Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks as well as the network able to conserve energy. A review of previous research to date in the area of security for WSNs was carried out and proposals are made based on security schemes that gather data in
an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing algorithm and dynamic based rekeying implementation.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
A trust-based authentication framework for security of WPAN using network sli...IJECEIAES
New technologies and their seamless wireless interconnectivity bring along many chal- lenges including security and privacy issues that require immediate attention. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power which call for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication in WPAN is proposed. Our main objective is to minimise the effort in distinguishing valid requests of trustworthy nodes from invalid requests of malicious nodes that can result in network compromises. We achieve this through network slicing which divides the network into primary and secondary virtual networks. The proposed framework has three-fold benefits. Firstly, it authenticates nodes’ requests based on a novel method of trust value calculation. Secondly, the framework maintains energy efficiency while authenticating nodes’ requests to access WPAN resources. Finally, the framework provides a solution for the biasing problem that can arise due to unexpected behaviour of malicious users in WPANs. The framework efficacy is illustrated by using a case study to show how it can accurately capture trust relations among nodes while preventing malicious behavior.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
A trust-based authentication framework for security of WPAN using network sli...IJECEIAES
New technologies and their seamless wireless interconnectivity bring along many chal- lenges including security and privacy issues that require immediate attention. Wireless personal area networks (WPANs) are characterized by limited energy resources and computing power which call for lightweight security mechanisms in these networks as a mandatory requirement. In this paper, a lightweight trust-based framework for node authentication in WPAN is proposed. Our main objective is to minimise the effort in distinguishing valid requests of trustworthy nodes from invalid requests of malicious nodes that can result in network compromises. We achieve this through network slicing which divides the network into primary and secondary virtual networks. The proposed framework has three-fold benefits. Firstly, it authenticates nodes’ requests based on a novel method of trust value calculation. Secondly, the framework maintains energy efficiency while authenticating nodes’ requests to access WPAN resources. Finally, the framework provides a solution for the biasing problem that can arise due to unexpected behaviour of malicious users in WPANs. The framework efficacy is illustrated by using a case study to show how it can accurately capture trust relations among nodes while preventing malicious behavior.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSijasuc
This paper introduces the security and trust concepts in wireless sensor networks and explains the
difference between them, stating that even though both terms are used interchangeably when defining a
secure system, they are not the same. The difference between reputation and trust is also explained,
highlighting that reputation partially affects trust. A survey of trust and reputation systems in various
domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely
related to each other and to our research interests. The methodologies used to model trust and their
references are presented. The factors affecting trust updating are summarised and some examples of the
systems in which these factors have been implemented are given. The survey states that, even though
researchers have started to explore the issue of trust in wireless sensor networks, they are still examining
the trust associated with routing messages between nodes (binary events). However, wireless sensor
networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads
to the development of new trust models addressing the continuous data issue and also to combine the data
trust and the communication trust to infer the total trust.
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSijp2p
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They
usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate
autonomously; conditions such as cost, invisible deployment and many application domains, lead to small
size and limited resources sensors [2]. WSNs are susceptible to many types of physical attacks [1] and
most of traditional networks security techniques are unusable on WSNs[2]; due to wireless and shared
nature of communication channel, untrusted transmissions, deployment in open environments, unattended
nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to
design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we
focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them,
include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs'
physical attacks and a comparison of them. This work enables us to identify the purpose and capabilities
of the attackers; also, the goal, final result and effects of the physical attacks on WSNs are introduced.
Also this paper discusses known approaches of security detection and defensive mechanisms against the
physical attacks; this would enable it security managers to manage the physical attacks of WSNs more
effectively.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Nowadays, managing for optimal security to wireless sensor networks (WSNs) has emerged as an active research area. The challenging topics in this active research involve various issues such as energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, and efficiency. Despite the open problems in WSNs, already a high number of applications available show the activeness of emerging research in this area. Through this paper, authors propose an alternative routing algorithmic approach that accelerate the existing algorithms in sense to develop a power-efficient crypto system to provide the desired level of security on a smaller footprint, while maintaining real-time performance and mapping them to customized hardware. To achieve this goal, the algorithms have been first analyzed and then profiled to recognize their computational structure that is to be mapped into hardware accelerators in platform of reconfigurable computing devices. An intensive set of experiments have been conducted and the obtained results show that the performance of the proposed architecture based on algorithms implementation outperforms the software implementation running on contemporary CPU in terms of the power consumption and throughput.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Evaluation of enhanced security solutions inIJNSA Journal
Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially
vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used
to find them are mobile and easy to access. Securing wireless networks can be difficult because these
networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to
compromise it. In recent years, a range of technologies and mechanisms have helped makes networking
more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related
authentication, confidentiality and integrity problems. It discovered that strength of each solution depends
on how well the encryption, authentication and integrity techniques work. The work suggested using a
Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth
comparative analysis of each of the security mechanisms is driven by review of related work in WLAN
security solutions.
