfthrough an
agreement node. Sinkhole attacks [10] typically work by making a compromised node look especiallyattractive
to surrounding nodes.
5) Sybil attacks
In Sybil attack [10], a single node makes replicas of it and distributes it in multiple locations of
thenetwork. Authentication and encryption techniques can prevent an outsider to launch a Sybil attack on
thesensor network.
6) Wormhole attacks
In wormhole attack, more than two malicious colluding sensor nodes does a virtual tunnel in the sensor
network, which is used to forward message packets between the tunnel edge points. This tunnel establishes
shorter links in the network. In which adversary documents forwards packets at one location in the sensor
network, tunnels them to different location, and re-forwards them into the sensor network. In sensor network
when sender node sends a message to another receiver node in the network, then the receiving node tries to send
the message to its neighboring nodes. The neighbor sensor nodes assume that the message was sent by the
sender node (this is normally out of range), so they tries to forward the message to the originating node, but this
message never comes because it is too far away. Wormhole attack is a great threat to sensor networks since, this
type of attack will not require compromising a sensor in the network instead; it could be performed even at the
starting phase during the sensors initializes to identify its neighboring information. This Wormhole attacks are
very difficult to stop since routing information given by a sensor node is very difficult to check. The wormhole
attack is possible even when the attacker has not compromised with any hosts nodes and even if all
communication provides confidentiality and are authenticated also.
7) Hello flood attack
In this, HELLO packets will have high radio transmission range and these are used as weapons in DSN.
This processing power sends HELLO packets to a number of sensor nodes, which are deployed, in a large area
within a Sensor Network. The sensor devices are thus persuaded that the adversary is their neighboring node. As
a result of this, while forwarding the messages to the base station, the victim sensor nodes try to go through the
attacker as they are aware, that it is their neighborers and are spoofed by the attacker.[17]
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 39 | Page
8) Acknowledgement spoofing
The routing algorithm of a number of sensor networks depends on the explicit or implicit
acknowledgement from the link layer. Because of this innate medium of broadcast medium, the attacker can be
spoofing the acknowledgement from the link layer for sniffed packets that are meant for adjacent nodes. The
aim of this attack is to make the sender nodes believe that the receiving node is in vicinity or even that a
disabled/dead node is still alive.
IV. Measures To Overcome Issues And Challenges In Distributed Sensor Networks:
Table1: Various design issues and challenges and their requirements
Issue/Challenge Requirements
Data Aggregation [41] Energy efficient and low delay
Time Synchronization [37] Rapid flooding, keeping track of neighboring nodes, overhead in
terms of computation and memory allocation.
Localization [48] Flooding, power consumption, number of anchors required for
accurate localization
Node Deployment [45] Energy and bandwidth limitations
Network Dynamics
Node/Link Heterogeneity [12][45]
Route stability, energy, and bandwidth.
Data routing issues.
Energy Efficiency [44][47] MAC Scheduler, Data reduction, sleep/wake-up schemes, radio
optimization and energy efficient routing.
Fault tolerance and reliability [12] Reliability requirements: Noise-free, error-free, time-invariant
wireless channel, error control, error detection and error correction
techniques.Sensor nodes are expected to performself-testing, self-
calibrating, self-repair and self-recovery proceduresduring their
lifetime.
Fault tolerance can be achieved with the help of redundant nodes.
Data Centric Routing [49][50] Energy efficiency
Scalability Topology control mechanisms
Security Requirements [4]
Availability
Availability of resources and base station
Authentication Authentication techniques like MAC (Message Authentication code)
Confidentiality Encryption techniques
Integrity Encryption techniques
Data Freshness a nonce, or another time-related counter, can be added into the
packet to ensure data freshness.
Table2: Various security attacks and their countermeasures
Type of attack OSI layer Characteristic[26][28] Countermeasures
Denial of Service
(DoS)[31]
Physical layer Jamming,Tampering Frequency hopping [2],[15], UWB(Ultra Wide
Band) transmission technique, Changing and
Protecting the key.JAM (Avoidance of
jammed region by using coalesced neighbor
nodes),Wormhole based (Uses wormholes to
avoid jamming) [3][32]
Link layer Collision, Exhaustion, Unfairness Time diversity and CRC [2][15], protecting
the Network ID along with any information
required for device joining [15].
Error correction code, rate limitation,small
frames [6]
Network layer Neglect and greed, homing,
misdirection, black holes.[31]
Restricting malicious node to join the network
by secure network set up phase, REWARD
routing protocol(Uses geographic routing,
Takes advantage of the broadcastinter-radio
behavior to watch neighbor transmissions and
detectblackhole attacks)[2],[36]
Transport layer Flooding and de-synchronization Limit the number of connections that an entity
can make. Authenticating all the packets
exchanged between sensor nodes along with
all the control fields in transport header. The
adversary cannot spoof the packets and header
and thus this attack can be prevented.[2],[17]
Client puzzles, Authentication [6],[38]
Spoofed, altered or
replay of routing
information
Link layer Malicious nodes simply drop data
packets, modify the data content,
generate false error messages or
redirects the traffic.
Authentication [2][15], On Communication
Security (Efficient resource management,
Protects the network even if partof the
network is compromised) [3]
Selective forwarding
[40]
Network layer Attackers drop packets they have
to route
Multipath routing, CHEMAS (Checkpoint-
based Multi-hop Acknowledgement Scheme),
a lightweight security scheme for detecting
selective forwarding attacks. This scheme
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 40 | Page
randomly selects a number of intermediate
nodes as checkpoints which are responsible
for generating acknowledgement. According
to this scheme, along a forwarding path, if a
checkpoint node does not receive enough
acknowledgements from the downstream
checkpoint nodes it can detect abnormal
packet loss and identify suspect nodes.
Sinkhole attacks Link
layer,Network
layer
Attacker broadcasts false routing
related information so
thatneighboring nodes send them
their packets and stealsinformation
or drops them
Data consistency& Network flow information
approach, Hop count Monitoring Scheme,
RSSI based Scheme,Monitoring nodes CPU
Usage, Mobile Agent based approach ,Using
Message Digest Algorithm.[15][35]
Sybil attacks Physical layer Node replication by stealing
sensors identities, that is, MAC
address, IP address, and so forth
Physically Protecting the devices [15]
Data link layer Changing the key regularly [15], key
management [9]
Network layer Reset the devices and change the session keys,
Suspicious node detection bysignal strength
Wormhole attacks
[30][31]
Link layer Adversaries exchange packets
through a long-distance andlow-
latency links affecting routing
making legitimate sensors
believe that they are neighbors
with sensors of another area
Packet leashes, directional antenna, Network
Neighbor Number (NNT) Test based on
Hypothesis testing which detects the increase
in the number of neighbors of the sensors, All
Distance Test (ADT), detects the decrease of
the lengths of the shortest paths between all
pairs of sensors.[15]
Network layer
Hello flood attack Network layer Use of high transmission range
HELLO packets so that nodes go
through attacker while transmitting
packets to base station
“Identity verification protocol”[39] checks the
bi-directionality of link with encrypted echo-
back mechanism. A “probabilistic based”
proposal, which drives some randomly chosen
nodes to
acknowledge to base station regarding hello
requests, which then further examines the
request authenticity
Acknowledgement
spoofing
Link layer Spoofs the acknowledgement for
the sniffed packets and gives an
illusion that receiver is in its
vicinity and even disabled/dead
node is alive
Good encryption techniques and proper
authentication for communication.[32]
V. Conclusion
In this paper, we have addressed various design issues in distributed sensor networks and also
challenges faced.Security requirements, attacks and countermeasures are also discussed. Drawbacks and
requirements associated with countermeasures presents open research issues and researchers can work in that
direction for designing secure protocols.
References
[1]. Edwin Prem, Kumar Gilbert, BaskaranKaliaperumal, and Elijah Blessing Rajsingh“Research Issues in Wireless Sensor
NetworkApplications: A Survey”DOI: 10.7763/IJIEE.2012.V2.191
[2]. MahfuzulhoqChowdhury, MdFazlul Kader and Asaduzzaman” Security Issues in Wireless Sensor Networks: A
Survey”International Journal of Future Generation Communication and Networking Vol.6, No.5 (2013), pp.97-116
[3]. Al-Sakib Khan Pathan, Hyung-Woo Lee, ChoongSeonHong“Security in Wireless Sensor Networks: Issues andChallenges”Feb. 20-
22, 2006 ICACT2006, ISBN 89-5519-129-4
[4]. Dr. G. Padmavathi,Mrs. D. Shanmugapriya ”A Survey of Attacks, Security Mechanisms andChallenges in Wireless Sensor
