1. This document reviews privacy preserving techniques in wireless sensor networks. It discusses challenges to privacy in WSNs including data privacy, location privacy, and network privacy.
2. Wireless sensor networks face unique challenges to privacy preservation due to their constrained environment, limited sensor resources, and multi-hop network topology. This makes existing privacy techniques difficult to apply directly to WSNs.
3. The document surveys several techniques that have been proposed for preserving different types of privacy in WSNs, including location privacy, data privacy during aggregation, and preventing traffic analysis attacks on network privacy. More research is still needed to address open problems in privacy for WSNs.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
This research paper addresses the issue of secure data sharing for distributed data storage in Wireless Sensor Networks (WSNs). In WSNs, storing data at local sensor nodes or at designated in-network nodes greatly saves the network-wide communi¬cation load and has a lot of benefits such as energy-efficiency.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
This research paper addresses the issue of secure data sharing for distributed data storage in Wireless Sensor Networks (WSNs). In WSNs, storing data at local sensor nodes or at designated in-network nodes greatly saves the network-wide communi¬cation load and has a lot of benefits such as energy-efficiency.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
Secure and privacy preserving data centric sensor networks with multi query o...eSAT Journals
Abstract
In large-scale Wireless Sensor Networks the effective use of the vast amounts of data gathered will require scalable, self-organizing, and energy-efficient data dissemination and data retrieval techniques. Data Centric Sensor (DCS) networks is a better approach in which the sensor nodes send the sensed data to a designated sensor node whose name is associated with sensed data. However, due to unattended nature of Wireless Sensor Networks, these sensor nodes are susceptible to different types of attacks. The attacker may compromise these storage nodes and get data of his interest. In this paper we propose a Secure and Privacy Preserving Data Centric Sensor Networks that includes security and privacy support to DCS networks. We use multi level key structure and cryptographic algorithms to provide security. In addition, we propose a multi-query optimization technique that aggregates similar queries for a small periodic time and construct a query message. This reduces the number of messages required to serve multiple similar queries. Simulation and experimental results show that our work provides a secure privacy preserving data centric sensor network based on cryptographic keys and reduces the message overhead and incurs a minimum communication cost compared to previous works
Keywords: Data Centric Sensor Networks, Privacy preserving, Query Optimization, Security, Steiner tree, Wireless Sensor Networks
Integrated Security and Attack Detection Scheme for Wireless Sensor NetworksEditor IJMTER
The wireless sensor node is a tiny device that is used to capture environment information.
Sensor devices are used to capture temperature and pressure details from the environment. The
sensor devices are used in hospitals, home and production plants. The main components of a sensor
node are microcontroller, transceiver, external memory and power source. A wireless sensor network
(WSN) is a wireless network consisting of spatially distributed autonomous devices. Sensors are
used to cooperatively monitor physical or environmental conditions. Sensor network is equipped
with a radio transceiver or other wireless communications device. The sensor networks are deployed
with consideration of sensing and transmission coverage factors.
Sensor network security protocols provide confidentiality for the messages. Object location and data
sink information are the sensitive elements in the sensor network. Two techniques are used to
provide location privacy to monitored objects. They are Source-location privacy and Sink-location
privacy. Periodic collection and Source simulation models are used in Source-location privacy
technique. Sink simulation and backbone flooding models are used in Sink-location privacy
technique. Communication cost and latency factors are consider in the privacy protection model.
Source and destination location details are protected in the privacy model.
The proposed system integrates the location privacy and data security process for the wireless sensor
network. Region based query model is used to improve location privacy. Confidentiality and
integrity techniques are used for the security process. Rivest Cipher (RC4) algorithm and Secure
Hashing Algorithms (SHA) are used for the data security.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Wireless sensor networks are made up of number of tiny mobile nodes, which
have the capability of computation, sensing and wireless network communication. The
energy efficiency of each node in such kind of networks is one of the important issues under
consideration. Thus for these networks, sensor nodes life time is basically depends on use of
routing protocols for routing operations in WSN. There are various routing protocols
proposed by different researchers, which are considered as efficient on the basis of
performance of network lifetime and energy scavenging. There are different routing
protocols introduced for WSN such as flat routing protocols, clustering routing protocols,
hierarchical routing protocols etc. On the other hand, there are basically two types of
WSNs, homogeneous and heterogeneous sensor networks. As WSN is vulnerable to different
types of security threats, there are many security methods presented with their own
advantages and disadvantages. Most of security methods are applied only on homogeneous
WSN, but recently some methods were presented to provide the routing security in
heterogeneous WSNs as well. In this paper, the different security threats and Intrusions in
WSNs are presented, with review of different security methods.
