SlideShare a Scribd company logo
1 of 8
Download to read offline
http://www.iaeme.com/IJARET/index.asp 135 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp.135-142. Article ID: IJARET_10_02_015
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
SECURITY CONCERNS IN WIRELESS SENSOR
NETWORKS
Syeda Gauhar Fatimav
Professor ECE dept, Deccan College of Engineering and Technology,
Darussalam, Hyderabad.
Syeda Kausar Fatima
Associate Professor ECE dept., Shadan College of Engineering and Technology, Hyderabad
Mohd. Mehrajuddin
Assistant Professor EIE dept., Deccan College of Engineering and Technology,
Darussalam, Hyderabad.
Saquib Mohiuddin
Student ECE dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad
ABTRACT
Due to inherent limitations in wireless sensor networks, security is a crucial issue.
While research in WSN security is progressing at tremendous pace, no comprehensive
document lists the security issues and the threat models which pose unique threats to
the wireless sensor networks. In this paper we have made an effort to document all the
known security issues in wireless sensor networks and have provided the research
direction towards countermeasures against the threats posed by these issues.
Keywords: wireless sensor network security, security issues in sensor networks.
Cite this Article: Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin
and Saquib Mohiuddin, Security Concerns in Wireless Sensor Networks, International
Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 135-
142.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
1. INTRODUCTION
Sensor networks pose unique security challenges because of their inherent limitations in
communication and computing. The deployment nature of sensor networks makes them more
vulnerable to various attacks. Sensor networks are deployed in applications where they have
physical interactions with the environment, people and other objects making them more
vulnerable to security threats. We envision that sensor networks would be deployed in mission
critical applications like battlefield, security of key land marks, building and bridges, measuring
traffic flow, habitat monitoring and farming. Inherent limitations of sensor networks can be
Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin
http://www.iaeme.com/IJARET/index.asp 136 editor@iaeme.com
categorized as node and network limitations. The privacy and security issues in sensor
networks raises rich research questions. Dense deployment of sensor networks in an unattended
environment makes sensor nodes vulnerable to potential attacks. Attackers can capture the
sensor nodes and compromise the network to accept malicious nodes as legitimate nodes. Once
within the network, attackers can rage variety of attacks. We expect Moore’s law to be applied
to drive down the cost of sensor nodes instead of improving its resources and performance.
Hardware and software improvements will address these issues at some extent but complete
secure sensor networks require deployment of countermeasures such as secure key
management, secure routing and light weight encryption techniques. This paper provides an
overview of security issues known so far in wireless sensor networks.
2. LIMITATIONSINSENSORNETWORKS
The following section list the inherent limitations in sensor networks which make the design of
security procedures more complicated.
2.1. Node limitations
A typical sensor node processor is of 4-8 MHz, having 4KB of RAM, 128KB flash and ideally
916 MHz of radio frequency. Heterogeneous nature of sensor nodes is an additional limitation
which prevents one security solution. Due to the deployment nature, sensor nodes would be
deployed in environments where they would be highly prone to physical vandalism.
2.2. Network limitations
Beside node limitations, sensor networks bring all the limitations of a mobile ad hoc network
where they lack physical infrastructure, and they rely on insecure wireless media.
2.3. Physical limitations
Sensor networks deployment nature in public and hostile environments in many applications
makes them highly vulnerable to capture and vandalism. Physically security of sensor nodes
with tamper proof material increases the node cost.
3. CHARACTERISTICS OF SENSOR NETWORKS
Sensor networks are emerging technologies currently being deployed in seismic monitoring,
wild life studies, manufacturing and performance monitoring. These sensor nodes are densely
deployed in a predetermined geographical area to self-organize into ad-hoc wireless networks
to gather and aggregate data [13]. A typical sensor network contains large number of densely
deployed, tiny, low cost nodes that use wireless peer-to-peer network. They use multi-hop and
cluster-based routing algorithms based on dynamic network and resources algorithms based on
dynamic network and discovery protocol. [14]. For the purpose of this research we assume
usage of Berkeley’s Mica2Dot sensor node [16] which is limited in terms of computations and
communication resources.
The ad hoc nature of sensor networks poses unique challenges with their security and
reliability. Resource constrained sensor nodes in terms of limited memory; low power, limited
processing abilities, and low coverage are vulnerable to intrusion, interception, modification
and fabrication. Because of these unique challenges traditional security techniques are not
enough to meet the security goals of confidentiality, integrity, reliability and availability. Unlike
traditional networks, sensor nodes are deployed physically in open areas where there is added
risk of intervention with people and environment [15]. Therefore, new security measures are
needed to address these unique sensor networks security challenges.
