Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real
world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire,
flood and record the data and to forward meaningful data to the center head node for observation, resulting an
advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and
applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their
different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc.
but applications based on these sensors demand on-time collection of information or data and then to send same
on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional
security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN
architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS)
attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of
service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN
architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link
layer and particularly at network layer in details with some suggestions against attacks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
Recent advancements in technology, tiny size, cost effectiveness have made sensors as a crucial part of real
world sensitive applications. These sensor nodes are scattered over an area to monitor the situations like fire,
flood and record the data and to forward meaningful data to the center head node for observation, resulting an
advance prompt to control the situation. In last decade, WSN have grown significantly in variety of areas and
applications, resulted the high, consistent security mechanism. Also, there is variety of attacks on WSN at their
different layers of architecture. Though sensor nodes are not capable enough in terms of power, processing etc.
but applications based on these sensors demand on-time collection of information or data and then to send same
on reliable, secure delivery medium. Small sensors with limited hardware, processing cannot afford traditional
security mechanisms to face or sustain the attacks. There is variety of attacks at different layers of WSN
architecture to affect sensor‟s roles like signaling, framing, transmission etc. Many Denial of Service (DoS)
attacks are identified at each layer of WSN which are purposeful, planned attacks to hamper the availability of
service, restricting the sensor node‟s utility for problem solution. In this paper we will focus on the WSN
architecture, characteristics, constraints and various types of DoS attacks primarily on physical and data link
layer and particularly at network layer in details with some suggestions against attacks.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
Wireless Sensor Networks consists of a set of resource constrained devices called nodes that communicate wirelessly with each other. Wireless Sensor Networks have become a key application in number of technologies. It also measures the unit of vulnerability to security threats. Several Protocols are projected to make them secure. Some of the protocols within the sensor network specialize in securing data. These protocols are named as data discovery and dissemination protocols. The data discovery and dissemination protocol for wireless sensor networks are utilized for distributing management commands and altering configuration parameters to the sensor nodes. All existing data discovery and dissemination protocols primarily suffer from two drawbacks. Basically, they are support centralized approach (only single station can distribute data item).This approach is not suitable for multiple owner-multiple users. Second, the protocols are not designed with security in mind. This Paper proposes the first distributed knowledge discovery and dissemination protocol called DiDrip which is safer than the existing one. The protocol permits multiple owners to authorize many network users with altogether totally different priorities to at an equivalent time and directly flow into data items to sensor nodes.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Similar to Wireless Sensor Networks: An Overview on Security Issues and Challenges (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Wireless Sensor Networks: An Overview on Security Issues and Challenges
1. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-3, Mar- 2017]
https://dx.doi.org/10.24001/ijaems.3.3.10 ISSN: 2454-1311
www.ijaems.com Page | 209
Wireless Sensor Networks: An Overview on
Security Issues and Challenges
Arundhati Nelli, Sushant Mangasuli
Assistant Professor, Dept. of CSE, AIET Mijar, India
Abstract—Wireless Sensor Networks (WSNs) are formed by
deploying as large number of sensor nodes in an area for the
surveillance of generally remote locations. A typical sensor
node is made up of different components to perform the task
of sensing, processing and transmitting data. WSNs are used
for many applications in diverse forms from indoor
deployment to outdoor deployment. The basic requirement of
every application is to use the secured network. Providing
security to the sensor network is a very challenging issue
along with saving its energy. Many security threats may
affect the functioning of these networks. WSNs must be
secured to keep an attacker from hindering the delivery of
sensor information and from forging sensor information as
these networks are build for remote surveillance and
unauthorized changes in the sensed data may lead to wrong
information to the decision makers. This paper gives brief
description about various security issues and security threats
in WSNs.
Keywords—Sensor, Security, Threats, wireless, overview,
Challenges.
I. INTRODUCTION
Wireless Sensor Networks (WSN) are emerging as both an
important new tier in the IT ecosystem and a rich domain of
active research involving hardware and system design,
networking, distributed algorithms, programming models,
data management, security and social factors . The basic idea
of sensor network is to disperse tiny sensing devices; which
are capable of sensing some changes of incidents/parameters
and communicating with other devices, over a specific
geographic area for some specific purposes like target
tracking, surveillance, environmental monitoring etc.