Similar to A review of privacy preserving techniques in wireless sensor network (20)
A review of privacy preserving techniques in wireless sensor network
1. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.4, No.3, 2014
1
A Review of Privacy Preserving Techniques in Wireless Sensor
Network
Snehal M. Gaikwad1*
Vidya Dhamdhere2
1. M.E. student, G.H.Raisoni College of Engg. And Mgmt.,Pune,Maharashtra,India
2. Asst. Prof. , G.H.Raisoni College of Engg. And Mgmt.,Pune,Maharashtra,India
* E-mail of the corresponding author: gaikwad.snehal99@gmail.com
Abstract
This paper represents a review of privacy preserving techniques in wireless sensor network. Wireless sensor
networks are not secure. To preserve privacy of wireless sensor network various techniques are discovered. A lot
of work has been done to address challenges faced to preserve privacy of wireless sensor network. In this paper
we represent a research on privacy preserving techniques used in location privacy, data privacy and network
privacy. This paper should provide help for further research in privacy preservation in wireless sensor network.
Keywords: Context privacy, data privacy, source location privacy
1. Introduction
1.1 Wireless sensor network and its applications:
Fig.1. shows architecture of wireless sensor network. A wireless sensor network [1] is a collection of sensor
nodes which has resource limitations such as battery power, storage and communication capability. This
collection of sensor nodes uses radio interface to communicate with one another to form a network. Simple
equation of wireless sensor network is sensing power+processor+radio=possible applications.
Wireless sensor network has many important and necessary applications [25]. Wireless sensor network
can be Terrestrial Wireless sensor network, Underground Wireless sensor network, Underwater Wireless sensor
network, Multi-media Wireless sensor network, Mobile Wireless sensor network. These sensor networks are used
in many applications like security, monitoring, biomedical research, tracking etc.
These applications are divided into many classes like Environmental Military applications, data
collection, Security monitoring, Wildfire detection, sensor node tracking, health application, home application,
and hybrid networks. At the beginning wireless sensor network was used in defense application like in military.
VigilNet is a wireless sensor network used in military that captures and verifies information about enemy
capabilities and positions of hostile targets. Wireless sensor network is also used in environmental data collection
operation used to collect various sensor data in a particular period of time. In disaster relief operation also
wireless sensor network is used in wildlife detection by dropping sensor nodes from aircraft over wildlife.
Wireless sensor network is used in facility management for intrusion detection into industrial sites and other
restricted areas. Most important use of wireless sensor network is in medical and healthcare for post-operative or
intensive care of patient. Wireless sensor network is also used in vehicle telemetries by providing better traffic
control by obtaining finer-grained information about traffic conditions. WSN is also used in home applications
like TV, air conditioner.
WSN offers a wide variety of applications[27] that can be implemented in real world. But to implement them a
lot of challenges need to be addressed. These challenges are :Types of Service, QOS, Fault tolerance, Lifetime,
Scalability, Wide range of densities, Programmability, Maintainability, Multihop wireless communication,
Energy-efficient operation, Auto-configuration, Collaboration and in-network processing, Data-centric
networking, Locality, Exploit trade-offs, privacy.
a. Types of service: Wireless sensor network does not mean simply transferring or moving information from –
Not simply moving bits from one place in the network to another rather it needs to move meaningful information.