Security Concerns in Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 137 editor@iaeme.com
4. SECURITYINSENSORNETWORKS
Security goals in sensor networks depend on the need to know what we are going to protect.
We determine four security goals in sensor networks which are Confidentiality, Integrity,
Authentication and Availability (CIAA).
Confidentiality is the ability to conceal message from a passive attacker, where the message
communicated on sensor networks remain confidential.
Integrity refers to the ability to confirm the message has not been tampered, altered or
changed while it was on the network.
Authentication Need to know if the messages are from the node it claims to be from,
determining the reliability of message’s origin.
Availability is to determine if a node has the ability to use the resources and the network is
available for the messages to move on.
4.1. Security classes
Pfleeger [2] has identified four classes of security in computing systems. We integrate these
four threat classes in sensor networks. In computing systems the major assets are hardware,
software, and data. While in sensor networks, our goal is to protect, the network itself, the
nodes and communication among the sensor nodes. The four classes of threats which exploit
the vulnerability of our security goals are illustrated below in Figure 1:
Figure 1 Pfleeger’s four classes of Systems security threats
In an interruption, a communication link in sensor networks becomes lost or unavailable.
Examples of this sort of threats are node capture, message corruption, addition of malicious
code etc.
An interception means sensor network has been compromised by an adversary where the
attacker gains unauthorised access to sensor node or data in it. Example of this type of attacks
is node capture attacks.
Modification means unauthorised party not only accesses the data but tampers with it, for
example modifying the data packets being transmitted causing a denial of service attack such
as flooding the network with bogus data.
In fabrication, an adversary injects false data and compromises the trustworthiness of
information.
4.2. Attacks on sensor networks
Having built a foundation of security threats in computing, next section lists the possible
security attacks in sensor networks identified by [3].
Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin
http://www.iaeme.com/IJARET/index.asp 138 editor@iaeme.com
4.2.1. Passive Information Gathering
An adversary with powerful resources collecting information from sensor networks if
information is not encrypted.
4.2.2. Node subversion
Capture of a node may reveal its information including disclosure of cryptographic keys hence
compromising the whole sensor network.
4.2.3. False Node
Addition of a malicious node by an adversary to inject the malicious data, false node would be
computationally robust to lure other nodes to send data to it.
4.2.4. Node Malfunction
A malfunctioning node will generate inaccurate data which would jeopardize the integrity of
sensor network especially when that node is data aggregating node for example, a cluster leader.
4.2.5. Node Outage
What happens when a cluster leader stop functioning? Sensor network protocols should be
robust enough to mitigate the effects of node outages by providing alternate route.
4.2.6. Message Corruption
When contents of a message are modified by an attacker it compromises the message integrity.
4.2.7. Traffic Analysis
Even the message transfer is encrypted in sensor networks, it still leaves the high probability of
analysis of communication patterns and sensor activities revealing enough information to
enable adversary to cause more malicious harm to sensor networks.
4.2.8. More attacks
Chris Karlof et al [4] have presented much detailed attacks in sensor networks which are
described in the following section. Table 1 below lists these attacks.
Table 1 Attacks in Wireless Sensor Networks
Spoofed, altered, or
replayed routing
information
Create routing loop, attract or repel network traffic, extend or shorten source
routes, generate false error messages etc
Selective forwarding
Either in-path or beneath path by deliberate jamming, allows to control which
information is forwarded. A malicious node act like a black hole and refuses
to forward every packet it receives.
Sinkhole attacks Attracting traffic to a specific node, e.g. to prepare selective forwarding
Sybil attacks
A single node presents multiple identities, allows to reduce the effectiveness of
fault tolerant schemes such as distributed storage and multipath etc.
Wormhole
attacks
Tunnelling of messages over alternative low-latency links to confuse the
routing protocol, creating sinkholes etc.
Hello floods
An attacker sends or replays a routing protocols hello packets with more
energy
Security Concerns in Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 139 editor@iaeme.com
4.2.9. Routing loops
In sensor networks routing loops attacks target the information exchanged between nodes.
False error messages are generated when an attacker alters and replays the routing information.
Routing loops attract or repel the network traffic and increases node to node latency.
4.2.10. Selective forwarding
Selective forwarding is a way to influence the network traffic by believing that all the
participating nodes in network are reliable to forward the message. In selective forwarding
attack malicious nodes simply drop certain messages instead of forwarding every message.