Wireless Sensor Networks (WSNs) are the collectors of
information from the physical world in the form of sensed
data according to the requirement like temperature, pressure,
humidity, level, movement etc. This data is available to the
sink through gateway. Sensors are deployed in extensive
numbers and on account of its wireless nature; it is easily
works in any type of environment. Although sensor nodes
are deployed in a random manner still it’s important to
deploy them carefully. Deploying few nodes may raise the
issue of coverage and deploying too many nodes may result
in an inefficient network because of more collision and
interference. Wireless Sensor Networks (WSNs) need
effective security mechanisms because these networks
deployed in hostel unattended environments. Due to inherent
limitations in wireless sensor networks, security is a crucial
issue. While research in WSN security is progressing at
tremendous pace, no comprehensive document lists the
security issues and the threat models which pose unique
threats to the wireless sensor networks.
We identify the security threats, review proposed security
mechanisms for wireless sensor networks. Security in the
Wireless Sensor Networks has various difficulties, some
common are: dynamically changing topology, wireless
communication among the sensor nodes, infrastructure-less
framework, and limited physical resources like energy
source, memory capacity and very low communication
bandwidth . Numerous analysts proposed so many threats
handling models and diverse security protocols for secure
data communication and routing in WSN.
Fig.1: Architecture for WSN
There are many parameters affect selecting the security
mechanism as its speed and energy consumption. The intent
2. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-3, Mar- 2017]
https://dx.doi.org/10.24001/ijaems.3.3.10 ISSN: 2454-1311
www.ijaems.com Page | 210
of this paper is to investigate the security related issues and
challenges in wireless sensor networks.
II. WSN SECURITY REQUIREMENTS
A WSN is a sensor node has the limited processing capacity,
a limited storage capacity and limited communication
bandwidth, limited energy and hardware size. There are so
many types of the sensor nodes currently available on
different platforms. The security also matter with the design
of the hardware of sensor nodes in the real life. Sensor
network have to fulfill some requirements for providing a
secure communication. General security requirements of
WSNs are availability, confidentiality, integrity and
authentication. Some other requirements known as secondary
requirements are source localization, self organization and
data freshness. These requirements gives protection against
attacks to the information transmitted over the sensor
network.
Data Confidentiality: In sensor network, data flows from
many intermediate nodes and chance of data leak is more. To
provide the data confidentiality, an encrypted data is used so
that only recipient decrypts the data to its original form.
Data Integrity: Data received by the receiver should not be
altered or modified is Data Integrity. Original data is
changed by intruder or due to harsh environment. The
intruder may change the data according to its need and sends
this new data to the receiver.
Data Authentication: It is the procedure of confirmation
that the communicating node is the one that it claims to be. It
is important for receiver node to do verification that the data
is received from an authenticate node.
Data Availability: Data Availability means that the services
are available all the time even in case of some attacks such as
Denial of service.
Source Localization: For data transmission some
applications use location information of the sink node. It is
important to give security to the location information. Non-
secured data can be controlled by the malicious node by
sending false signal strengths or replaying signals.
Self-Organization: In WSN no fixed infrastructure exists,
hence, every node is independent having properties of
adaptation to the different situations and maintains self
organizing and self healing properties. This is a great
challenge for security in WSN.
Data Freshness: Data freshness means that each message
transmitted over the channel is new and fresh. It guarantees
that the old messages cannot be replayed by any node. This
can be solved by adding some time related counter to check
the freshness of the data.
Scalability: It should sustain a big number of nodes.
Time Synchronization: It should avoid collision and traffic
manipulation.
III. OBSTACLES AND CONSTRAINTS
WSN is a wireless network which has several constraints as
compared to other similar networks. These obstacles and
restrictions make it complex to implement security
techniques in WSNs. Therefore, to develop efficient security
mechanisms it is necessary to know and comprehend and
these obstacles, which are as follows:
Limited Resources: The scarcity of resources makes
implementation of security techniques difficult as they need
a certain amount of resources for operations e.g. data
memory and processing power.
Unreliable Communication: The security of the network
greatly depends upon the defined protocols and
communication medium which is wireless in nature.
Unattended Operation: The sensor nodes may be left
unattended for long periods of time as per the type of
application of the particular WSN which make them more
vulnerable to many attacks.
Due to these obstacles, the nodes and the network experience
many constraints which further effect their overall
functioning. For nodes the constraints are limited energy,
memory, storage space and processing power. On the other
hand due to these obstacles the network becomes untrusted
and unreliable, collision prone and managed remotely with
no or less resiliency.