For example moving information through WSN in given time interval or in specified geometrical region only.
b. Quality of Service (QOS): Maintain QOS in application like multi-media or time critical Multi-media
application requires enough good quality of contents (video, audio and image). In time critical application, the
data should be delivered within a certain period of time from the moment it is sensed; otherwise the data will be
useless.
c. Fault tolerance: Sensor nodes are prone to failure because of unattended environment. Hence we need to
provide new protocol, algorithms to handle these types of failures.
d. Lifetime: Lifetime of sensing node.
e. Scalability: Architecture and protocols of WSN need to support a large number of sensors.
e. Programmability: Increase the flexibility by enabling the re-programming of nodes in the field to react to new
situations
2. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.4, No.3, 2014
2
f. Maintainability: Maintenance of WSN nodes and other devices over changing requirements.
g. Security: An effective and efficient compromise should be achieved, between security demands for secure
communication and low bandwidth required for communication in sensor network.
1.2 Need for preserving privacy in WSN application[27]
Privacy issue is widely explored in the field of database, networks, data mining and other fields. Many
techniques are used to protect data when it flows from one node to other. Fig.2 shows privacy types [26] in
wireless sensor network. There are many attacks against the privacy. These privacy Attacks are classified into
two main categories and this shows why privacy preservation is very needful in WSN. Categories are a. Data
oriented privacy and b. Context oriented privacy.
1.2.1. Data Oriented privacy mainly deals with preserving privacy of data which is collected from different
nodes and sent to the sink node known as data aggregation because attacker is trying to get or modify the data
which is transferred between source and sink node and solve privacy problem of data query.
1.2.2. Context oriented privacy deals with protection of sensor event because sensor events are so sensitive that it
is needed to protect all information surrounding these sensor events. The context-oriented information includes
information on source location, sink location and timing of events.
1.2.2.1. Location privacy: Location privacy plays an important role in WSN such as, location of special
sensor node, data source. Adversary can find out location of sensor node that monitors the important object,
successfully localizes and captures the object.
1.2.2.2. Temporal privacy: Temporal privacy is important in the mobile target tracking application of WSN. For
example in military field where assets are sensed by a sensor node an adversary with knowledge of such timing
information may be able to predict the moving path of the mobile target in the future, thus violating the privacy
of the target.
1.3 Need for research on preserving privacy in WSN
Section 1.2 describes privacy categories in wireless sensor network. There are many attacks against the privacy
categories. Many techniques have been discovered for preserving privacy of data as well as location. But to
increase security and privacy of data more research needs to be done on privacy preservation. Only a few people
have carried out a research on attacks on privacy of data which is stored at sink. Therefore more research needs
to be done in this area.
1.4 Challenges in privacy preservation WSN [25]
Privacy protection has been important in many fields like wireless networking, databases and data mining. The
following features of WSNs introduce unique challenges for privacy preservation of data and prevent the
existing techniquesfrombeingdirectlyimplementedinthesenetworks.
1.4.1 Uncontrollable environment: sensors may have to be deployed in an environment that is
uncontrollable by the defender, such as a battlefield, enabling an adversary to launch physical attacks to capture
sensor nodes or deploy counterfeit ones. As a result, an adversary may retrieve private keys used for secure
communication and decrypt any communication eavesdropped by the adversary.
1.4.2 Sensor-node resource constraints: battery-powered sensor nodes generally have severe constraints on
their ability to store, process and transmit the sensed data. As a result, the computational complexity and
resource consumption of public-key ciphers is usually considered unsuitable for WSNs.
1.4.3 Topological constraints: The limited communication range of sensor nodes in a WSN requires
multiple hops in order to transmit data from the source to the base station. Such a multi-hop scheme demands
different nodes to take diverse traffic loads. In particular, a node closer to the base station (i.e., data collecting
and processing server) has to relay data from nodes further away from base station in addition to transmitting its
own generated data, leading to higher transmission rate. Such an unbalanced network traffic pattern brings
significant challenges to the protection of context-oriented privacy information. Particularly, if an adversary has
the ability to carry out a global traffic analysis, observing the traffic patterns of different nodes over the whole
network, it can easily identify the sink and compromise context privacy, or even manipulate the sink node to
impede the proper functioning of the WSN. The unique challenges for privacy preservation in WSNs call for
development of effective privacy-preserving techniques. Supporting efficient in-network data aggregation while
preserving data privacy has emerged as an important requirement in numerous wireless sensor network
applications.
3. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.4, No.3, 2014
3
2. REVIEW OF PRIVACY PRESERVATION TECHNIQUES
Many Authors represent many techniques for location privacy, data privacy, network privacy etc.