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSijasuc
This paper introduces the security and trust concepts in wireless sensor networks and explains the
difference between them, stating that even though both terms are used interchangeably when defining a
secure system, they are not the same. The difference between reputation and trust is also explained,
highlighting that reputation partially affects trust. A survey of trust and reputation systems in various
domains is conducted, with more details given to models in ad-hoc and sensor networks as they are closely
related to each other and to our research interests. The methodologies used to model trust and their
references are presented. The factors affecting trust updating are summarised and some examples of the
systems in which these factors have been implemented are given. The survey states that, even though
researchers have started to explore the issue of trust in wireless sensor networks, they are still examining
the trust associated with routing messages between nodes (binary events). However, wireless sensor
networks are mainly deployed to monitor events and report data, both continuous and discrete. This leads
to the development of new trust models addressing the continuous data issue and also to combine the data
trust and the communication trust to infer the total trust.
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSijp2p
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They
usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate
autonomously; conditions such as cost, invisible deployment and many application domains, lead to small
size and limited resources sensors [2]. WSNs are susceptible to many types of physical attacks [1] and
most of traditional networks security techniques are unusable on WSNs[2]; due to wireless and shared
nature of communication channel, untrusted transmissions, deployment in open environments, unattended
nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to
design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we
focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them,
include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs'
physical attacks and a comparison of them. This work enables us to identify the purpose and capabilities
of the attackers; also, the goal, final result and effects of the physical attacks on WSNs are introduced.
Also this paper discusses known approaches of security detection and defensive mechanisms against the
physical attacks; this would enable it security managers to manage the physical attacks of WSNs more
effectively.
This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8-security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manages to ensure more secure packets transmission by taking all the necessary security measures.
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliable routing. The proposed protocol establishes communication routes based on calculated trust value in joint with a novel cluster head selection algorithm in the hierarchical routing process. The proposed trust-aware routing algorithm improves the routing security in WSN and optimizes many performance metrics related to WSNs unique characteristics. The results of simulation validate the feasibility of the proposed algorithm for enhancing the network lifetime up to 18% and data delivery by 17% as compared with some state-of-the-art routing algorithms.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Nowadays, managing for optimal security to wireless sensor networks (WSNs) has emerged as an active research area. The challenging topics in this active research involve various issues such as energy consumption, routing algorithms, selection of sensors location according to a given premise, robustness, and efficiency. Despite the open problems in WSNs, already a high number of applications available show the activeness of emerging research in this area. Through this paper, authors propose an alternative routing algorithmic approach that accelerate the existing algorithms in sense to develop a power-efficient crypto system to provide the desired level of security on a smaller footprint, while maintaining real-time performance and mapping them to customized hardware. To achieve this goal, the algorithms have been first analyzed and then profiled to recognize their computational structure that is to be mapped into hardware accelerators in platform of reconfigurable computing devices. An intensive set of experiments have been conducted and the obtained results show that the performance of the proposed architecture based on algorithms implementation outperforms the software implementation running on contemporary CPU in terms of the power consumption and throughput.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
The field of Wireless Sensor Networks (WSNs) is experiencing a resurgence of interest and a continuous evolution in the scientific and industrial community. The use of this particular type of ad hoc network is becoming increasingly important in many contexts, regardless of geographical position and so, according to a set of possible application. WSNs offer interesting low cost and easily deployable solutions to perform a remote real time monitoring, target tracking and recognition of physical phenomenon. The uses of these sensors organized into a network continue to reveal a set of research questions according to particularities target applications. Despite difficulties introduced by sensor resources constraints, research contributions in this field are growing day by day. In this paper, we present a comprehensive review of most recent literature of WSNs and outline open research issues in this field.