IV. CATEGORIES OF ATTACKS IN WSNS
The attacks those are effective in WSNs can be categorized
by interruption and communication act in three categories:
A. Outsider Vs Insider attacks: In this WSN, outsider
attacks may be known as external attacks and the insider
attacks known as the internal attacks. An outsider attacks
come from outside the WSN. With the help of Outsider
attack the garbage data is injected in network for the services
interruption if network and a DoS attack is also raise. An
insider attack is also known as the internal attack , these
attacks come from the inside of the WSN, those attacks want
to interrupt the running process in network and also exploits
the network assets.
B. Passive Vs Active Attacks: Passive attack is easier to
realize and not difficult to detect because it does not modify
any information during the interchanged information. After
analyzing the routing information we can make a active
attack.
3. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-3, Mar- 2017]
https://dx.doi.org/10.24001/ijaems.3.3.10 ISSN: 2454-1311
www.ijaems.com Page | 211
In active attacks, an attacker has the capability to remove or
modify the messages during the transmission on the network.
C. Mote-class Vs laptop-class attacks : In bit class assaults,
an enemy assaults a WSN by utilizing a couple of hubs with
comparative capacities to the system hubs; in portable PC
class assaults, a foe can utilize all the more capable gadgets
to assault a WSN. These gadgets have more noteworthy
transmission reach, handling force, and vitality saves than
the system hubs. In bit class assaults, an enemy assaults a
WSN by utilizing a couple of hubs with comparable
capacities as that of system hubs. In portable workstation
class assaults, an enemy can utilize all the more capable
gadgets like tablets, thus on and can do substantially more
mischief to a system than a malicious sensor hub.
V. ATTACKS IN WSNS AT DIFFERENT LAYERS
A. Physical Layer: “The first layer is physical layer that
is
responsible for frequency selection, carrier frequency
generation, signal detection, modulation, and data
encryption. As with any radio-based medium, there exists the
possibility of jamming and interferences.”
B. Data Link Layer: The next layer is data link layer that is
in charge for the multiplexing of data streams, data frame
detection, medium access, and error control, and responsible
for point to point & point –to-multipoint relation in the
network.
C. Network and Routing Layer: The third layer is network
and routing layer provide more effective routing the data
from
“Node to node, node to sink, node to base station and node to
Cluster head & vice versa.” Due to the broadcast method
every node works as a router.
D. Transport Layer: “The transport layer is responsible for
managing end-to-end connections. In sensor network
connection this layer is responsible to the communication.
There are three possible attacks in this layer, flooding,
desynchronization and false message injected.
The attacks on different layers and their defense are given in
below table.
Layers Attack types Defense
Transport Layer
Flooding
Desynchronization
False message
injected
Client puzzles,
Rate limitation
authentication
Network and
Routing Layer
Black holes
Sinkholes
Sybil Information
& selective
forwarding
Wormhole
Authentication,
Monitoring,
Redundancy
verification,
packet leashes
by using
geographic and
temporal
information.
Redundancy
Authorization,
monitoring
Egress Filtering
and
authentication
Data Link Layer
Jamming &
Collision,
Exhaustion,
Unfairness
Error correcting
Rate-limit Small
frames
Physical Layer
Jamming
Tempering
Speed Spectrum,
Priority
Messages
Temper –
proofing, hidinn
VI. SECURITY LEVELS
In this paper our overview report has concentrated on
different
parts of sending secure conventions by the late analysts.
Numerous specialists have proposed a wide range of systems
to give security in imprompt remote systems. The use of
these strategies to sensor systems is promising, however the
likelihood of pernicious hubs coercing great hubs and the
trouble in recognizing hub misconduct. All are valuable
building pieces for securing directing conventions in sensor
systems. To accomplish proficient key administration, a few
symmetric key based systems were proposed previously. So
that the study on symmetric key cryptography, as of late,
there
are various studies researching the execution of PKC (Public
Key Cryptography) in sensor networks. Security Mechanism
are at two levels these are high level and low level
mechanism.
(a) High Level Security
(i) SGM (Secure Group Management)
(ii) ID (Intrusion Detection)
(iii) SDA (Secure Data Aggregation)
(b) Low Level Security
4. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-3, Mar- 2017]
https://dx.doi.org/10.24001/ijaems.3.3.10 ISSN: 2454-1311
www.ijaems.com Page | 212
(i) Robustness to Communication DoS
(ii) Security Routing
(iii) Resilience to Node Capture
(iv) Key Establishment and trust setup
(v) Security and Authentication
(vi) Privacy
VII. SECURITY PROTOCOLS IN SENSOR
NETWORKS
Cryptography is a basic technique to achieve the security in a
network. This establishes a secure relationship between two
end points. In this, sender encrypts the original data and
receiver decrypts the received data to obtain an original data.