Networks “ IJCSIS Vol. 4, No. 1 & 2, 2009
[5]. Samira Kalantary, Sara Taghipour“A survey on architectures, protocols, applications, andmanagement in wireless sensor networks”
Journal of Advanced Computer Science & Technology, 3 (1) (2014) 1-11, doi: 10.14419/jacst.v3i1.1583
[6]. John Paul Walters, ZhengqiangLiang,Weisong Shi, and VipinChaudhary “Wireless Sensor Network Security: A Survey”Security in
Distributed, Grid, and Pervasive Computing 2006 Auerbach Publications, CRC Press
[7]. Yide Liu “Wireless Sensor Network Applications in Smart Grid:Recent Trends and Challenges” International Journal of Distributed
Sensor NetworksVolume 2012, Article ID 492819, 8 pagesdoi:10.1155/2012/492819
[8]. Ivan Stojmenovic “Handbook of Sensor Networks Algorithms and Architectures” A John Wiley & Sons, Inc., Publication
[9]. Dr. Manoj Kumar Jain “Wireless Sensor Networks: Security Issues andChallenges” 2011 IJCIT, ISSN 2078-5828 (PRINT), ISSN
2218-5224 (ONLINE), VOLUME 02, ISSUE 01, MANUSCRIPT CODE: 110746
[10]. Dr. Banta Singh Jangra, VijetaKumawat “A Survey on Security Mechanisms and Attacks in Wireless Sensor
Networks”International Journal of Engineering and Innovative Technology (IJEIT)Volume 2, Issue 3, September 2012ISSN: 2277-
3754ISO 9001:2008 Certified
[11]. HimanshuDiwan, PoojaAgrawal, A.K.Dwivedi “Current Status and Design Challenges inWireless Multimedia Sensor Networks”
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 number 2- Dec 2013, ISSN: 2231-5381
[12]. Anil Kumar, Preetigulia , Shikha Sharma “A Study on Power Saving and Secure WSN”International Journal of Engineering Trends
and Technology (IJETT) – Volume 11 Number 4 - May 2014ISSN: 2231-5381
[13]. Abdalraouf Hassan and Christian Bach “Improving Security Connection in Wireless Sensor Networks”International Journal of
Innovation and Scientific ResearchISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 301-307
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 41 | Page
[14]. B.Sangeetha “Wireless Sensor Networks: Issues, Challenges and Survey of Solutions” IJSRD - International Journal for Scientific
Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613
[15]. AnserGhazaal Ali Alquraishee, AasimZafar, Syed Hamid Hasan “Security Issues in Wireless Sensor Networks” MAGNT Research
Report (ISSN. 1444-8939) Vol.2(4):PP.82-91
[16]. S.Muthukarpagam, V.Niveditta, S.Neduncheliyan “Design issues, Topology issues, Quality of ServiceSupport for Wireless Sensor
Networks: Survey andResearch Challenges” 2010 International Journal of Computer Applications (0975 – 8887)Volume 1 – No. 6
[17]. Pratibha, Dr. Prem Chand Vashist “A Detail Survey on Wireless SensorNetworks (WSNs) Security Issues” IJCSMC, Vol. 3, Issue.
7, July 2014, pg.111 – 118 ISSN 2320–088X
[18]. HairongQia, S. SitharamaIyengarb, KrishnenduChakrabarty “Distributed sensor networks- a review ofrecent research”H. Qi et al. /
Journal of the Franklin Institute 338 (2001) 655–668
[19]. Chee-Yee Chong, and Srikanta P. Kumar “Sensor Networks: Evolution, Opportunities,and Challenges” Proceedings of the IEEE,
Vol. 91, No. 8, August 2003
[20]. ArchanaBharathidasan, Vijay AnandSaiPonduru “Sensor Networks: An Overview”
[21]. S SitharamaIyengar, R.L. Kashyap and Rabinder N Madan“Distributed Sensor Networks-Introduction to the Special Section” IEEE
Transactions on Systems, MAN and Cybernetics, Vol.21, No.5 September/ October 1991.
[22]. AashimaSingla, RatikaSachdeva “Review on Security Issues and Attacks in Wireless SensorNetworks” International Journal of
Advanced Research inComputer Science and Software Engineering, Volume 3, Issue 4, April 2013 ISSN: 2277 128X
[23]. AmrinderKaur , Sunil Saini“Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network”
International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013 ISSN:
2277 128X
[24]. Gowrishankar.S ,T.G.Basavaraju , Manjaiah D.H , Subir Kumar Sarkar “Issues in Wireless Sensor Networks”Proceedings of the
World Congress on Engineering 2008 Vol IWCE 2008, July 2 - 4, 2008, London, U.K.
[25]. BhaskarBhuyan, Hiren Kumar Deva Sarma, NityanandaSarma, AvijitKar, Rajib Mall“Quality of Service (QoS) Provisions in
Wireless SensorNetworks and Related Challenges” Wireless Sensor Network, 2010, 2, 861-868doi:10.4236/wsn.2010.211104
[26]. AlexandrosFragkiadakis, Vangelis Angelakis and Elias Z. Tragos“Securing Cognitive Wireless Sensor Networks: A Survey”
International Journal of Distributed Sensor NetworksVolume 2014, Article ID 393248, 12
pageshttp://dx.doi.org/10.1155/2014/393248
[27]. Vartika Shah, Sanjiv Sharma “A Review of Existing Security frameworks and Encryption Methods for Wireless Sensor Networks”
International Journal of Innovations & Advancement in Computer ScienceIJIACSISSN 2347 – 8616Volume 3, Issue 2April 2014
[28]. RajdeepBhanot, Naveen Bilandi “Security issues and challenges in wireless sensornetworks” I JRAS ET Vol. 2 Issue IV, April
2014ISSN: 2321-9653
[29]. JijeeshBaburajan, JigneshPrajapati “A Review Paper On Watchdog Mechanism In WirelessSensor Network To Eliminate False
Malicious Node Detection” IJRET: International Journal of Research in Engineering and Technology Volume: 03 Issue: 01 | Jan-
2014 EISSN: 2319-1163 | PISSN: 2321-7308
[30]. SaurabhUghade, R.K. Kapoor, AnkurPandey“An Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts,
and Detection Approach “International Journal of Recent Development in Engineering and TechnologyWebsite: www.ijrdet.com
(ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014)
[31]. JatinderSinghEr. AbhinavBhandari “A Review of Wireless Sensor Network Under the Denial Of Service Attack (DoS)”
a. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613
[32]. ShahriarMohammadi, Reza EbrahimiAtani, HosseinJadidoleslamy “A Comparison of Link Layer Attacks onWireless Sensor
Networks”Journal of Information Security, 2011, 2, 69-84doi:10.4236/jis.2011.22007
[33]. ParamjitKour, Lal Chand Panwar“A Review on Security Challenges and Attacks inWireless Sensor NetworksInternational Journal
of Science and Research (IJSR)ISSN (Online): 2319-7064
[34]. SachinLalar“Security in Wireless Sensor Networks: Issues and Security Mechanisms” International Journal of Current Engineering
and TechnologyE-ISSN 2277 – 4106, P-ISSN 2347 – 5161
[35]. JunaidAhsenaliChaudhry, Usman Tariq, Mohammed Arif Amin and Robert G. Rittenhouse “Sinkhole Vulnerabilities in Wireless
Sensor Networks” International Journal of Security and Its ApplicationsVol.8, No.1 (2014), pp.401-410
[36]. ZdravkoKarakehayov “Using REWARD to detect team black-hole attacks inwireless sensor networks”
[37]. KasımSinanYıldırım and ÖnderGĂŒrcan “Efficient Time Synchronization in a Wireless SensorNetwork by Adaptive Value
Tracking” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014
[38]. UshamRobinchandra Singh, Sudipta Roy, HerojitMutum “A Survey on Wireless Sensor Network Security and its Countermeasures:
An Overview” International Journal of Engineering Science InventionISSN (Online): 2319 – 6734, ISSN (Print): 2319 –
6726www.ijesi.org Volume 2 Issue 9ǁ September. 2013 ǁ PP.19-37
[39]. J.SteffiAginoPriyanka, S.Tephillah and A.M.Balamurugan “Attacks And Countermeasures In WSN” IIJEC, Volume 2, Issue 1,
January 2014
[40]. WazirZadaKhana, Yang Xiangb, Mohammed Y Aalsalema, QuratulainArshada “The Selective Forwarding Attack in Sensor
Networks: Detections and Countermeasures” I.J. Wireless and Microwave Technologies, 2012, 2, 33-44, DOI:
10.5815/ijwmt.2012.02.06
[41]. PrakashgoudPatil,UmakantKulkarni “Delay Efficient Distributed Data Aggregation Algorithm in Wireless Sensor Networks”
International Journal of Computer Applications (0975 – 8887)Volume 69– No.1, May 2013
[42]. Kai Xing, ShyaamSundharRajamadamSrinivasan , Manny Rivera ,Jiang Li, Xiuzhen Cheng “Attacks and Countermeasures in
Sensor Networks: ASurvey”NETWORKSECURITYScott Huang, David MacCallum, and Ding Zhu Du(Eds.) 2005 Springer.
[43]. Ivanovitch Silva , LuizAffonsoGuedes , Paulo Portugal and Francisco Vasques “Reliability and Availability Evaluation ofWireless
SensorNetworks for Industrial Applications” Sensors 2012, 12, 806-838; doi:10.3390/s120100806
[44]. Luca Anchora , Antonio Capone , Vincenzo Mighali , Luigi Patrono , Francesco Simone “A novel MAC scheduler to minimize the
energy consumptionin a Wireless Sensor Network” Ad Hoc Networks 16 (2014) 88–104
[45]. M. EmreKeskin ,I. Kuban Altınel, Necati Aras , CemErsoy “Wireless sensor network lifetime maximization by optimalsensor
deployment, activity scheduling, data routing and sinkmobility” Ad Hoc Networks 17 (2014) 18–36
[46]. Hongxing Li , ChuanWua, Qiang-Sheng Hua , Francis C.M. Lau “Latency-minimizing data aggregation in wireless sensornetworks
under physical interference model” Ad Hoc Networks 12 (2014) 52–68
[47]. TifennRault , AbdelmadjidBouabdallah, YacineChallal “Energy efficiency in wireless sensor networks: A top-downsurvey”
Computer Networks 67 (2014) 104–122
[48]. HaidarSafa “A novel localization algorithm for large scale wireless sensor networks” Computer Communications 45 (2014) 32–46
[49]. B. P. S. Sahoo, Deepak Puthal “DRUG: An Energy-Efficient Data-Centric RoutingProtocol for Wireless Sensor Networks”
Issues and Challenges in Distributed Sensor Networks- a review
DOI: 10.9790/0661-17133442 www.iosrjournals.org 42 | Page
arXiv:1404.4685v3 [cs.NI] 18 Jun 2014
[50]. Nitika Vats Doohan, SanjivTokekar “A Survey on Routing Techniques of Data-CentricWireless Sensor Networks”International
Journal of Computer Applications (0975 – 8887)Volume 53– No.16, September 2012
[51]. Prof. SachinDeshpande, Dr. J. W. Bakal, Prof. MritunjaykumarOjha “Simulation of Target Tracking in Wireless Sensor Network”
Volume 4, Issue 2, February 2014 IJARCSSE ISSN: 2277 128X .