Data security tolerance and portable based energy-efficient framework in sens...Venu Madhav
Wireless Sensor Networks (WSNs) are effective devices used for remote surveillance, device failure prediction,
and housing energy control in numerous smart grid implementations. Several interaction structures and remedies,
such as broadband networks, cable networks, Wireless Sensor networks, have been suggested to assist
Smart Grid implementations. Owing to their cheap, dynamic nature, robustness, and low energy profile, WSNs
are attractive devices, and preserving a low energy pattern is an essential factor in WSN. Implementing quality
services and safety techniques in sensor networks is challenging in smart grid applications. Thus, in this article,
Portable and Data Security Tolerancebased Energy-Efficient Framework(PDST-EEF) has been proposed for
maintaining a high standard of data security by lowering the sensor device energy usage in smart grid surroundings.
PDST model is developed to ensure data privacy in sensor networks by utilizing an authentication
method integrated with the cryptographic signature model to detect the various attacks. PDST identifies and
separates attacks like denial of service and replay efficiently. EEF presents a low-power cyber safety mechanism
on sensor networks with smart grid tracking applications. EEF is modeled with different stages like identifying
anti-nodes, group development, and allocating keys less energy. EEF can operate with higher power efficiency
techniques while preserving sustained throughput and reliability ideals. The experimental result shows that the
PDST-EEF’s specific request and authentication period is often enhanced by just a second with less energy usage
of 5.06%.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Similar to Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector (20)
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil and Gas Sector
1. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
DOI : 10.5121/ijnsa.2011.3105 68
Wireless Sensor Network Nodes: Security and
Deployment in the Niger-Delta Oil and Gas
Sector
Iwendi, C. O. Allen, A. R.
Communication & Optical Engineering Research Group, University of Aberdeen,
Scotland, UK (ciwendi@abdn.ac.uk, a.allen@abdn.ac.uk)
Abstract
Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication
protocols, embedded systems and low-power implementations. However, the resource constraints which
includes, limited communication range, limited energy, limited computing power, limited bandwidth and
the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are
currently being used in WSN pose particular challenge for many security applications, the whole
research therefore, is the investigation of new security techniques and appropriate implementation for
WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security
flexibility and scalability. The goal of this research is to develop a network that has efficient and flexible
key distribution scheme secured enough to prevent algorithmic complexity and denial of service attacks
as well as the network able to conserve energy. A review of previous research to date in the area of
security for WSNs was carried out and proposals are made based on security schemes that gather data in
an energy-efficient mechanism through secured pre-allocation of keys, faster clustering routing
algorithm and dynamic based rekeying implementation.
Keywords
Blom, Judy Array, Clustering Routing, Niger-Delta
1. Overview
Improvements in the latest electronic technology has brought about the idea of deploying small,
low power, low-cost sensor devices in the Oil and Gas Industries. Wireless sensor network
(WSN) is one of the world’s most emerging technologies that comprise a good range of
practical applications like environmental monitoring, smart spaces, medical systems, robotic
exploration, military surveillance etc. The fact that many countries depends on Oil and Gas as
resources for welfare, development and social stability is a thing of interest to this proposal.
Like in Nigeria, the hydrocarbon resources are the stronghold of the country’s economy but
production and growth of the oil and natural gas sectors are often constrained by insecurity in
the Niger Delta. The Nigerian economy is heavily dependent on the oil sector which, according
to the World Bank accounts for over 95 percent of export earnings and about 85 percent of
government revenues. The industry has been blamed for pollution that has damaged air, soil
and water leading to losses in arable land and decreasing fish stocks. Local groups seeking a
share of the oil wealth often attack the oil infrastructure and staff, forcing companies to declare
force majeure on oil shipments. At the same time, oil theft, commonly referred to as
“bunkering” leads to pipeline damage that is often severe, causing loss of production, pollution,
and forcing companies to shut-in production [1]. Figure 1.0 shows the Nigeria oil production
from 1990- 2008 [2].
2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
69
This research goes a long way in addressing safety-critical Microsystems and robust smart
miniature systems for transport applications [3], detection of abnormal vibrations offshore in
the oil and gas industry [4] as well as advanced sensor and actuator based systems for safety
and security. The detail of the research involves wireless sensor nodes deployment with
security key management scheme attached, secured routine with minimal energy using the
clusterhead formation and rekeying mechanism using Judy array key system. It could also
apply to many other applications in communication system [5, 6, and 7].