Once a malicious node cherry picks on the messages, it reduces the latency and deceives the
neighboring nodes that they are on a shorter route. Effectiveness of this attack depends on two
factors. First the location of the malicious node, the closer it is to the base station the more
traffic it will attract. Second is the percentage of messages it drops. When selective forwarder
drops more messages and forwards less, it retains its energy level thus remaining powerful to
trick the neighboring nodes.
4.2.11. Sinkhole attacks
In sinkhole attacks, adversary attracts the traffic to a compromised node. The simplest way of
creating sinkhole is to place a malicious node where it can attract most of the traffic, possibly
closer to the base station or malicious node itself deceiving as a base station. One reason for
sinkhole attacks is to make selective forwarding possible to attract the traffic towards a
compromised node. The nature of sensor networks where all the traffic flows towards one base
station makes this type of attacks more susceptible.
4.2.12. Sybil attacks
A type of attacks where a node creates multiple illegitimate identities in sensor networks either
by fabricating or stealing the identities of legitimate nodes. Sybil attacks can be used against
routing algorithms and topology maintenance; it reduces the effectiveness of fault tolerant
schemes such as distributed storage and dispersity. Another malicious factor is geographic
routing where a Sybil node can appear at more than one place simultaneously.
4.2.13. Wormholes
In wormhole attacks an adversary positioned closer to the base station can completely disrupt
the traffic by tunneling messages over a low latency link. Here an adversary convinces the
nodes which are multi hop away that they are closer to the base station. This creates a sinkhole
because adversary on the other side of the sinkhole provides a better route to the base station.
4.2.14. Hello flood attacks
Broadcasting a message with stronger transmission power and pretending that the HELLO
message is coming from the base station. Message receiving nodes assume that the HELLO
message sending node is the closest one and they try to send all their messages through this
node. In this type of attacks all nodes will be responding to HELLO floods and wasting the
energies. The real base station will also be broadcasting the similar messages but will have
only few nodes responding to it.
4.2.15. DoS attacks
Denial of service attacks occur at physical level causing radio jamming, interfering with the
network protocol, battery exhaustion etc.
Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin
http://www.iaeme.com/IJARET/index.asp 140 editor@iaeme.com
4.3. Layering based security approach 1) Application layer
Data is collected and managed at application layer therefore it is important to ensure the
reliability of data. Wagner [6] has presented a resilient aggregation scheme which is applicable
to a cluster based network where a cluster leader acts as an aggregator in sensor networks.
However this technique is applicable if the aggregating node is in the range with all the source
nodes and there is no intervening aggregator between the aggregator and source nodes. In
hierarchical clustering approach, communication channel between the aggregator and base
station has potentially limited bandwidth because the cluster leader as an aggregator itself is a
sensor node [5, 6]. To prove the validity of the aggregation, cluster leaders use the
cryptographic techniques to ensure the data reliability.
4.3.1. Network Layer
Network layer is responsible for routing of messages from node to node, node to cluster
leader, cluster leaders to cluster leaders, cluster leaders to the base station and vice versa.
Routing protocols in sensor networks are of two types (1) ID-based protocols, in which
packets are routed to the destination based on the IDs specified in the packets, and (2) data
centric protocols [7] in which packets contain attributes that specify the type of data being
provided. Law and Havinga [5] have described Karlof and Wagner’s [4] routing attacks in
sensor networks as below:
• Packets are dropped completely, or selectively.
• The network is flooded with global broadcasts.
• Some sensor nodes in the network are misguided into believing that nodes are either
multiple hops away or that do not exist at all in the neighbours.
• A significant proportion of the traffic is tunnelled from one place in the network to
another distant place of the network depriving other parts of the network that under
normal circumstances would have received the traffic themselves.
• Sometimes traffic is lured to a particular node or a small group of nodes, depriving
other parts of the network that normally would have received the traffic themselves.
• Security of routing protocols depends on the location of nodes and the encryption
techniques.
4.3.2. Data Link layer
Data link layer does the error detection and correction, and encoding of data. Link layer is
vulnerable to jamming and DoS attacks. TinySec [9] has introduced link layer encryption
which depends on a key management scheme. However, an attacker having better energy
efficiency can still rage an attack. Protocols like LMAC [8] have better antijamming properties
which are viable countermeasure at this layer.