More Related Content

What's hot

Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...IRJET Journal
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
Research Challenges in Networked Systems, Torsten Braun, UniversitÀt Bern
Research Challenges in Networked Systems, Torsten Braun, UniversitÀt BernResearch Challenges in Networked Systems, Torsten Braun, UniversitÀt Bern
Research Challenges in Networked Systems, Torsten Braun, UniversitÀt BernThe Research Council of Norway, IKTPLUSS
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614IJERA Editor
 

What's hot (17)

Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Ijnsa050208
Ijnsa050208Ijnsa050208
Ijnsa050208
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Ijetcas14 469
Ijetcas14 469Ijetcas14 469
Ijetcas14 469
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Secure final
Secure finalSecure final
Secure final
 
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...IRJET-  	  Survey on SDN based Network Intrusion Detection System using Machi...
IRJET- Survey on SDN based Network Intrusion Detection System using Machi...
 
50120140505014
5012014050501450120140505014
50120140505014
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
Research Challenges in Networked Systems, Torsten Braun, UniversitÀt Bern
Research Challenges in Networked Systems, Torsten Braun, UniversitÀt BernResearch Challenges in Networked Systems, Torsten Braun, UniversitÀt Bern
Research Challenges in Networked Systems, Torsten Braun, UniversitÀt Bern
 
Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 

Viewers also liked

Challenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringChallenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringIOSR Journals
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency IOSR Journals
 
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...IOSR Journals
 
Development of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTMDevelopment of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTMIOSR Journals
 
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver DiseaseCore Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver DiseaseIOSR Journals
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesIOSR Journals
 
Big Data Analysis and Its Scheduling Policy – Hadoop
Big Data Analysis and Its Scheduling Policy – HadoopBig Data Analysis and Its Scheduling Policy – Hadoop
Big Data Analysis and Its Scheduling Policy – HadoopIOSR Journals
 
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...IOSR Journals
 

Viewers also liked (20)

H018144450
H018144450H018144450
H018144450
 
F1302022933
F1302022933F1302022933
F1302022933
 
H010124652
H010124652H010124652
H010124652
 
Challenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document ClusteringChallenging Issues and Similarity Measures for Web Document Clustering
Challenging Issues and Similarity Measures for Web Document Clustering
 