WSN nodes consist of a large number of distributed miniscule devices that arrange themselves
into a multi-hop wireless network. These devices or nodes are equipped with one or more
sensors, embedded processors and a wireless transceiver [8]. These nodes are deployed into a
specific area to perform a desired task of collecting and processing data. There is considerable
research activity in WSNs, in such areas as node architecture, energy efficient data gathering
and routing, security and trust, and software infrastructure. It is important that sensor networks
implement robust protocols, and that individual nodes can support concurrent processes without
deadlock or other problems. This is particularly the case where the sensors are in relatively
inaccessible places, must work reliably for months or even years. Therefore, to achieve energy
efficiency is also very important because of sensor nodes’ remote location [9]. Figure 2.0
illustrate the idea of security in wireless sensor network node in mind.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
70
Security in wireless sensor network encompasses the characteristics of authentication,
integrity, privacy, non-repudiation, and anti-play back [10]. The greater the dependency of
information sent or received in the network, the greater the security risk. Various security
issues that have been considered in ad hoc networks ([11], [12]) are not applicable to WSN
because of the architectural disparity of the two networks [13]. Also, quite a number of other
security schemes are already being proposed [14]. In the cluster formation design currently
being investigated to be effective in saving energy, there is need to look at the security between
the individual nodes, neighbouring nodes and the base station. There are numerous constraints
affecting the performance of a wireless sensor network. These restraints includes, low memory
and low energy resources. Attacks on network availability also arise when considering that
wireless sensor networks (WSN) are more vulnerable to denial-of-service (DOS) attacks and
algorithmic complexity attack as shown in Fig. 3.0. Majority of current security applications
proposed is not viable due to low memory to run complicated algorithm after running the
Operating System (OS) and other applications. Since all security services are ensured by
cryptography, security in WSN corresponds to a large amount of energy consumption for
cryptographic functions [13].
4. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
2. Review of Relevant Literature
The need to provide an effective security mechanism as wireless sensor network application
grows is the motivating factor for th
best possible way to achieve the desired methods in adding security to a resource constrained
wireless sensor network. Many WSN deployments are security sensitive and attacks against
them may lead to damage to health and safety of people. Denial of service are conditions for
hardware failures, resource exhaustion, bugs, malicious attacks and environmental conditions
that could reduce the functionality or totally eliminating a networks ability to perfo
expected [15]. Also, the best possible way to achieve effectiveness in the area of Denial
service attacks and countermeasures, techniques for WSN nodes deployment, key management
protocols, energy reduction, formal verification method, and perform
security enhancement has been studied
3. Group Objectives
The research in wireless sensor networks (WSN) has been intensified during the last few years.
Security issues have become a central point of concern for achieving secured commu
the network. Safeguarding data authentication in a hostile environment, where the sensor nodes
may be compromised has become an essential security issue particularly in the Oil and Gas
Industries where the sensor nodes maybe deployed
event by an intruder can disrupt, destabilize or destroy the data. The end product of such attack
can lead to exhaustion of network energy and bandwidth resources, triggering false alarms and
undesired reactions to the nodes in the network.
We intend to develop a network that has efficient and flexible key distribution schemes secured
enough to prevent algorithmic complexity attacks and denial
system capable of saving energy. The platform sh
authorization, maximum confidentiality, freshness and secrecy of message received or been
transmitted.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
Review of Relevant Literature
The need to provide an effective security mechanism as wireless sensor network application
grows is the motivating factor for this research. A good number of studies are ongoing on the
best possible way to achieve the desired methods in adding security to a resource constrained
wireless sensor network. Many WSN deployments are security sensitive and attacks against
damage to health and safety of people. Denial of service are conditions for
hardware failures, resource exhaustion, bugs, malicious attacks and environmental conditions
that could reduce the functionality or totally eliminating a networks ability to perfo
]. Also, the best possible way to achieve effectiveness in the area of Denial
service attacks and countermeasures, techniques for WSN nodes deployment, key management
protocols, energy reduction, formal verification method, and performance evaluation and
security enhancement has been studied.