4.3.3. Physical Layer
The physical layer emphasizes on the transmission media between sending and receiving nodes,
the data rate, signal strength, frequency types are also addressed in this layer. Ideally FHSS
frequency hopping spread spectrum is used in sensor networks.
Table II below summarizes the attacks and countermeasures in a layering model in sensor
networks.
Security Concerns in Wireless Sensor Networks
http://www.iaeme.com/IJARET/index.asp 141 editor@iaeme.com
Table 2 Layering Approach In Sensor Network Attacks And Countermeasures
Attack types Countermeasures
Application Layer
Subversion and Malicious
Nodes
Malicious Node
Detection and Isolation
Network Layer
Wormholes, Sinkholes, Sybil,
Routing loops
Key Management, Secure Routing
Data Link Layer Link layer Jamming Link layer encryption
Physical Layer DoS and Node capture attcks
Adaptive antennas, Spread
Spectrum
5. CONCLUSION
Wireless Sensor networks have become promising future to many applications. In the absence
of adequate security, deployment of sensor networks is vulnerable to variety of attacks. Sensor
node’s limitations and nature of wireless communication poses unique security challenges.
Current research in sensor network security is mostly built on a trusted environment [12];
however there are several research challenges remain unanswered before we can trust on sensor
networks. In this paper we have discussed threat models and unique security issues faced by
wireless sensor networks. On the basis of our observation we motivate the need of a security
framework to provide countermeasures against attacks in wireless sensor networks.
REFERENCES
[1] L. Eschenauer and V. Gligor, A key-management scheme for distributed sensor networks,
Proceedings of the 9th
ACM conference on Computer and Communication Security 2002,
Washington DC, USA
[2] C.P. Fleeger, Security in computing, 3rd
edition, Prentice-Hall Inc. NJ. 2003
[3] J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston, Security for sensor networks, 2002
CADIP Research Symposium.
[4] C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and
Countermeasures, Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network
Applications and Protocols, Vol. 1, No. 2-3, pp. 293-315, 2003.
[5] Y.W. Law and P. J.M Havinga, How to secure sensor network, Proceeding of the 2005
International Conference on Sensor Networks and Information Processing, 5-8 Dec. 2005
pp. 89-95
[6] D. Wagner, Resilient aggregation in sensor networks, In Proceedings of the 2nd
ACM
workshop on Security of ad hoc and sensor networks. ACM Press, 2004, pp. 78-87.
[7] D. Ganesan, A. Cerpa, Y. Yu, and D. Estrin, Networking issues in wireless sensor networks,
Journal of Parallel and Distributed Computing (JPDC), Special issue on Frontiers in
Distributed Sensor Networks. Vol. 64, 2004.
[8] L.V. Hoesel and P. Havinga, A Lightweight Medium Access Protocol (LMAC) for wireless
sensor networks: reducing preamble transmissions and transceiver state switches, in the
proceedings of INSS, June 2004.
[9] C. karlof, N. Shastry and D. Wagner, TinySec: A link layer security architecture for wireless
sensor networks, SenSys’04, November 3-5 2004, Baltimore, Maryland, USA
[10] H. Chan, A. Perrig, Security and privacy in sensor networks, IEEE Journal of Computing,
Vol. 36, Issue 10, Oct. 2003, pp. 103-105
[11] F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons, NY 2002, ISBN:0-
470-84493-0
[12] E. Shi, and A. Perrig, Designing secure sensor networks, Journal of IEEE Wireless
Communications, Vol. 11, Issue 6, Dec. 2004 pgs 38-43.
Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin
http://www.iaeme.com/IJARET/index.asp 142 editor@iaeme.com
[13] N. Hu, Randy R. K. Smith and P. G. Bradford, Security for Fixed Sensor Networks,
Proceedings of the 42nd annual Southeast regional conference, ACM Press, 2004, NY,
USA
[14] R. Anderson, H. Chan, and A. Perrig, Key infection: smart trust for smart dust, 12th IEEE
International Conference on Network Protocols. Oct 5-8 2004, Berlin, Germany
[15] A. Perrig, J Stankovic, D. Wagner, Security in wireless sensor network, Communication of
the ACM, Vol.47, No. 6, 2004
[16] Wireless sensor networks: getting started guide, Crossbow Technology, Inc,
San Jose, CA, Aug’04. http://www.xbow.com/Support/Support_pdf_files/Gettin
g_Started_Guide_7430-0022-05_B.pdf [Viewed online 10 June 2006]

More Related Content

What's hot

Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoceSAT Publishing House
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions inIJNSA Journal
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksZainab Nayyar
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...IJCNCJournal
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)pijans
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 

What's hot (17)

Enhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hocEnhanced security in spontaneous wireless ad hoc
Enhanced security in spontaneous wireless ad hoc
 
A Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor NetworkA Security Overview of Wireless Sensor Network
A Security Overview of Wireless Sensor Network
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...A technical review and comparative analysis of machine learning techniques fo...