In [2] Jianbo Yao,Guangjun Wen et.al. have presented DADPP (Data Aggregation Different Privacy-Levels
Protection)for data aggregration privacy for wireless sensor networks. Jianbo proposed DADPP used for
different levels of data aggregation privacy. At different levels, nodes within the same cluster are divided into
many groups and privacy levels are described for each groups that is a node belonging to same group having
same privacy level. In[3] Jianbo Yao et.al. represented location privacy of mobile sink node in WSN. Author
used the scheme based on local flooding of source and greedy random-walk of sink which means that source
does not do have any information about sink and sink uses greedy random walk to collect data from other nodes
which prevents predicting their locations and movements from attackers. In[4] Jianbo Yao et.al. presented
scheme for source location privacy in WSN. Author proposed a DROW (directed random walk) scheme for
privacy of monitoring object when wireless sensor network is used to monitor the sensitive objects. In[5]
George, C.M. et.al. proposed a recurrent cluster mechanism for location privacy. Author also described data-
oriented and context-oriented privacy preserving techniques. Author used cluster mechanism for preserving
privacy of information on location of events or on location of base stations.
In[8] YaHui Li, Ding Yong et. al. have proposed secure message distribution scheme with configurable
privacy for a heterogeneous wireless sensor network (HWSN).The characteristic of this scheme is user can only
see a message that is intended for him and the sensor node can only generate one signature for all the messages
for all the users, which saves the communication and computation cost of the sensor node. In[9] Shaikh,
R.A.,Jameel, H. et. al. have presented novel scheme for full network level privacy. For this author used Identity,
Route and Location (IRL) privacy algorithm and data privacy mechanism. In[10] Yun Li,Jian Ren et.al. have
presented novel scheme for source location privacy. Author represents routing to randomly select intermediate
node/nodes before the message is transmitted to the SINK node for maintaining privacy. In[11] Wenbo He,Xue
Liu et.al. represented two schemes cluster-based private data aggregation (CPDA) and Slice-Mix-AggRegaTe
(SMART) for data aggregration privacy preservation. CDPA includes clustering protocol and algebraic
properties of polynomials and SMART includes slicing techniques and associative property of addition.
In[12] Yun Li,Jian RenSensor et.al. have proposed novel schemes for content confidentiality and source-
location privacy through routing to a randomly selected intermediate node (RRIN) and a network mixing ring
(NMR).RRIN provides local source- location privacy and NMR gives network-level (global) source- location
privacy.In[13] Bista, R., Hye-Kyeom Yoo et.al. represent a mechanism for privacy preserving data aggregation.
A sink node must be aware of the Ids of all those sensor nodes which aggregate the value of sensors data in order
to derive exact result. To solve this problem, set of real numbers is assigned as the IDs of sensor nodes so that a
single bit is sufficient to hold ID of a sensor node during transmission of aggregated data to the sink node.
In[6] Sivashankari, S. et.al. have proposed techniques for source location privacy and sink location privacy.
Periodic collection and source simulation are the techniques used to provide location privacy to monitored object
and sink simulation and backbone flooding are techniques used to provide location privacy to data sinks. In[7]
Spachos, P., Liang Song et. al. have presented opportunistic routing schemes for source location privacy in
wireless sensor network. In this scheme each node sends a packet to the destination using dynamic path therefore
for an adversary to backtrack hop-by-hop to the origin of the sensor data.
In[14] Gurjar, A et.al.proposed a cluster based anonymization scheme for source location privacy.This scheme
tells to hide the real node identities during communication,by replacing them with random identities generated
by the cluster heads. In[15] Jian Ren et.al. have proposed a scheme to provide both content confidentiality and
source-location privacy through routing to a randomly selected intermediate node. In[16] Oualha N.,Olivereau A
et.al. have analyzed the existing approaches for privacy protection in WSNs and investigates the approaches that
aim at supporting the integration of privacy-preserving WSNs into large scale industrial environments.