The research in wireless sensor networks (WSN) has been intensified during the last few years.
Security issues have become a central point of concern for achieving secured commu
the network. Safeguarding data authentication in a hostile environment, where the sensor nodes
may be compromised has become an essential security issue particularly in the Oil and Gas
where the sensor nodes maybe deployed. In a compromised network, detecting a real
event by an intruder can disrupt, destabilize or destroy the data. The end product of such attack
can lead to exhaustion of network energy and bandwidth resources, triggering false alarms and
es in the network.
develop a network that has efficient and flexible key distribution schemes secured
enough to prevent algorithmic complexity attacks and denial-of-service attack as well as the
system capable of saving energy. The platform should also exhibit high authentication, full
authorization, maximum confidentiality, freshness and secrecy of message received or been
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
71
The need to provide an effective security mechanism as wireless sensor network application
is research. A good number of studies are ongoing on the
best possible way to achieve the desired methods in adding security to a resource constrained
wireless sensor network. Many WSN deployments are security sensitive and attacks against
damage to health and safety of people. Denial of service are conditions for
hardware failures, resource exhaustion, bugs, malicious attacks and environmental conditions
that could reduce the functionality or totally eliminating a networks ability to perform as
]. Also, the best possible way to achieve effectiveness in the area of Denial-of-
service attacks and countermeasures, techniques for WSN nodes deployment, key management
ance evaluation and
The research in wireless sensor networks (WSN) has been intensified during the last few years.
Security issues have become a central point of concern for achieving secured communication in
the network. Safeguarding data authentication in a hostile environment, where the sensor nodes
may be compromised has become an essential security issue particularly in the Oil and Gas
romised network, detecting a real
event by an intruder can disrupt, destabilize or destroy the data. The end product of such attack
can lead to exhaustion of network energy and bandwidth resources, triggering false alarms and
develop a network that has efficient and flexible key distribution schemes secured
service attack as well as the
ould also exhibit high authentication, full
authorization, maximum confidentiality, freshness and secrecy of message received or been
5. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
72
4. Justification of the Research
Several industry like oil and gas, automobile, textile etc are approaching towards the benefit of
WSN, the current market projected for Wireless Sensor Networks is due to reach US$1.75
Billion by 2019 [16]. Some industry consortiums have emerged to develop WSN innovations
for pipeline corrosion monitoring, wellhole drilling and completion, seismic sensors, and
nanotechnologies in oil and gas industry [17]. Environmental monitoring and pipeline
destruction is also significant reasons to apply security to the wireless sensor nodes deployed in
the field. Oil spill incidents and the vandalization of the pipelines create multiple problems. The
run-off and sedimentation of this pollutant in fresh water systems severely degrade water
quality; affect fish spawning and aquatic invertebrates’ habitats, thus lowering food web
productivity. Incidentally the spill-over effect on humans who directly depend on fish and other
aquatic food as an alternative protein supplement is quite inundating. The effects on humans
include irritation, dermatitis, cancer, occurrence of abortion, organ failure and genetic disorder
[18]. On the other hand, with the increased interest in security applications such as under water
surveillance, dealing with the connectivity, coverage and detection of intruders in 3-
Dimensional detection (3D) using wireless sensor network has totally become a necessity [19].
5. Relevance of the Research to the Niger-Delta Oil and Gas Sector
In general, the relevance of the research will include a contribution to the government research
effort, towards pipeline destruction, underwater surveillance, environmental monitoring, and
opportunity to collaborate with foreign researchers in the latest area of technology. Similarly,
the research can be utilized by indigenous oil and gas companies towards better exploitation of
petroleum resources and detection of crude oil and leakages in the rural communities. Acquired
skills can similarly be applied in the development and training of young Nigerians on the use of
advanced 3D visualization machines used in detection of wormhole attacks and other
geological uses. More importantly, there will be an overall contribution to world research
community of developing new security method that is not currently exploited in wireless sensor
network nodes. The value of the research is that oil spill and pipeline vandalization if not
secured devastate the environment, pollute dependable potable water sources such as streams
and rivers and should be seen as a serious threat and negation to the attainment of the United
Nations Millennium development goals [20].