A technical review and comparative analysis of machine learning techniques fo...
 
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksMulti-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor Networks
 
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
TRUST FACTOR AND FUZZY-FIREFLY INTEGRATED PARTICLE SWARM OPTIMIZATION BASED I...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
433 438
433 438433 438
433 438
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 

Similar to SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.AIRCC Publishing Corporation
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
AN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNAN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNIAEME Publication
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network securityaibad ahmed
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksScott Faria
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 

Similar to SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS (20)

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
AN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNAN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSN
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 
A Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor NetworksA Study On Security In Wireless Sensor Networks
A Study On Security In Wireless Sensor Networks
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
N010617783
N010617783N010617783
N010617783
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS

  • 1. http://www.iaeme.com/IJARET/index.asp 135 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp.135-142. Article ID: IJARET_10_02_015 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS Syeda Gauhar Fatimav Professor ECE dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad. Syeda Kausar Fatima Associate Professor ECE dept., Shadan College of Engineering and Technology, Hyderabad Mohd. Mehrajuddin Assistant Professor EIE dept., Deccan College of Engineering and Technology, Darussalam, Hyderabad. Saquib Mohiuddin Student ECE dept, Deccan College of Engineering and Technology, Darussalam, Hyderabad ABTRACT Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues. Keywords: wireless sensor network security, security issues in sensor networks. Cite this Article: Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin, Security Concerns in Wireless Sensor Networks, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 135- 142. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2 1. INTRODUCTION Sensor networks pose unique security challenges because of their inherent limitations in communication and computing. The deployment nature of sensor networks makes them more vulnerable to various attacks. Sensor networks are deployed in applications where they have physical interactions with the environment, people and other objects making them more vulnerable to security threats. We envision that sensor networks would be deployed in mission critical applications like battlefield, security of key land marks, building and bridges, measuring traffic flow, habitat monitoring and farming. Inherent limitations of sensor networks can be
  • 2. Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin http://www.iaeme.com/IJARET/index.asp 136 editor@iaeme.com categorized as node and network limitations. The privacy and security issues in sensor networks raises rich research questions. Dense deployment of sensor networks in an unattended environment makes sensor nodes vulnerable to potential attacks. Attackers can capture the sensor nodes and compromise the network to accept malicious nodes as legitimate nodes. Once within the network, attackers can rage variety of attacks. We expect Moore’s law to be applied to drive down the cost of sensor nodes instead of improving its resources and performance. Hardware and software improvements will address these issues at some extent but complete secure sensor networks require deployment of countermeasures such as secure key management, secure routing and light weight encryption techniques. This paper provides an overview of security issues known so far in wireless sensor networks. 2. LIMITATIONSINSENSORNETWORKS The following section list the inherent limitations in sensor networks which make the design of security procedures more complicated. 2.1. Node limitations A typical sensor node processor is of 4-8 MHz, having 4KB of RAM, 128KB flash and ideally 916 MHz of radio frequency. Heterogeneous nature of sensor nodes is an additional limitation which prevents one security solution. Due to the deployment nature, sensor nodes would be deployed in environments where they would be highly prone to physical vandalism. 2.2. Network limitations Beside node limitations, sensor networks bring all the limitations of a mobile ad hoc network where they lack physical infrastructure, and they rely on insecure wireless media. 2.3. Physical limitations Sensor networks deployment nature in public and hostile environments in many applications makes them highly vulnerable to capture and vandalism. Physically security of sensor nodes with tamper proof material increases the node cost. 3. CHARACTERISTICS OF SENSOR NETWORKS Sensor networks are emerging technologies currently being deployed in seismic monitoring, wild life studies, manufacturing and performance monitoring. These sensor nodes are densely deployed in a predetermined geographical area to self-organize into ad-hoc wireless networks to gather and aggregate data [13]. A typical sensor network contains large number of densely deployed, tiny, low cost nodes that use wireless peer-to-peer network. They use multi-hop and cluster-based routing algorithms based on dynamic network and resources algorithms based on dynamic network and discovery protocol. [14]. For the purpose of this research we assume usage of Berkeley’s Mica2Dot sensor node [16] which is limited in terms of computations and communication resources. The ad hoc nature of sensor networks poses unique challenges with their security and reliability. Resource constrained sensor nodes in terms of limited memory; low power, limited processing abilities, and low coverage are vulnerable to intrusion, interception, modification and fabrication. Because of these unique challenges traditional security techniques are not enough to meet the security goals of confidentiality, integrity, reliability and availability. Unlike traditional networks, sensor nodes are deployed physically in open areas where there is added risk of intervention with people and environment [15]. Therefore, new security measures are needed to address these unique sensor networks security challenges.