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency Preventing Web-Proxy Based DDoS using Request Sequence Frequency
Preventing Web-Proxy Based DDoS using Request Sequence Frequency
 
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
 
H012134550
H012134550H012134550
H012134550
 
Development of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTMDevelopment of an Algorithm for 16-Bit WTM
Development of an Algorithm for 16-Bit WTM
 
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver DiseaseCore Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
Core Components of the Metabolic Syndrome in Nonalcohlic Fatty Liver Disease
 
M1803028995
M1803028995M1803028995
M1803028995
 
A011140104
A011140104A011140104
A011140104
 
H010634043
H010634043H010634043
H010634043
 
A Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android SmartphonesA Survey on Mobile Forensic for Android Smartphones
A Survey on Mobile Forensic for Android Smartphones
 
Big Data Analysis and Its Scheduling Policy – Hadoop
Big Data Analysis and Its Scheduling Policy – HadoopBig Data Analysis and Its Scheduling Policy – Hadoop
Big Data Analysis and Its Scheduling Policy – Hadoop
 
C018121117
C018121117C018121117
C018121117
 
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
Crack Detection for Various Loading Conditions in Beam Using Hilbert – Huang ...
 
D010341722
D010341722D010341722
D010341722
 
A012650114
A012650114A012650114
A012650114
 
J017335863
J017335863J017335863
J017335863
 
C017611624
C017611624C017611624
C017611624
 

Similar to Issues and Challenges in Distributed Sensor Networks- A Review

A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATASYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATACSEIJJournal
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataCSEIJJournal
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big Datacivejjour
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Securityijtsrd
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptxKamakshiMB1
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 

Similar to Issues and Challenges in Distributed Sensor Networks- A Review (20)

A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATASYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
SYSTEMS USING WIRELESS SENSOR NETWORKS FOR BIG DATA
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big Data
 
Systems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big DataSystems using Wireless Sensor Networks for Big Data
Systems using Wireless Sensor Networks for Big Data
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 

Recently uploaded (20)

Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 

Issues and Challenges in Distributed Sensor Networks- A Review

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 34-42 www.iosrjournals.org DOI: 10.9790/0661-17133442 www.iosrjournals.org 34 | Page Issues and Challenges in Distributed Sensor Networks- A Review Sharada Y Yalavigi, Dr. Krishnamurthy G.N, Dr. NandiniSidnal Abstract:Distributed Sensor networks (DSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as process management, health care monitoring, environmental/earth sensing, industrial monitoring and many more scenarios. One of the major challenges distributed sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of security, research, computational and design issues along with the challenges faced. Keywords: Distributed Sensor Network, Design issues, Security issues, Defensive mechanisms, Challenges. I. Introduction A Distributed Sensor Network can be defined as a set of spatially scattered intelligent sensors designed to obtain measurement from the environment, abstract relevant information from the data gathered, and to derive appropriate interferences from the information gained. Typical examples include temperature, light, sound, and humidity. These sensor readings are transmitted over a wireless channel to a running application that makes decisions based on these sensor readings. Many applications have been proposed for distributed sensor networks, and many of these applications have specific quality of service (QoS) requirements that offer additional challenges to the application designer.[18],[19]. We consider two aspects [8] to motivate an application-based viewpoint: First, what aspects of wireless sensors make the implementation of applications more challenging, or at least different? One widely recognized issue is the limited power available to each wireless sensor node, but other challenges such as limited storage or processing capabilities play a significant role in constraining the application development. Second, what services are required for a wireless sensor network application toachieve its intended purpose? A number of widely applicable services, such as time synchronization andlocation determination are briefly discussed. Other services are needed to support database requirements, such as message routing, topology management, and data aggregation and storage.In this paper we discuss a wide variety of security, research, computational and design issues along with the challenges faced. II. Design Issues And Challenges In Sensor Networks Several design challenges [4],[5],[16],[20],[21]present themselves to designers of wireless sensor networkapplications. The limited resources available to individual sensor nodesimplies designers must develop highlydistributed, fault-tolerant, and energyefficientapplications in a small memory-footprint. For wireless sensor network applications to have reasonable longevity, an aggressiveenergy-management policy is mandatory. This is currently the greatest designchallenge in any wireless sensor network application. Several key differences between more traditional ad hoc networks and wirelesssensor networks exist. [8] 1) Individual nodes in a wireless sensor network have limited computationalpower and storage capacity. They operate on nonrenewable power sourcesand employ a short-range transceiver to send and receive messages. 2) The number of nodes in a wireless sensor network can be several orders of magnitudehigher than in an ad hoc network. Thus, algorithm scalability is animportant design criterion for sensor network applications. 3) Sensor nodes are generally densely deployed in the area of interest. This densedeployment can be leveraged by the application, since nodes in close proximitycan collaborate locally prior to relaying information back to the base station. 4) Sensor networks are prone to frequent topology changes. This is due to severalreasons, such as hardware failure, depleted batteries, intermittent radio interference,environmental factors, or the addition of sensor nodes. As a result,applications require a degree of inherent fault tolerance and the ability toreconfigure themselves as the network topology evolves over time. 5) Wireless sensor networks do not employ a point-to-point communication paradigmbecause they are usually not aware of the entire size of the network andnodes are not uniquely identifiable. Consequently, it is not possible to individuallyaddress a specific node. Paradigms, such as directed diffusion [,], employa data-
  • 2. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 35 | Page centric view of generated sensor data. They identify informationproduced by the sensor network as <attribute, value> pairs. Nodes requestdata by disseminating interests for this named data throughout the network.Data that matches the criterion are relayed back toward the querying node. Even with the limitations individual sensor nodes possess and the designchallenges application developers face, several advantages exist for instrumentingan area with a wireless sensor network:[8] 1) Due to the dense deployment of a greater number of nodes, a higher level offault tolerance is achievable in wireless sensor networks. 2) Coverage of a large area is possible through the union of coverage of severalsmall sensors. 3) Coverage of a particular area and terrain can be shaped as needed to overcomeany potential barriers or holes in the area under observation. 4) It is possible to incrementally extend coverage of the observed area and densityby deploying additional sensor nodes within the region of interest. 5) An improvement in sensing quality is achieved by combining multiple,independent sensor readings. Local collaboration between nearby sensornodes achieves a higher level of confidence in observed phenomena. 6) Since nodes are deployed in close proximity to the sensed event, this overcomesany ambient environmental factors that might otherwise interfere withobservation of the desired phenomenon. 2.1 Data Aggregation: Redundancy exists in sensordata in both the temporal and spatial domains. That is, readings collected by asingle sensor at different times or among neighboring sensors may be highlycorrelated, and contain redundant information. Instead of transmitting all thehighly correlated information to subscribers, it may be more effective forsome intermediate sensor node(s) to digest the information received andcome up with a concise digest, in order to reduce the amount of raw data tobe transmitted (and hence the power incurred, and bandwidth consumed, intransmission). This technique is termed as dataaggregation (also called data fusion).Data fusion can also be integrated with routing. Compared withtraditional address-centric routing, which finds the shortest paths betweenpairs of end nodes, data-fusion–centric routing aims to locate routes thatlead to the largest degree of data aggregation [41]. Theaggregation typically follows a tree topology rooted at thesink. Each leaf node would deliver its collected data to itsparent node. Intermediate sensor nodes of the tree mayoptionally perform certain operations (e.g., sum, maximum, minimum, mean, etc.) on the received data and forward theresult. Because the wireless medium is shared, transmissionsto forward the data need to be coordinated in orderto reduce interference and avoid collision. The fundamentalchallenge can be stated as: How can the aggregation transmissionsbe scheduled in a wireless sensor network suchthat no collision may occur and the total number of timeslots used (referred to as aggregation latency) is minimized?This is known as the Minimum-Latency Aggregation Scheduling(MLAS) problem in the literature.The MLAS problem is typically approached in two steps:(i) data aggregation tree construction and (ii) link transmissionscheduling. For (ii), we assume the simplest modein which every non-leaf node in the tree will make onlyone transmission, after all the data from its child nodeshave been received. A correct solution to the MLAS problemrequires that no concurrent transmissions interfering witheach other should take place. If steps (i) and (ii) are carriedout simultaneously in a solution, we have a „„joint‟‟ design. 2.2 Time Synchronization Sensor networks are used to monitor real-world phenomena. For such monitoringapplications, physical time often plays a crucial role. For example,the times of occurrence of physical events are often crucial for the observer to associate event reports with the originating physical events. Also, methods for localization of sensor nodes based on the measurement of time of flight or difference of arrival time of certain signals also require synchronized time. Providing synchronized physical time is a complex task dueto various challenging characteristics of sensor networks like energy and other resources, network dynamics, infrastructure and configuration.[17],[37]. Different applications like beam- forming array, data aggregation, recognition of duplicate detection of same event from different sensors, ordering of logged events have different synchronization requirements and also any single synchronization mechanism is not appropriate for all circumstances sensors should have multiple methods available to them so that they can dynamically trade precision for energy, or scope for convergence time. Existing time synchronization methods like NTP conserve use of bandwidth and try to keep the clock synchronization at all times but are not aware of the stringent energy constraints and the heterogeneity of the hardware that may be deployed in sensornets.