In[16] Baokang Zhao et.al. have proposed a new distributed protocol for continuous data collection
with privacy preserving in sensor networks called P-preserving.P-preservation means integration of continuous
privacy awareness algorithms into existing data collection framework.In[17] Yun Li et.al. have presented a novel
based scheme for source location privacy. Mix- Ring based source location privacy can be achieved using three
phasing routing i.e. routing to a randomly selected intermediate node, routing in a network mix ring, and
message forwarding to the SINK node. In[18] Spachos, P.et.al. have proposed an opportunistic mesh networking
scheme for source location privacy. In this scheme, each sensor transmits the packet over a dynamic path to the
destination. Every packet from the source can therefore follow a different path toward the destination, making it
difficult for an adversary to backtrack hop-by-hop to the origin of the sensor communication.
In[19] Miao Xu et.al. have represented a data dissemination scheme for data privacy and data availability.This
scheme leverages the node location diversity presented in typical wireless sensor networks rather than relying on
cryptographic techniques.In[20] Kumar, V.et.al. have presented an energy efficient, privacy preserving data
aggregation algorithm which also preserves data integrity in WSNs. We analyzed the security of the algorithm
and also provided proofs for confidentiality and integrity.In[21] Jhumka, A et.al. provided a novel formalization
4. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.4, No.3, 2014
4
of the source location privacy problem, proved the source location privacy problem to be NP-complete, and also
provided a heuristic that gives an optimal level of privacy under appropriate parameterization.
In[22] Xinfeng Li et.al. have represented a novel based scheme for protecting the location privacy of
base station. This scheme consisting of anonymous topology discovery and intelligent fake packet injection
(IFPI).It eliminates the potential threats against base station within topology discovery period.In[23] Rana, S.S.
et.al. proposed a novel scheme for source location privacy. A combination of directional antennas, transmit
power control and information compression is used to provide lightweight and energy-efficient source location
privacy.
In[24] Tscha et.al.have proposed a routing method for source-location privacy in wireless sensor networks
of multiple assets. Greedy perimeter stateless routing-based source-location privacy with crew size w, enhances
location privacy of the packet-originating node (i.e., active source) in the presence of multiple assets.
3. Discussion and Remarks
Many people work on data privacy, location privacy which includes source location privacy, sink location
privacy, Network level privacy. Various techniques have been proposed by many authors that have their own
advantages and disadvantages. But as per the survey only few people proposed peer-to-peer network privacy and
a lot of research was done on location privacy.
4. Conclusion
This paper represents existing privacy preservation techniques in wireless sensor network. This research mainly
concentrates on location privacy, data privacy and network privacy. Each technique has its own pros and cons;
this will help us in designing new privacy preserving techniques in wireless sensor network.
References
[1]W. Dargie and C. Poellabauer, “Fundamentals of Wireless Sensor Net- works: Theory and Practice, Wiley,
2010.
[2]Jianbo Yao,Guangjun Wen,” Protecting Classification Privacy Data Aggregation in Wireless Sensor
Networks”,in WenWireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th
International Conference on2008.
[3] Jianbo Yao,” Preserving Mobile-Sink-Location Privacy in Wireless Sensor Networks”,in Database
Technology and Applications (DBTA), 2010 2nd International Workshop on2010.
[4] Jianbo Yao, Guangjun Wen,” Preserving Source-Location Privacy in Energy-Constrained Wireless Sensor
Networks”,in Distributed Computing Systems Workshops, 2008. ICDCS '08. 28th International Conference
on2008.
[5] George C.M,Kumar M.,” Cluster based Location privacy in Wireless Sensor Networks against a universal
adversary”,Information Communication and Embedded Systems (ICICES), 2013 International Conference
on2013.
[6] Sivashankari S., Raseen M.Mohamed,” A framework of trust management on location privacy and
minimising the error rate in wireless sensor networks”,in Optical Imaging Sensor and Security (ICOSS), 2013
International Conference on2013.
[7] Spachos, P., Liang Song, Hatzinakos D.,” Opportunistic routing for enhanced source-location privacy in
wireless sensor networks”,in Communications (QBSC), 2010 25th Biennial Symposium on2010.
[8] YaHui Li,Ding Yong,Jian feng Ma,” Secure Message Distribution Scheme with Configurable Privacy for
Heterogeneous Wireless Sensor Networks”,in Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP
International Conference on22008.