  • 3. Security Concerns in Wireless Sensor Networks http://www.iaeme.com/IJARET/index.asp 137 editor@iaeme.com 4. SECURITYINSENSORNETWORKS Security goals in sensor networks depend on the need to know what we are going to protect. We determine four security goals in sensor networks which are Confidentiality, Integrity, Authentication and Availability (CIAA). Confidentiality is the ability to conceal message from a passive attacker, where the message communicated on sensor networks remain confidential. Integrity refers to the ability to confirm the message has not been tampered, altered or changed while it was on the network. Authentication Need to know if the messages are from the node it claims to be from, determining the reliability of message’s origin. Availability is to determine if a node has the ability to use the resources and the network is available for the messages to move on. 4.1. Security classes Pfleeger [2] has identified four classes of security in computing systems. We integrate these four threat classes in sensor networks. In computing systems the major assets are hardware, software, and data. While in sensor networks, our goal is to protect, the network itself, the nodes and communication among the sensor nodes. The four classes of threats which exploit the vulnerability of our security goals are illustrated below in Figure 1: Figure 1 Pfleeger’s four classes of Systems security threats In an interruption, a communication link in sensor networks becomes lost or unavailable. Examples of this sort of threats are node capture, message corruption, addition of malicious code etc. An interception means sensor network has been compromised by an adversary where the attacker gains unauthorised access to sensor node or data in it. Example of this type of attacks is node capture attacks. Modification means unauthorised party not only accesses the data but tampers with it, for example modifying the data packets being transmitted causing a denial of service attack such as flooding the network with bogus data. In fabrication, an adversary injects false data and compromises the trustworthiness of information. 4.2. Attacks on sensor networks Having built a foundation of security threats in computing, next section lists the possible security attacks in sensor networks identified by [3].
  • 4. Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin http://www.iaeme.com/IJARET/index.asp 138 editor@iaeme.com 4.2.1. Passive Information Gathering An adversary with powerful resources collecting information from sensor networks if information is not encrypted. 4.2.2. Node subversion Capture of a node may reveal its information including disclosure of cryptographic keys hence compromising the whole sensor network. 4.2.3. False Node Addition of a malicious node by an adversary to inject the malicious data, false node would be computationally robust to lure other nodes to send data to it. 4.2.4. Node Malfunction A malfunctioning node will generate inaccurate data which would jeopardize the integrity of sensor network especially when that node is data aggregating node for example, a cluster leader. 4.2.5. Node Outage What happens when a cluster leader stop functioning? Sensor network protocols should be robust enough to mitigate the effects of node outages by providing alternate route. 4.2.6. Message Corruption When contents of a message are modified by an attacker it compromises the message integrity. 4.2.7. Traffic Analysis Even the message transfer is encrypted in sensor networks, it still leaves the high probability of analysis of communication patterns and sensor activities revealing enough information to enable adversary to cause more malicious harm to sensor networks. 4.2.8. More attacks Chris Karlof et al [4] have presented much detailed attacks in sensor networks which are described in the following section. Table 1 below lists these attacks. Table 1 Attacks in Wireless Sensor Networks Spoofed, altered, or replayed routing information Create routing loop, attract or repel network traffic, extend or shorten source routes, generate false error messages etc Selective forwarding Either in-path or beneath path by deliberate jamming, allows to control which information is forwarded. A malicious node act like a black hole and refuses to forward every packet it receives. Sinkhole attacks Attracting traffic to a specific node, e.g. to prepare selective forwarding Sybil attacks A single node presents multiple identities, allows to reduce the effectiveness of fault tolerant schemes such as distributed storage and multipath etc. Wormhole attacks Tunnelling of messages over alternative low-latency links to confuse the routing protocol, creating sinkholes etc. Hello floods An attacker sends or replays a routing protocols hello packets with more energy