6. Methodology
In this regard, the vulnerability of the broadcast session key (BROSK) [21] and self key
establishment (SKEW)[22, 23] protocols is taken into consideration in formulating the new
security technique as well as using formal method to argue about the correctness of these
protocols that were virtually simulated. Moreover, the research is also centre on solving one of
the biggest attacks in secure routing and using a 3D visualization technique with sets of
wireless sensors deployed in the field to detect the anomalies by wormhole attack usually
witnessed in the Oil and Gas Industries.
6.1 Preliminary Simulation Results
This section describes the preliminary simulation results to date. The idea and concern in this
stage was to adequately identify an appropriate scheme to use. The scheme should also readily
provide a data source that can fit into the different levels of the entire project. The source is
needed to reproduce both a normal and malicious network activity for later analysis and
classification.
6. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
73
6.1.1 Key Generation using Blom’s Scheme
The basic part of the first proposal was implemented here, not the whole scheme but in a way
that the key exchange protocol makes use of a very trusted sensor ID pre-allocated in each
sensor.
Protocol set up
An MDS-code matrix is chosen in a random scenario over a finite field ( )GF p , where p is a
prime number. This is a trusted master key as pointed out in the assumption. Considering
scalability as trade off, let n represent the number of nodes. Let ( )CH A and ( )CH C be two
nodes in the network. Sensor ID is required when new nodes or CH is to be added to the key
sharing group.
Let P = 17
Let’s assume the following values
Symmetric matrix xxxID implies the following conditions.
a = a = 1
b = d = 6
c = g = 2
f = h = 8
e = e = 3
i = i = 2
a b c a d g
d e f b e h
g h i c f i
≡
∴ xxxID =
1 6 2 1 6 2
6 3 8 6 3 8 mod17
2 8 2 2 8 2
≡
To allow a new CH to join the network, a k-element vectors on nodes ( )CH A and
( )CH C is form for public identifiers represented as ( )ICH A and ( )ICH C
The private key will now become
( )( )g CH A = IDA * ( )ICH A
7. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
74
( )( )g CH C = IDC * ( )ICH C
It is expected that each CH will use these private keys generated to compute shared
keys with other CH in the network.
For example
Let ( )CH A =
3
10
11
And
( )ICH C =
1
3
15
The secret keys will thus be generated by the trusted party as follows:
( )( )g CH A =
1 6 2
6 3 8
2 8 2
*
3
10
11
=
0
0
6
mod 17
( )( )g CH C =
1 6 2
6 3 8
2 8 2
*
1
3
15
=
15
16
5
mod 17
Therefore a shared pairwise key between the two CHs will become:
( )CH A will computes shared key to become
KCH(A)/CH(C) = gCH(A)t
* ICH(C)
Where t denotes transpose
Also,CH(C) will compute its own pairwise key as
KCH(C)/CH(A) = gCH(C)t
* ICH(A)
8. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
75
Substituting for the given values
( )CH A /CH(C)
K =
0
0
6
t
*
1
3
15
= 0x1 + 0x3 + 6x15 = 5 mod 17
ACK =
15
16
5
t
*
3
10
11
= 15x3 + 16x10 + 5x11 = 5 mod 17
The Blom’s method therefore proves that
KCH(A)/CH(C) = KCH(C)/CH(A)
Therefore, k-keys must be compromised before every shared key can be computed by an
intruder. More work on this area is meant to be done using the MDS- CODE matrix in the area
of increasing the speed the key use in the formation.
6.1.2 Clustering Routing Algorithm
The second phase in ensuring the routing is shorter in transmission as to reduce the energy
consumption and also the risk of attack from an intruder through the CH routing. Since the BS
was located the origin (0, 0), the simulator program deploys the nodes randomly, since each
node has a unique ID assigned to it which also depend on the node at x-axis. The nodes
according to the proposal will communicate with each other using the average neighbour
distance. The traditional multi hop routing scheme where each CH tends to relay the data
received to its nearest neighbours has been compared as shown in Figure 4.0. The proposed
routine saves a lot of space, speed, energy and reduces the risk of a security attacked from an
intruder. Since the route are not static.
Figure 4.0 Traditional and Proposed Node 98 sending data to Base Station
Traditional routing: sender node 98
0
10
20
30
40
50
60
70
80
0 50 100 150
x-axis
y-axis
nodes in
route
Proposed routing: sender node 98
0
10
20
30
40
50
60
70
80
0 50 100 150
x-axis
y-axis
nodes in
route
9. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
76
Sender node ID: 98.