  • 3. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 36 | Page 2.3 Localization In emerging sensor network applications it is necessary to accurately orient the nodes with respect to a global coordinate system in order to report data that is geographically meaningful. Furthermore, basic middle ware services such as routing often rely on location information (e.g., geographic routing). Application contexts and potential massive scale make it unrealistic to rely on careful placement or uniform arrangement of sensors. Rather than use globally accessible beacons or expensive GPS to localize each sensor, we would like the sensors to self-organize a coordinate system. Some of the design goals of localization in wireless sensor networks are:  RF-based: Normally, the sensors have some kind of short-range radio transceivers for communication. By leveraging this radio for localization the high cost and size requirements of GPS can be avoided.  Receiver-based: For greater scalability, the responsibility for localization must lie with the receiving node that needs to be localized and not with the reference points.  Ad Hoc: For easy deployment, the solution should not require preplanning or extensive infrastructure.  Low Energy: Since the sensors have modest processing capabilities, the mechanisms should minimize computation and message costs to reduce power consumption.  Adaptive Fidelity: The accuracy of the localization algorithms should be adaptive to the granularity of available reference points. Localization methods typically rely on some form of communication between reference points with known positions and the receiver node that needs to be located. Various localization techniques can be classified into two broad categories based on the granularity of information inferred during the communication. Fine- grained localization systems (e.g., GPS) provide high precision location information, typically estimated ranges or angles relative to beacons (reference points) and compute location of the unknown node using trilateration (position estimation from distance to three points) or triangulation (position estimation from angles to three points). Coarse-grained localization systems estimate unknown node location from proximity to beacons or landmarks 2.4 Node Deployment Node deployment[11][45] in WSNs is application dependent and affects the performance of the routing protocol. The deployment can be either deterministic or randomized. In deterministic deployment, the sensors are manually placed and data is routed through pre-determined paths. However, in random node deployment, the sensor nodes are scattered randomly creating an infrastructure in an ad hoc manner. If the resultant distribution of nodes is not uniform, optimal clustering becomes necessary to allow connectivity and enable energy efficient network operation. Intersensor communication is normally within short transmission ranges due to energy and bandwidth limitations. Therefore, it is most likely that a route will consist of multiple wireless hops. 2.5 Network Dynamics Most of the network architectures assume that sensor nodes are stationary. However, mobility of both BS‟s and sensor nodes is sometimes necessary in many applications. Routing messages from or to moving nodes is more challenging since route stability becomes an important issue, in addition to energy, bandwidth etc. Moreover, the sensed phenomenon can be either dynamic or static depending on the application, e.g., it is dynamic in a target detection/tracking application, while it is static in forest monitoring for early fire prevention. Monitoring static events allows the network to work in a reactive mode, simply generating traffic when reporting. Dynamic events in most applications require periodic reporting and consequently generate significant traffic to be routed to the BS [12]. 2.6 Energy Efficiency Once the WSN is functional it becomes difficultto replace or recharge the battery of sensor nodes. This further posesthe challenge to maintain sensors in hostile and harsh environmentand scaling of sensor network to hundreds or thousands of nodes.Therefore, an energy-efficient mechanism is required to save energyand prolong the network lifetime [12]. 2.7 Node/Link Heterogeneity In many studies, all sensor nodes wereassumed to be homogeneous, i.e., having equal capacity in terms ofcomputation, communication, and power. However, depending onthe application a sensor node can have different role or capability.The existence of heterogeneous set of sensors raises many technicalissues related to data routing. These special sensors can be eitherdeployed independently or the different functionalities can beincluded in the same sensor nodes. Even data reading and reportingcan be generated from these sensors at different rates, subject todiverse quality of service constraints, and can follow multiple datareporting models.
  • 4. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 37 | Page For example, hierarchical protocols designate acluster-head (CH) node different from the normal sensors. Thesecluster heads can be chosen from the deployed sensors or can bemore powerful than other sensor nodes in terms of energy, bandwidth,and memory. Hence, the burden of transmission to the BS is handledby the set of cluster-heads [12]. 2.8 Fault tolerance and reliability For many WSN applications, datamust be delivered reliably over the noisy, error-prone, and timevaryingwireless channel. In such cases, data verification andcorrection on each layer of the network are critical to provide accurate results. Additionally, sensor nodes are expected to performself-testing, self- calibrating, self-repair and self-recovery proceduresduring their lifetime. 2.9 Scalability Sensor networks should be scalable or flexible. Sensor networks dynamically adopt changes in node density and topology. Sometimes few nodes are added to the sensor networks existed nodes for the purpose of coverage issue. So sensor network is flexible to adapt these changes. 2.10 Data Centric Routing In data-centric routing protocol, whenever a sink requires any data it sends a query message to the different part of the sensor network field. After receiving this query message sensors node replies and sends data to the sink. In data-centric protocol attribute based naming is used which specifies the properties of the data. III. Security Issues And Challenges In Dsn 3.1 Security Requirements [2]-[6],[13][14][42]: 1) Availability Availability determines whether a node has the ability touse the resources and whether the network is available forthe messages to communicate. However, failure of thebase station will eventuallythreaten the entire sensor network. Thus availability is ofprimary importance for maintaining an operationalnetwork. 2) Authentication Authentication ensures the reliability of the message byidentifying its origin. Attacks in sensor networks do notjust involve the alteration of packets; adversaries can alsoinject additional false packets []. Data authenticationverifies the identity of the senders and receivers. Dataauthentication is achieved through symmetric orasymmetric mechanisms where sending and receivingnodes share secret keys. Due to the wireless nature of themedia and the unattended nature of sensor networks, it isextremely challenging to ensure authentication. 3) Confidentiality Confidentiality is the ability to conceal messages froma passive attacker so that any message communicated viathe sensor network remains confidential. This is the mostimportant issue in network security. A sensor node shouldnot reveal its data to the neighbors. 4) Integrity Data integrity in sensor networks is needed to ensurethe reliability of the data and refers to the ability toconfirm that a message has not been tampered with, altered or changed. Even if the network has confidentialitymeasures, there is still a possibility that the data integrityhas been compromised by alterations. The integrity of thenetwork will be in trouble when: ‱ A malicious node present in the network injectsfalse data. ‱ Unstable conditions due to wireless channel causedamage or loss of data. [4] 5) Data Freshness Even if confidentiality and data integrity are assured, thereis a need to ensure the freshness of each message.Informally, data freshness [] suggests that the data isrecent, and it ensures that no old messages have beenreplayed. To solve this problem a nonce, or another time related counter, can be added into the packet to ensure data freshness 3.2 Security Attacks: Attackers can be classified into two types: i) external attackers that are not authorized participants of the sensor network and ii) internal attackers that have compromised a legitimate sensor and use it to launch attacks in the network.Furthermore, attackers can be classified into passive and active. Passive attackers monitor