Different types of keys are used in the process of
cryptography.
The various protocols that are proposed by different authors
for solving the security issue in WSN are:
a) SPINs
SPIN (Sensor Protocols for Information via Negotiation)
protocol works in three steps. First, a node advertises the
ADV packet containing the metadata. If the received node is
interested in the data then it sends the request for data using
REQ packet. Finally, the advertiser node after receiving
request sends the DATA packet to the requestor node. It
performs best in small size networks because of its efficiency
and high latency properties. Typical SPIN consists of two
secure building blocks named as μTESLA (Timed Efficient
Stream Loss-tolerant Authentication) and SNEP (Sensor
Network Encryption Protocol). SNEP provides
confidentiality, authentication and integrity. It uses the
concept of encryption. To authenticate the data, MAC
(Message authentication Code) is used. It adds 8 bytes to the
message . To reduce the communication overhead, SNEP
uses a shared counter between sender node and receiver
node. After each block counter gets incremented. Counter
helps in identifying the freshness of data. In TESLA, digital
signatures are used to authenticate the data packet. Sink node
computes a MAC on the packet after receiving the packet
with the secret key to send an authenticated packet back to
source. After receiving a packet, node confirms that the sink
does not disclose the computed MAC key to other nodes.
With this, receiving node assures that data packet is original
and no alterations are done in the packet.
b) LEAP
LEAP (Localized Encryption and Authentication Protocol) is
a protocol with key management scheme that is very
efficient with its security mechanisms used for large scale
distributed sensor networks. It generally supports for inside
network processing such as data aggregation. In-network
processing results in reduction of the energy consumption in
network. To
provide the confidentiality and authentication to the data
packet, LEAP uses multiple keys mechanism. For each node
four keys are used known as individual, pair wise, cluster
and group key. All are symmetric keys and use as follows:
Individual Key: It is the unique key used for the
communication between source node and the sink node.
Pair wise Key: It is shared with another sensor nodes.
Cluster Key: It is used for locally broadcast messages and
shares it between the node and all its surrounding
neighboring nodes.
Group Key: globally shared key used by all the network
Nodes.
These keys can also be used by other non-secured protocols
to
increase the network security. LEAP is satisfies several
security and performance requirements of WSN. LEAP is
used
to defend against HELLO Floods Attack, Sybil Attack and
Wormhole Attack .
c) TINYSEC
TINYSEC is link layer security architecture for WSNs. It is a
lightweight protocol. It supports integrity, confidentiality and
authentication. To achieve confidentiality, encryption is done
by using CBC (Cipher-block chaining) mode with cipher
text
stealing, and authentication is done using CBC-MAC. No
counters are used in TINYSEC. Hence, it doesn’t check the
data freshness. Authorized senders and receivers share a
secret key to compute a MAC. TINYSEC has two different
security options. One is for authenticated and encrypted
messages (TinySec-AE) and another is for authenticated
messages (TinySec-Auth). In TinySec-AE, the data payload
is encrypted and the received data packet is authenticated
with a MAC. In TinySec-Auth mode, the entire packet is
authenticated with a MAC, but on the other hand the data
payload is not encrypted. In CBC, Initialization Vector (IV)
is used to achieve semantic security. Some of the messages
are same with only little variation. In that case IV adds the
variation to the encrypted process. To decrypt the message
receiver must use the IV. IVs are not secret and are included
in the same packet with the encrypted data.
5. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-3, Mar- 2017]
https://dx.doi.org/10.24001/ijaems.3.3.10 ISSN: 2454-1311
www.ijaems.com Page | 213
d) ZIGBEE
ZIGBEE is a typical wireless communication technology. It
is used in various applications such as military security,
home automation and environment monitoring. IEEE
802.15.4 is a standard used for ZIGBEE. It supports data
confidentiality and integrity. To implement the security
mechanism ZIGBEE uses 128 bit keys. A trust center is used
in ZIGBEE which authenticates and allows other
devices/nodes to join the network and also distribute the
keys. Generally, ZIGBEE coordinator performs this function.
Three different roles in ZIGBEE are:
Trust Manager: It authenticates the devices which are
requesting to join the network.
Network Manager: It manages the network keys and helps
to maintain and distribute the network keys.