Route (Traditional routing scheme): 98-->93-->92-->91-->90-->86-->85-->81-->76--
>74-->66-->59-->54-->51-->55-->45-->43-->32-->23-->19-->15-->11-->13-->3-->BS
Route
(Proposed): 98-->78-->62-->66-->49-->57-->42-->35-->23-->7-->11-->13-->3 --
>BS
Making the routing to be dynamic will change a lot in this cluster formation. We intend to
deploy mobile nodes in the coming months and witness the different scenario.
6.1.3 Judy Array based Re-keying
Node A wants to communicate to Node C which is the cluster head, it can do so independently
even if one of the node or cluster is compromise and the network will still remain intact.
Consider the following symbols:
A, B, C represents communicating nodes
IDA, BID , IDC represents sensor Identifier for nodes, A, B and C
NA, NB, CN denotes nounce generated (Unpredictable bit string generated)
AJ , JB , JC Judy Array generated
ABK , ACK KABC denotes secret pairwise key shared between A and B, A and C, and A,
B and C.
MK indicates the encryption of message M with key K
MAC (K, M) represents the computation of the message authentication code of
message M with key K.
A → B denotes A unicast A message to B
A → * indicates A broadcasts a message to its neighbours
A → *: IDAJA, MAC (K, IDAJA)
C → *: IDCJC, MAC (K, IDCJC)
KAC = MAC (K, JA/JC)
10. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
77
It implies that node A and the cluster head C will receive the broadcast message. They can also
verify the message that was sent using the master key, and both of them can as well calculate
the shared session key.
7. Conclusion
The research of an effective Wireless Sensor Networks node security idea is increasing [10].
Without a clear perspective of the risk involved in WSN and options available to manage the
risks by intruders, it is unfeasible to have a defensible network. Therefore, developing a
security protocol can be quite challenging, and requires a wide range of skills manipulation as
will be demonstrated in this research. The protocols and routings must be well-suited, flexible,
energy reduced compliant, operationally appropriate and should be practicable in real sensor
world. The successful implementation of security protocols demands serious attention
compared to the neglects wireless sensor network nodes have had in the past in terms of
deployment. It is therefore noted that irrespective of the resource constraints in WSN, it is still
possible to have a WSN security scheme that maintain energy efficient data gathering, total
protection using 3D visualization technique to act in detecting the anomalies in the network and
the future application of a WSN mobile nodes deployable in any environment including the Oil
and Gas Industries where pipeline vandalism has become the other of the day. These schemes if
properly managed and implemented can bring total significant change to the scope of WSN and
increase its usefulness in this industry.
References
[1] Nigeria Energy Data: EIA International Annual, Short Term Energy Outlook,
EIA. May 2009. http://www.eia.doe.gov/cabs/Nigeria/Oil.html
[2] Nigeria Energy Data: EIA International Annual, Short Term Energy Outlook,
EIA. March 2009. http://www.eia.doe.gov/emeu/steo/pub/
[3] J. Tavares, F. J. Velez., and J. M. Ferro, “Application of Wireless Sensor
Networks to the Automobile” Measurement Science Review, Volume 8, Section
3, No. 3, 2008.
[4] Y. U. Yan and O. U. Jinping “Wireless sensing experiments for structural
vibration monitoring of offshore platform. Journal: Frontiers of Electrical
and Electronic Engineering in China. Publisher: Higher education press,
co-Published with Springer-Verlag GmbH. ISSN 1673-3460. Issue
Volume 3 Number 3, September 2008. Pages 333-337
[5] V. A. Petrushin, G. Wei, O. Shakil, D. Roqueiro, V. Gershman, “ Multiple-
sensor indoor surveillance system,” in, Proceedings of the 3rd Canadian
Conference on Computer and Robot Vision (CRV ’06), Quebec city, June 2006.
[6] D. R. Raymond and S. F. Midkiff, “Denial-of-Service in wireless sensor
networks: Attacks and Defences,” IEEE Pervasive Computing Magazine.
Volume 7, Issue 1, Jan. – March 2008. Page(s):74 – 81.
[7] A. D. Wood and J. A. Stankovic, “Denial of Service in Sensor Networks,”
Computer, vol. 35, no. 10, 2002, pp. 54 – 62.
11. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
78
[8] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and Cayirci E., “A Survey on
Sensor Networks” IEEE Communication Magazine, Aug. 2002.
[9] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient
communication protocol for wireless microsensor networks,” Proceedings of the
33rd Annual Hawaii International Conference on Systems Sciences Jan 4-7,
2000 Page(s): 10pp. vol 2
[10] J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston, “Security for sensor
networks”, CADIP Research Symposium, 2002.
[11] L. Zhou and Z. J. Haas, “Securing ad hoc networks”, IEEE Network, Volume
13, Issue6, Nov. – Dec. 1999, pp. 24 – 30.
[12] B. Strulo, J. Farr, and A Smith, “Securing mobile ad hoc networks – A
motivational approach”, BT Technology Journal Volume 21 Issue 3, 2003, pp.
81 -89
[13] A. S. K. Pathan; Hyung-Woo Lee; Choong Seon Hong; “Security in wireless
sensor networks: Issues and challenges” The 8th
International Conference on
Advanced Communication Technology, ICACT 2006. Volume 2, 20-22 Feb.
2006. Page(s):6 pp.
[14] X. Du and H. Chen, “Security in Wireless Sensor Networks” IEEE Wireless
Communications. Aug. 2008.
[15] S. Kaplantzis, “Security models for wireless sensor networks”. PhD Conversion
Report March 2006
[16] Energy Harvesting & Storage and RTLS & WSN conference summary. Energy
Harvesting Journal , November 2009
[17] Mareca Hatler, Darryl Gurganious, and Charlie Chi.”Wireless Sensor Networks
for Oil & Gas”. May 2008 ON World Inc. San Diego, California
[18] K.N. Aroh, I. U. Ubong, C. L. Eze, I. M. Harry, J. C. Umo-Otong, A. E. Gobo
“Oil spill incidents and pipeline vandalization in Nigeria: Impact on public
health and negation to attainment of Millennium development goal” Disaster
Prevention and Management Journal, 2010 Volume 19 Issue 1 Page 70-87 ISSN
0965-3562
[19] V. Ravelomanana, “Extremal properties of three-dimensional sensor networks
with applications,” IEEE Transactions on Mobile Computing Volume 3, Issue 3,
July-Aug 2004 Page(s) 246 – 257
[20] United Nations “The Millennium Development Goals Report New York,
2009
[21] B. Lai, S. Kim, and I. Verbauwhede, “Scalable Session Key Construction
Protocols for Wireless Sensor Networks,” IEEE Workshop. Large Scale Real
Time and Embedded Systems, 2002
[22] M. Sharifi, S. P. Ardakani, S. S. Kashi, “SKEW: An efficient self key
establishment protocol for wireless sensor networks,” International Symposium
on Collaborative Technologies and Systems (CTS’09). 18- 22 May 2009
Page(s):250 – 257.
12. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011
79
[23] F. Hu, J. Ziobro, J. Tillett, N. K. Sharma, “Secure wireless sensor networks:
Problems and Solutions,” Journal of Systemics, Cybernetics and Informatics vol.
1 number 4
Authors
Celestine Iwendi obtained a BSc and MSc in Electronics and Computer
Engineering from Nnamdi Azikiwe University Nigeria, MSc Communication
Hardware and Microsystems from Uppsala University Sweden and is currently a
PhD student at the University of Aberdeen, Scotland. He has carried out many
Independent and supervised designs that apply knowledge of Signal processing
and Communications engineering to analyze and solve problems at Nnamdi
Azikiwe University, Awka Nigeria, and Nigerian Telecommunication, Uppsala
University Sweden, Norwegian University of Science and Technology, and University of Aberdeen,
Scotland
Dr Alastair Allen graduated BSc, DPhil in physics, and has lectured in physics and
information technology. He has a wide knowledge of a range of computational
techniques and interdisciplinary applications. He is an expert in embedded
instrumentation (including Wireless Sensor Networks), distributed computing, and
image processing. His research has been supported by research council, European and
industrial funding. For example, his group was involved in a recent EC FP6 project,
working on aspects of Wireless Sensor Networking. His research group is currently
working on the development of wireless sensor applications for physiological,
industrial, and environmental monitoring.
He is currently a senior lecturer at the University of Aberdeen, Scotland.