  • 5. Security Concerns in Wireless Sensor Networks http://www.iaeme.com/IJARET/index.asp 139 editor@iaeme.com 4.2.9. Routing loops In sensor networks routing loops attacks target the information exchanged between nodes. False error messages are generated when an attacker alters and replays the routing information. Routing loops attract or repel the network traffic and increases node to node latency. 4.2.10. Selective forwarding Selective forwarding is a way to influence the network traffic by believing that all the participating nodes in network are reliable to forward the message. In selective forwarding attack malicious nodes simply drop certain messages instead of forwarding every message. Once a malicious node cherry picks on the messages, it reduces the latency and deceives the neighboring nodes that they are on a shorter route. Effectiveness of this attack depends on two factors. First the location of the malicious node, the closer it is to the base station the more traffic it will attract. Second is the percentage of messages it drops. When selective forwarder drops more messages and forwards less, it retains its energy level thus remaining powerful to trick the neighboring nodes. 4.2.11. Sinkhole attacks In sinkhole attacks, adversary attracts the traffic to a compromised node. The simplest way of creating sinkhole is to place a malicious node where it can attract most of the traffic, possibly closer to the base station or malicious node itself deceiving as a base station. One reason for sinkhole attacks is to make selective forwarding possible to attract the traffic towards a compromised node. The nature of sensor networks where all the traffic flows towards one base station makes this type of attacks more susceptible. 4.2.12. Sybil attacks A type of attacks where a node creates multiple illegitimate identities in sensor networks either by fabricating or stealing the identities of legitimate nodes. Sybil attacks can be used against routing algorithms and topology maintenance; it reduces the effectiveness of fault tolerant schemes such as distributed storage and dispersity. Another malicious factor is geographic routing where a Sybil node can appear at more than one place simultaneously. 4.2.13. Wormholes In wormhole attacks an adversary positioned closer to the base station can completely disrupt the traffic by tunneling messages over a low latency link. Here an adversary convinces the nodes which are multi hop away that they are closer to the base station. This creates a sinkhole because adversary on the other side of the sinkhole provides a better route to the base station. 4.2.14. Hello flood attacks Broadcasting a message with stronger transmission power and pretending that the HELLO message is coming from the base station. Message receiving nodes assume that the HELLO message sending node is the closest one and they try to send all their messages through this node. In this type of attacks all nodes will be responding to HELLO floods and wasting the energies. The real base station will also be broadcasting the similar messages but will have only few nodes responding to it. 4.2.15. DoS attacks Denial of service attacks occur at physical level causing radio jamming, interfering with the network protocol, battery exhaustion etc.
  • 6. Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin http://www.iaeme.com/IJARET/index.asp 140 editor@iaeme.com 4.3. Layering based security approach 1) Application layer Data is collected and managed at application layer therefore it is important to ensure the reliability of data. Wagner [6] has presented a resilient aggregation scheme which is applicable to a cluster based network where a cluster leader acts as an aggregator in sensor networks. However this technique is applicable if the aggregating node is in the range with all the source nodes and there is no intervening aggregator between the aggregator and source nodes. In hierarchical clustering approach, communication channel between the aggregator and base station has potentially limited bandwidth because the cluster leader as an aggregator itself is a sensor node [5, 6]. To prove the validity of the aggregation, cluster leaders use the cryptographic techniques to ensure the data reliability. 4.3.1. Network Layer Network layer is responsible for routing of messages from node to node, node to cluster leader, cluster leaders to cluster leaders, cluster leaders to the base station and vice versa. Routing protocols in sensor networks are of two types (1) ID-based protocols, in which packets are routed to the destination based on the IDs specified in the packets, and (2) data centric protocols [7] in which packets contain attributes that specify the type of data being provided. Law and Havinga [5] have described Karlof and Wagner’s [4] routing attacks in sensor networks as below: • Packets are dropped completely, or selectively. • The network is flooded with global broadcasts. • Some sensor nodes in the network are misguided into believing that nodes are either multiple hops away or that do not exist at all in the neighbours. • A significant proportion of the traffic is tunnelled from one place in the network to another distant place of the network depriving other parts of the network that under normal circumstances would have received the traffic themselves. • Sometimes traffic is lured to a particular node or a small group of nodes, depriving other parts of the network that normally would have received the traffic themselves. • Security of routing protocols depends on the location of nodes and the encryption techniques. 4.3.2. Data Link layer Data link layer does the error detection and correction, and encoding of data. Link layer is vulnerable to jamming and DoS attacks. TinySec [9] has introduced link layer encryption which depends on a key management scheme. However, an attacker having better energy efficiency can still rage an attack. Protocols like LMAC [8] have better antijamming properties which are viable countermeasure at this layer. 4.3.3. Physical Layer The physical layer emphasizes on the transmission media between sending and receiving nodes, the data rate, signal strength, frequency types are also addressed in this layer. Ideally FHSS frequency hopping spread spectrum is used in sensor networks. Table II below summarizes the attacks and countermeasures in a layering model in sensor networks.