Configuration Manager: It configures the security
mechanism and enables end-to-end security between devices.
VIII. CHALLENGES
WSNs endure many restrictions like little computation
capability,limitedmemory,less energy resources,propensity to
physical capture,and deficient of infrastructure,which make
them open to many security attacks or chaalenges and make
security techniques inevitable and desirable with some
security solutions.All the security mechanisms discussed in
the previous section provide security to WSNs to a certain
level only. There are still remaining many issues and
challenges which need to be addressed and resolved.It has
been deduced that there are still many issues remaining
which need to be addressed to make WSNs secure and
efficient like:
Public Key cryptography methods require excessive
computation and storage in resources constrained WSN.
Most of the security techniques are specific to certain
attack which needs to be flexible.
Key distribution problem need to be addressed to achieve
encrypted and secure communication.
Key Updating is an open issue.
Key Revocation is needs to be addressed to prevent the
malicious node from participating in normal
communication
The computational overhead need to be reduced in
resource constraint environment of WSN. The scalability is
also desired to make the WSNs flexible for node addition
and deletion.
IX. CONCLUSION
Wireless Sensor Network has an great significance in all
aspects military and civilian but it needs protection from all
kinds security threats and attacks. Toady’s most of the
offered security mechanisms are based on definite network
model or specific attack as there is no such combined or
general model to make certain overall security. To combine
the different security techniques together to work in
collaboration with each other will lay researchers open to a
tough challenge. It will be also important to notice the
adaptability, cost-effectiveness and energy efficiency to
deploy such schemes in different applications of WSNs.
REFERENCES
[1] Jun Wu, Kaoru Ota, Mianxiong Dong, Chunxiao Li, "A
Hierarchical Security Framework for Defending
Against Sophisticated Attacks on Wireless Sensor
Networks in Smart Cities", IEEE Access, Vol. 4, pp.
416-424, 2016.
[2] Agnihotri, Ram Bhushan, Ajay Vikram Singh, and
Shekhar Verma. "Challenges in wireless sensor
networks with different performance metrics in routing
protocols." In Reliability, Infocom Technologies and
Optimization (ICRITO)(Trends and Future Directions),
2015 4th International Conference on, pp. 1- 5. IEEE,
2015.
[3] Goutam Mali, Sudip Misra, "TRAST: Trust-Based
Distributed Topology Management for Wireless
Multimedia Sensor Networks", IEEE Transactions on
Computers, Vol. 65, Issue: 6,pp. 1978-1991, 2015.
[4] Said O. Amara, R. Beghdad and Mourad Oussalah,
“Securing Wireless Sensor networks: A survey”,Taylor
& Francis, 04 feb 2013.
[5] Akyildiz, I. F., Su, W., Sankarasubramaniam, Y, and
Cayirci, E., “Wireless Sensor Networks: A Survey”,
Computer Networks, 38, 2002, pp. 393-422.
[6] Culler, D. E and Hong, W., “Wireless Sensor
Networks”, Communication of the ACM, Vol. 47, No.
6, June 2004.
[7] Dai, S, Jing, X, and Li, L, “Research and analysis on
routing protocols for wireless sensor networks”, Proc.
International Conference on Communications, Circuits
and Systems, Volume 1, 27-30 May, 2005, pp. 407-
411.
[8] Pathan, A-S. K., Islam, H. K., Sayeed, S. A., Ahmed, F.
and Hong, C. S., “A Framework for Providing E-
Services to the Rural Areas using Wireless Ad Hoc and
Sensor Networks”, to appear in IEEE ICNEWS 2006.
[9] Xiangwu Gong, Hang Long, Feihong Dong, Qing Yao,
"Cooperative security communications design with
imperfect channel state information in wireless sensor
networks", IET Wireless Sensor Systems, Vol. 6, Issue:
2, pp. 35-41, 2016.
6. International Journal of Advanced Engineering, Management and Science (IJAEMS) [Vol-3, Issue-3, Mar- 2017]
https://dx.doi.org/10.24001/ijaems.3.3.10 ISSN: 2454-1311
www.ijaems.com Page | 214
[10]Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey
of Security Issues in Wireless Sensor Networks”, IEEE
Commun. Surveys Tutorials, vol. 8, pp. 2–23, year
2006.
[11]D. Estrin et al., “Instrumenting the World with Wireless
Sensor Networks,” Proc. Int’l. Conf. Acoustics, Speech
and Signal Pro- cessing, Salt Lake City, UT, May 2001.