  • 5. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 38 | Page network traffic without interfering with it. Their aim is to eavesdrop on the exchanged information and to acquire private data or to infer about information-sensitive applications that execute in the sensors. Active attackers disrupt network operation by launching several types of attacks that cause DoS (denial of service) in the DSN. 1) Denial of Service (DoS) A Denial of Service attack in sensor networks in general is defined as any event that eliminates the network‟s capacity to perform its desired function. DoS attacks in distributed sensor networks may be carried out at different layers like the physical, link, network and transport layers. This occurs by the unintentional failure of sensor nodes. The simplest DoS attack tries to exhaust the resources available to the victim node, by transmitting additional unwanted packets and thus prevents legitimate sensor network users from tapping work or resources to which these nodes are deployed. In DSNs, several types of Denial of Service attacks in different layers might be performed, i.e. at physical layer, the Denial of Service attacks could be jamming and tampering, at link layer, collision, exhaustion, unfairness, at network layer, neglect and greed, homing, misdirection, black holes and at transport layer this attack could be performed by malicious flooding and resynchronizations. 2) Spoofed, altered or replay of routing information The most outstanding attack on routing is to alter, spoof, or just replay routing information and it is known as false routing information.Malicious nodes simply drop data packets quietly, modify the data content, generate false error messages or redirects the traffic.[17] 3) Selective forwarding In this attack an attacker comprise itself in a data stream lane and can selectivelydrop only distinct packets. In sensor networks it is assumed that nodes faithfully forward received messages butsome compromised node might refuse to forward packets, though neighbors may start using another route. 4) Sinkhole attacks The main goal of an adversary in sinkhole attack is to attract all the traffic toward itselfthrough an agreement node. Sinkhole attacks [10] typically work by making a compromised node look especiallyattractive to surrounding nodes. 5) Sybil attacks In Sybil attack [10], a single node makes replicas of it and distributes it in multiple locations of thenetwork. Authentication and encryption techniques can prevent an outsider to launch a Sybil attack on thesensor network. 6) Wormhole attacks In wormhole attack, more than two malicious colluding sensor nodes does a virtual tunnel in the sensor network, which is used to forward message packets between the tunnel edge points. This tunnel establishes shorter links in the network. In which adversary documents forwards packets at one location in the sensor network, tunnels them to different location, and re-forwards them into the sensor network. In sensor network when sender node sends a message to another receiver node in the network, then the receiving node tries to send the message to its neighboring nodes. The neighbor sensor nodes assume that the message was sent by the sender node (this is normally out of range), so they tries to forward the message to the originating node, but this message never comes because it is too far away. Wormhole attack is a great threat to sensor networks since, this type of attack will not require compromising a sensor in the network instead; it could be performed even at the starting phase during the sensors initializes to identify its neighboring information. This Wormhole attacks are very difficult to stop since routing information given by a sensor node is very difficult to check. The wormhole attack is possible even when the attacker has not compromised with any hosts nodes and even if all communication provides confidentiality and are authenticated also. 7) Hello flood attack In this, HELLO packets will have high radio transmission range and these are used as weapons in DSN. This processing power sends HELLO packets to a number of sensor nodes, which are deployed, in a large area within a Sensor Network. The sensor devices are thus persuaded that the adversary is their neighboring node. As a result of this, while forwarding the messages to the base station, the victim sensor nodes try to go through the attacker as they are aware, that it is their neighborers and are spoofed by the attacker.[17]
  • 6. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 39 | Page 8) Acknowledgement spoofing The routing algorithm of a number of sensor networks depends on the explicit or implicit acknowledgement from the link layer. Because of this innate medium of broadcast medium, the attacker can be spoofing the acknowledgement from the link layer for sniffed packets that are meant for adjacent nodes. The aim of this attack is to make the sender nodes believe that the receiving node is in vicinity or even that a disabled/dead node is still alive. IV. Measures To Overcome Issues And Challenges In Distributed Sensor Networks: Table1: Various design issues and challenges and their requirements Issue/Challenge Requirements Data Aggregation [41] Energy efficient and low delay Time Synchronization [37] Rapid flooding, keeping track of neighboring nodes, overhead in terms of computation and memory allocation. Localization [48] Flooding, power consumption, number of anchors required for accurate localization Node Deployment [45] Energy and bandwidth limitations Network Dynamics Node/Link Heterogeneity [12][45] Route stability, energy, and bandwidth. Data routing issues. Energy Efficiency [44][47] MAC Scheduler, Data reduction, sleep/wake-up schemes, radio optimization and energy efficient routing. Fault tolerance and reliability [12] Reliability requirements: Noise-free, error-free, time-invariant wireless channel, error control, error detection and error correction techniques.Sensor nodes are expected to performself-testing, self- calibrating, self-repair and self-recovery proceduresduring their lifetime. Fault tolerance can be achieved with the help of redundant nodes. Data Centric Routing [49][50] Energy efficiency Scalability Topology control mechanisms Security Requirements [4] Availability Availability of resources and base station Authentication Authentication techniques like MAC (Message Authentication code) Confidentiality Encryption techniques Integrity Encryption techniques Data Freshness a nonce, or another time-related counter, can be added into the packet to ensure data freshness. Table2: Various security attacks and their countermeasures Type of attack OSI layer Characteristic[26][28] Countermeasures Denial of Service (DoS)[31] Physical layer Jamming,Tampering Frequency hopping [2],[15], UWB(Ultra Wide Band) transmission technique, Changing and Protecting the key.JAM (Avoidance of jammed region by using coalesced neighbor nodes),Wormhole based (Uses wormholes to avoid jamming) [3][32] Link layer Collision, Exhaustion, Unfairness Time diversity and CRC [2][15], protecting the Network ID along with any information required for device joining [15]. Error correction code, rate limitation,small frames [6] Network layer Neglect and greed, homing, misdirection, black holes.[31] Restricting malicious node to join the network by secure network set up phase, REWARD routing protocol(Uses geographic routing, Takes advantage of the broadcastinter-radio behavior to watch neighbor transmissions and detectblackhole attacks)[2],[36] Transport layer Flooding and de-synchronization Limit the number of connections that an entity can make. Authenticating all the packets exchanged between sensor nodes along with all the control fields in transport header. The adversary cannot spoof the packets and header and thus this attack can be prevented.[2],[17] Client puzzles, Authentication [6],[38] Spoofed, altered or replay of routing information Link layer Malicious nodes simply drop data packets, modify the data content, generate false error messages or redirects the traffic. Authentication [2][15], On Communication Security (Efficient resource management, Protects the network even if partof the network is compromised) [3] Selective forwarding [40] Network layer Attackers drop packets they have to route Multipath routing, CHEMAS (Checkpoint- based Multi-hop Acknowledgement Scheme), a lightweight security scheme for detecting selective forwarding attacks. This scheme
  • 7. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 40 | Page randomly selects a number of intermediate nodes as checkpoints which are responsible for generating acknowledgement. According to this scheme, along a forwarding path, if a checkpoint node does not receive enough acknowledgements from the downstream checkpoint nodes it can detect abnormal packet loss and identify suspect nodes. Sinkhole attacks Link layer,Network layer Attacker broadcasts false routing related information so thatneighboring nodes send them their packets and stealsinformation or drops them Data consistency& Network flow information approach, Hop count Monitoring Scheme, RSSI based Scheme,Monitoring nodes CPU Usage, Mobile Agent based approach ,Using Message Digest Algorithm.[15][35] Sybil attacks Physical layer Node replication by stealing sensors identities, that is, MAC address, IP address, and so forth Physically Protecting the devices [15] Data link layer Changing the key regularly [15], key management [9] Network layer Reset the devices and change the session keys, Suspicious node detection bysignal strength Wormhole attacks [30][31] Link layer Adversaries exchange packets through a long-distance andlow- latency links affecting routing making legitimate sensors believe that they are neighbors with sensors of another area Packet leashes, directional antenna, Network Neighbor Number (NNT) Test based on Hypothesis testing which detects the increase in the number of neighbors of the sensors, All Distance Test (ADT), detects the decrease of the lengths of the shortest paths between all pairs of sensors.[15] Network layer Hello flood attack Network layer Use of high transmission range HELLO packets so that nodes go through attacker while transmitting packets to base station “Identity verification protocol”[39] checks the bi-directionality of link with encrypted echo- back mechanism. A “probabilistic based” proposal, which drives some randomly chosen nodes to acknowledge to base station regarding hello requests, which then further examines the request authenticity Acknowledgement spoofing Link layer Spoofs the acknowledgement for the sniffed packets and gives an illusion that receiver is in its vicinity and even disabled/dead node is alive Good encryption techniques and proper authentication for communication.