[9] Shaikh R.A., Jameel H., d'Auriol B.J., Sungyoung Lee, Young-Jae Song, Heejo Lee ,” Network Level
Privacy for Wireless Sensor Networks”,in Information Assurance and Security, 2008. ISIAS '08. Fourth
International Conference on2008.
[10] Yun Li, Jian Ren,” Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks“,in
INFOCOM, 2010 Proceedings IEEE 2010.
[11] Wenbo He, Xue Liu, Hoang Nguyen, Nahrstedt K., Abdelzaher T.,” PDA: Privacy-Preserving Data
Aggregation in Wireless Sensor Networks”,in INFOCOM 2007. 26th IEEE International Conference on
Computer Communications. IEEE2007.
[12] Yun Li, Jian RenSensor,” Preserving Source-Location Privacy in Wireless Sensor Networks”,in Mesh and
Ad Hoc Communications and Networks, 2009. SECON '09. 6th Annual IEEE Communications Society
Conference on2009.
5. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.4, No.3, 2014
5
[13] Bista, R., Hye-Kyeom Yoo, Jae-Woo Chang,” Achieving Scalable Privacy Preserving Data Aggregation for
Wireless Sensor Networks ”, in Computer and Information Technology (CIT), 2010 IEEE 10th International
Conference on2010.
[24] Gurjar A., Patil A.R. B.,” Cluster Based Anonymization for Source Location Privacy in Wireless Sensor
Network”, in Communication Systems and Network Technologies (CSNT), 2013 International Conference
on2013.
[15] Jian Ren, Yun Li, Tongtong Li,” Routing-Based Source-Location Privacy in Wireless Sensor Networks”,in
Communications, 2009. ICC '09. IEEE International Conference on2009.
[16] Oualha N., Olivereau A.,” Sensor and Data Privacy in Industrial Wireless Sensor Networks”, in Network
and Information Systems Security (SAR-SSI), 2011 Conference on2011
[17] Yun Li., Jian Ren.,” Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks”, in
RenComputer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference
on2009
[18] Spachos P., Liang Song, Bui F.M.,” Improving source-location privacy through opportunistic routing in
wireless sensor networks”, in Computers and Communications (ISCC), 2011 IEEE Symposium on2011
[19] Miao Xu, Wenyuan Xu, O'Kane J.,” Content-Aware Data Dissemination for Enhancing Privacy and
Availability in Wireless Sensor Networks”, in Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th
International Conference on2011
[20] Kumar V., Madria S.” PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor
Networks”, in Reliable Distributed Systems (SRDS), 2013 IEEE 32nd International Symposium on2013
[21] Jhumka, A., Bradbury, M., Leeke M.,” Towards Understanding Source Location Privacy in Wireless Sensor
Networks through Fake Sources”, in Trust, Security and Privacy in Computing and Communications
(TrustCom), 2012 IEEE 11th International Conference on2012
[22] Xinfeng Li, Xiaoyuan Wang, Nan Zheng, Zhiguo Wan, Ming Gu,” Enhanced Location Privacy Protection
of Base Station in Wireless Sensor Networks”, in GuMobile Ad-hoc and Sensor Networks, 2009. MSN '09. 5th
International Conference on2009
[23] Rana S.S., Vaidya N.H.,” A new ‘Direction’ for source location privacy in wireless sensor”, in Global
Communications Conference (GLOBECOM), 2012 IEEE2012
[24]Tscha, Yeonghwan,”Routing for enhancing source-location privacy in wireless sensor networks of multiple
assets”, in YeonghwanCommunications and Networks, Journal of112009
[25] Kiran Maraiya, Kamal Kant, Nitin Gupta,” Application based Study on Wireless Sensor Network”, in
International Journal of Computer Applications (0975 – 8887)Volume 21– No.8, May 2011
[26]A dissertation thesis proposal on”Privacy preserving protocols for wireless sensor networks”, by Jiri Kur.
[27] Prakhar Gupta, Meenu Chawla ,“Privacy preservation for WSN: A Survey”, in International Journal of
Computer Applications (0975 – 888) Volume 48– No.3, June 2012
6. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.4, No.3, 2014
6