  • 7. Security Concerns in Wireless Sensor Networks http://www.iaeme.com/IJARET/index.asp 141 editor@iaeme.com Table 2 Layering Approach In Sensor Network Attacks And Countermeasures Attack types Countermeasures Application Layer Subversion and Malicious Nodes Malicious Node Detection and Isolation Network Layer Wormholes, Sinkholes, Sybil, Routing loops Key Management, Secure Routing Data Link Layer Link layer Jamming Link layer encryption Physical Layer DoS and Node capture attcks Adaptive antennas, Spread Spectrum 5. CONCLUSION Wireless Sensor networks have become promising future to many applications. In the absence of adequate security, deployment of sensor networks is vulnerable to variety of attacks. Sensor node’s limitations and nature of wireless communication poses unique security challenges. Current research in sensor network security is mostly built on a trusted environment [12]; however there are several research challenges remain unanswered before we can trust on sensor networks. In this paper we have discussed threat models and unique security issues faced by wireless sensor networks. On the basis of our observation we motivate the need of a security framework to provide countermeasures against attacks in wireless sensor networks. REFERENCES [1] L. Eschenauer and V. Gligor, A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and Communication Security 2002, Washington DC, USA [2] C.P. Fleeger, Security in computing, 3rd edition, Prentice-Hall Inc. NJ. 2003 [3] J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston, Security for sensor networks, 2002 CADIP Research Symposium. [4] C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and Countermeasures, Elsevier’s Ad Hoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, Vol. 1, No. 2-3, pp. 293-315, 2003. [5] Y.W. Law and P. J.M Havinga, How to secure sensor network, Proceeding of the 2005 International Conference on Sensor Networks and Information Processing, 5-8 Dec. 2005 pp. 89-95 [6] D. Wagner, Resilient aggregation in sensor networks, In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. ACM Press, 2004, pp. 78-87. [7] D. Ganesan, A. Cerpa, Y. Yu, and D. Estrin, Networking issues in wireless sensor networks, Journal of Parallel and Distributed Computing (JPDC), Special issue on Frontiers in Distributed Sensor Networks. Vol. 64, 2004. [8] L.V. Hoesel and P. Havinga, A Lightweight Medium Access Protocol (LMAC) for wireless sensor networks: reducing preamble transmissions and transceiver state switches, in the proceedings of INSS, June 2004. [9] C. karlof, N. Shastry and D. Wagner, TinySec: A link layer security architecture for wireless sensor networks, SenSys’04, November 3-5 2004, Baltimore, Maryland, USA [10] H. Chan, A. Perrig, Security and privacy in sensor networks, IEEE Journal of Computing, Vol. 36, Issue 10, Oct. 2003, pp. 103-105 [11] F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons, NY 2002, ISBN:0- 470-84493-0 [12] E. Shi, and A. Perrig, Designing secure sensor networks, Journal of IEEE Wireless Communications, Vol. 11, Issue 6, Dec. 2004 pgs 38-43.
  • 8. Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin http://www.iaeme.com/IJARET/index.asp 142 editor@iaeme.com [13] N. Hu, Randy R. K. Smith and P. G. Bradford, Security for Fixed Sensor Networks, Proceedings of the 42nd annual Southeast regional conference, ACM Press, 2004, NY, USA [14] R. Anderson, H. Chan, and A. Perrig, Key infection: smart trust for smart dust, 12th IEEE International Conference on Network Protocols. Oct 5-8 2004, Berlin, Germany [15] A. Perrig, J Stankovic, D. Wagner, Security in wireless sensor network, Communication of the ACM, Vol.47, No. 6, 2004 [16] Wireless sensor networks: getting started guide, Crossbow Technology, Inc, San Jose, CA, Aug’04. http://www.xbow.com/Support/Support_pdf_files/Gettin g_Started_Guide_7430-0022-05_B.pdf [Viewed online 10 June 2006]