[32] V. Conclusion In this paper, we have addressed various design issues in distributed sensor networks and also challenges faced.Security requirements, attacks and countermeasures are also discussed. Drawbacks and requirements associated with countermeasures presents open research issues and researchers can work in that direction for designing secure protocols. References [1]. Edwin Prem, Kumar Gilbert, BaskaranKaliaperumal, and Elijah Blessing Rajsingh“Research Issues in Wireless Sensor NetworkApplications: A Survey”DOI: 10.7763/IJIEE.2012.V2.191 [2]. MahfuzulhoqChowdhury, MdFazlul Kader and Asaduzzaman” Security Issues in Wireless Sensor Networks: A Survey”International Journal of Future Generation Communication and Networking Vol.6, No.5 (2013), pp.97-116 [3]. Al-Sakib Khan Pathan, Hyung-Woo Lee, ChoongSeonHong“Security in Wireless Sensor Networks: Issues andChallenges”Feb. 20- 22, 2006 ICACT2006, ISBN 89-5519-129-4 [4]. Dr. G. Padmavathi,Mrs. D. Shanmugapriya ”A Survey of Attacks, Security Mechanisms andChallenges in Wireless Sensor Networks “ IJCSIS Vol. 4, No. 1 & 2, 2009 [5]. Samira Kalantary, Sara Taghipour“A survey on architectures, protocols, applications, andmanagement in wireless sensor networks” Journal of Advanced Computer Science & Technology, 3 (1) (2014) 1-11, doi: 10.14419/jacst.v3i1.1583 [6]. John Paul Walters, ZhengqiangLiang,Weisong Shi, and VipinChaudhary “Wireless Sensor Network Security: A Survey”Security in Distributed, Grid, and Pervasive Computing 2006 Auerbach Publications, CRC Press [7]. Yide Liu “Wireless Sensor Network Applications in Smart Grid:Recent Trends and Challenges” International Journal of Distributed Sensor NetworksVolume 2012, Article ID 492819, 8 pagesdoi:10.1155/2012/492819 [8]. Ivan Stojmenovic “Handbook of Sensor Networks Algorithms and Architectures” A John Wiley & Sons, Inc., Publication [9]. Dr. Manoj Kumar Jain “Wireless Sensor Networks: Security Issues andChallenges” 2011 IJCIT, ISSN 2078-5828 (PRINT), ISSN 2218-5224 (ONLINE), VOLUME 02, ISSUE 01, MANUSCRIPT CODE: 110746 [10]. Dr. Banta Singh Jangra, VijetaKumawat “A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks”International Journal of Engineering and Innovative Technology (IJEIT)Volume 2, Issue 3, September 2012ISSN: 2277- 3754ISO 9001:2008 Certified [11]. HimanshuDiwan, PoojaAgrawal, A.K.Dwivedi “Current Status and Design Challenges inWireless Multimedia Sensor Networks” International Journal of Engineering Trends and Technology (IJETT) – Volume 6 number 2- Dec 2013, ISSN: 2231-5381 [12]. Anil Kumar, Preetigulia , Shikha Sharma “A Study on Power Saving and Secure WSN”International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 4 - May 2014ISSN: 2231-5381 [13]. Abdalraouf Hassan and Christian Bach “Improving Security Connection in Wireless Sensor Networks”International Journal of Innovation and Scientific ResearchISSN 2351-8014 Vol. 2 No. 2 Jun. 2014, pp. 301-307
  • 8. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 41 | Page [14]. B.Sangeetha “Wireless Sensor Networks: Issues, Challenges and Survey of Solutions” IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613 [15]. AnserGhazaal Ali Alquraishee, AasimZafar, Syed Hamid Hasan “Security Issues in Wireless Sensor Networks” MAGNT Research Report (ISSN. 1444-8939) Vol.2(4):PP.82-91 [16]. S.Muthukarpagam, V.Niveditta, S.Neduncheliyan “Design issues, Topology issues, Quality of ServiceSupport for Wireless Sensor Networks: Survey andResearch Challenges” 2010 International Journal of Computer Applications (0975 – 8887)Volume 1 – No. 6 [17]. Pratibha, Dr. Prem Chand Vashist “A Detail Survey on Wireless SensorNetworks (WSNs) Security Issues” IJCSMC, Vol. 3, Issue. 7, July 2014, pg.111 – 118 ISSN 2320–088X [18]. HairongQia, S. SitharamaIyengarb, KrishnenduChakrabarty “Distributed sensor networks- a review ofrecent research”H. Qi et al. / Journal of the Franklin Institute 338 (2001) 655–668 [19]. Chee-Yee Chong, and Srikanta P. Kumar “Sensor Networks: Evolution, Opportunities,and Challenges” Proceedings of the IEEE, Vol. 91, No. 8, August 2003 [20]. ArchanaBharathidasan, Vijay AnandSaiPonduru “Sensor Networks: An Overview” [21]. S SitharamaIyengar, R.L. Kashyap and Rabinder N Madan“Distributed Sensor Networks-Introduction to the Special Section” IEEE Transactions on Systems, MAN and Cybernetics, Vol.21, No.5 September/ October 1991. [22]. AashimaSingla, RatikaSachdeva “Review on Security Issues and Attacks in Wireless SensorNetworks” International Journal of Advanced Research inComputer Science and Software Engineering, Volume 3, Issue 4, April 2013 ISSN: 2277 128X [23]. AmrinderKaur , Sunil Saini“Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013 ISSN: 2277 128X [24]. Gowrishankar.S ,T.G.Basavaraju , Manjaiah D.H , Subir Kumar Sarkar “Issues in Wireless Sensor Networks”Proceedings of the World Congress on Engineering 2008 Vol IWCE 2008, July 2 - 4, 2008, London, U.K. [25]. BhaskarBhuyan, Hiren Kumar Deva Sarma, NityanandaSarma, AvijitKar, Rajib Mall“Quality of Service (QoS) Provisions in Wireless SensorNetworks and Related Challenges” Wireless Sensor Network, 2010, 2, 861-868doi:10.4236/wsn.2010.211104 [26]. AlexandrosFragkiadakis, Vangelis Angelakis and Elias Z. Tragos“Securing Cognitive Wireless Sensor Networks: A Survey” International Journal of Distributed Sensor NetworksVolume 2014, Article ID 393248, 12 pageshttp://dx.doi.org/10.1155/2014/393248 [27]. Vartika Shah, Sanjiv Sharma “A Review of Existing Security frameworks and Encryption Methods for Wireless Sensor Networks” International Journal of Innovations & Advancement in Computer ScienceIJIACSISSN 2347 – 8616Volume 3, Issue 2April 2014 [28]. RajdeepBhanot, Naveen Bilandi “Security issues and challenges in wireless sensornetworks” I JRAS ET Vol. 2 Issue IV, April 2014ISSN: 2321-9653 [29]. JijeeshBaburajan, JigneshPrajapati “A Review Paper On Watchdog Mechanism In WirelessSensor Network To Eliminate False Malicious Node Detection” IJRET: International Journal of Research in Engineering and Technology Volume: 03 Issue: 01 | Jan- 2014 EISSN: 2319-1163 | PISSN: 2321-7308 [30]. SaurabhUghade, R.K. Kapoor, AnkurPandey“An Overview on Wormhole Attack in Wireless Sensor Network: Challenges, Impacts, and Detection Approach “International Journal of Recent Development in Engineering and TechnologyWebsite: www.ijrdet.com (ISSN 2347 - 6435 (Online) Volume 2, Issue 4, April 2014) [31]. JatinderSinghEr. AbhinavBhandari “A Review of Wireless Sensor Network Under the Denial Of Service Attack (DoS)” a. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 05, 2014 | ISSN (online): 2321-0613 [32]. ShahriarMohammadi, Reza EbrahimiAtani, HosseinJadidoleslamy “A Comparison of Link Layer Attacks onWireless Sensor Networks”Journal of Information Security, 2011, 2, 69-84doi:10.4236/jis.2011.22007 [33]. ParamjitKour, Lal Chand Panwar“A Review on Security Challenges and Attacks inWireless Sensor NetworksInternational Journal of Science and Research (IJSR)ISSN (Online): 2319-7064 [34]. SachinLalar“Security in Wireless Sensor Networks: Issues and Security Mechanisms” International Journal of Current Engineering and TechnologyE-ISSN 2277 – 4106, P-ISSN 2347 – 5161 [35]. JunaidAhsenaliChaudhry, Usman Tariq, Mohammed Arif Amin and Robert G. Rittenhouse “Sinkhole Vulnerabilities in Wireless Sensor Networks” International Journal of Security and Its ApplicationsVol.8, No.1 (2014), pp.401-410 [36]. ZdravkoKarakehayov “Using REWARD to detect team black-hole attacks inwireless sensor networks” [37]. KasımSinanYıldırım and ÖnderGĂŒrcan “Efficient Time Synchronization in a Wireless SensorNetwork by Adaptive Value Tracking” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 [38]. UshamRobinchandra Singh, Sudipta Roy, HerojitMutum “A Survey on Wireless Sensor Network Security and its Countermeasures: An Overview” International Journal of Engineering Science InventionISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726www.ijesi.org Volume 2 Issue 9ǁ September. 2013 ǁ PP.19-37 [39]. J.SteffiAginoPriyanka, S.Tephillah and A.M.Balamurugan “Attacks And Countermeasures In WSN” IIJEC, Volume 2, Issue 1, January 2014 [40]. WazirZadaKhana, Yang Xiangb, Mohammed Y Aalsalema, QuratulainArshada “The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures” I.J. Wireless and Microwave Technologies, 2012, 2, 33-44, DOI: 10.5815/ijwmt.2012.02.06 [41]. PrakashgoudPatil,UmakantKulkarni “Delay Efficient Distributed Data Aggregation Algorithm in Wireless Sensor Networks” International Journal of Computer Applications (0975 – 8887)Volume 69– No.1, May 2013 [42]. Kai Xing, ShyaamSundharRajamadamSrinivasan , Manny Rivera ,Jiang Li, Xiuzhen Cheng “Attacks and Countermeasures in Sensor Networks: ASurvey”NETWORKSECURITYScott Huang, David MacCallum, and Ding Zhu Du(Eds.) 2005 Springer. [43]. Ivanovitch Silva , LuizAffonsoGuedes , Paulo Portugal and Francisco Vasques “Reliability and Availability Evaluation ofWireless SensorNetworks for Industrial Applications” Sensors 2012, 12, 806-838; doi:10.3390/s120100806 [44]. Luca Anchora , Antonio Capone , Vincenzo Mighali , Luigi Patrono , Francesco Simone “A novel MAC scheduler to minimize the energy consumptionin a Wireless Sensor Network” Ad Hoc Networks 16 (2014) 88–104 [45]. M. EmreKeskin ,I. Kuban Altınel, Necati Aras , CemErsoy “Wireless sensor network lifetime maximization by optimalsensor deployment, activity scheduling, data routing and sinkmobility” Ad Hoc Networks 17 (2014) 18–36 [46]. Hongxing Li , ChuanWua, Qiang-Sheng Hua , Francis C.M. Lau “Latency-minimizing data aggregation in wireless sensornetworks under physical interference model” Ad Hoc Networks 12 (2014) 52–68 [47]. TifennRault , AbdelmadjidBouabdallah, YacineChallal “Energy efficiency in wireless sensor networks: A top-downsurvey” Computer Networks 67 (2014) 104–122 [48]. HaidarSafa “A novel localization algorithm for large scale wireless sensor networks” Computer Communications 45 (2014) 32–46 [49]. B. P. S. Sahoo, Deepak Puthal “DRUG: An Energy-Efficient Data-Centric RoutingProtocol for Wireless Sensor Networks”
  • 9. Issues and Challenges in Distributed Sensor Networks- a review DOI: 10.9790/0661-17133442 www.iosrjournals.org 42 | Page arXiv:1404.4685v3 [cs.NI] 18 Jun 2014 [50]. Nitika Vats Doohan, SanjivTokekar “A Survey on Routing Techniques of Data-CentricWireless Sensor Networks”International Journal of Computer Applications (0975 – 8887)Volume 53– No.16, September 2012 [51]. Prof. SachinDeshpande, Dr. J. W. Bakal, Prof. MritunjaykumarOjha “Simulation of Target Tracking in Wireless Sensor Network” Volume 4, Issue 2, February 2014 IJARCSSE ISSN: 2277 128X .