The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring , battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications. WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper, we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats subsequently. Keywords: Wireless, Sensor, Threat, Security, Power, Node
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been widely used recently in too many applications like smart cities, industrial internet, connected cars, connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware, operating system of WSN, localization, synchronization, deployment, architecture, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information
technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its
restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been
widely used recently in too many applications like smart cities, industrial internet, connected cars,
connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species
and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed
due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important
information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware,
operating system of WSN, localization, synchronization, deployment, architecture, programming models,
data aggregation and dissemination, database querying, architecture, middleware, quality of service and
security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too
many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing
research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
More Related Content
Similar to Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
A Wireless Sensor Network (WSN) is an evolving technology and getting significant attention due to its unlimited potential starts from domestic application to battlefield. Wireless
Sensor Networks(WSN) are a most challenging and emerging technology for the research due to
their vital scope in the field coupled with their low processing power and associated low energy.
Today wireless sensor networks are broadly used in environmental control, surveillance tasks,
monitoring, tracking and controlling etc. Sensor nodes are tiny, cheap, disposable and self-contained
battery powered computers, known as "motes”, which can accept input from an attached sensor,
process this input data and transmit the results wirelessly to the transit network. Due to the various
applications of WSN in homeland security and military, security is the major issue to be taken care
of. In this paper we discuss about The combination of these factors demands security for sensor
networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people
in sensor environments. Broadcast authentication is a critical security service in sensor networks; it
allows a sender to broadcast messages to multiple nodes in an authenticated way. µ TESLA and multi-level µTESLA have been proposed to provide such service for sensor networks.
Multi-Tiered Communication Security Schemes in Wireless Ad-Hoc Sensor NetworksIDES Editor
Networks of wireless micro-sensors for monitoring
physical environments have emerged as an important new
application area for wireless technology. Key attributes of
these new types of networked systems are the severely
constrained computational and energy resources and an ad
hoc operational environment. This paper is a study of the
communication security aspects of these networks. Resource
limitations and specific architecture of sensor networks call
for customized security mechanisms. Our approach is to
classify the types of data existing in sensor networks, and
identify possible communication security threats according
to that classification. We propose a communication security
scheme where for each type of data we define a corresponding
security mechanism. By employing this multi-tiered security
architecture where each mechanism has different resource
requirements, we allow for efficient resource management,
which is essential for wireless sensor networks.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been widely used recently in too many applications like smart cities, industrial internet, connected cars, connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware, operating system of WSN, localization, synchronization, deployment, architecture, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
SECURITY AND KEY MANAGEMENT CHALLENGES OVER WSN (A SURVEY) IJCSES Journal
Wireless sensor networks (WSNs) have turned to be the backbone of most present-day information
technology, which supports the service-oriented architecture in a major activity. Sensor nodes and its
restricted and limited resources have been a real challenge because there’s a great engagement with
sensor nodes and Internet Of things (IoT). WSN is considered to be the base stone of IoT which has been
widely used recently in too many applications like smart cities, industrial internet, connected cars,
connected health care systems, smart grids, smart farming and it's widely used in both military and civilian
applications now, such as monitoring of ambient conditions related to the environment, precious species
and critical infrastructures. Secure communication and data transfer among the nodes are strongly needed
due to the use of wireless technologies that are easy to eavesdrop, in order to steal its important
information. However, is hard to achieve the desired performance of both WSNs and IoT and many critical
issues about sensor networks are still open. The major research areas in WSN is going on hardware,
operating system of WSN, localization, synchronization, deployment, architecture, programming models,
data aggregation and dissemination, database querying, architecture, middleware, quality of service and
security. In This paper we discuss in detail all about Wireless Sensor Networks, its classification, types,
topologies, attack models and the nodes and all related issues and complications. We also preview too
many challenges about sensor nodes and the proposed solutions till now and we make a spot ongoing
research activities and issues that affect security and performance of Wireless Sensor Network as well.
Then we discuss what’s meant by security objectives, requirements and threat models. Finally, we make a
spot on key management operations, goals, constraints, evaluation metrics, different encryption key types
and dynamic key management schemes.
Similar to Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms. (20)
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
DOI: 10.5121/ijcsit.2022.14305 55
SECURITY IN WIRELESS SENSOR
NETWORKS: COMPARATIVE STUDY
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei and Aseel Abdullah Alfaidi
Advanced Computer Network, Jeddah University, Jeddah, Saudi Arabia
ABSTRACT
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
KEYWORDS
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
1. INTRODUCTION
A wireless sensor network is the most important emerging technology trend in the coming years
because sensing technologies and processing power, and wireless communication make it
beneficial for use in the soon future. wireless sensor setworks (WSNs) are used to collect data
from the physical environment; wireless sensor networks can work in any environment other than
conventional networks, especially if they are not wired connections in that environments [1].
The sensor nodes used in WSNs deploy efficiently more than the conventional wired sensor
network; the sensor nodes consist of several components such as sensing, data processing, and
wireless communication technology, which monitor the environment without connection with the
wired network. Therefore, WSNs more advantages than the conventional wired sensor network
[2].
Security is quite a challenging issue in WSNs. It is used in many practical applications, in
military applications, disaster management in remote areas, traffic monitoring, and monitoring
intelligent houses and cities. The WSNs can be prone to different security threats and attacks or
hackers to disrupt the entire network. From challenges and Issues face in WSN today is security.
Therefore, security for WSNs becomes most important. This paper's purpose and requirements
security in WSNs then mention some of the security mechanisms used to handle those security
issues in WSNs.
2. BACKGROUND
In this section, we will cover in general the concept of both Wireless Sensor Networks (WSNs),
attack, security and provide some of the prominent areas of applications of WSNs.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
56
2.1. Wireless Sensor Networks (WSNs)
Wireless Sensor Networks are self-configured and infrastructure-free wireless networks that track
physical or environmental conditions such as temperature, sound, vibration, friction, motion, or
pollutants and cooperatively transfer their data through the network to a central position or sink
where it can be viewed and analyzed. Sensing and computing instruments, radio transceivers, and
control components are all used in a wireless sensor node. A wireless sensor network's individual
node is resource restricted by design: they have minimal processing power, storage space, and
connectivity bandwidth. The sensor nodes can operate in either a continuous or event-driven
mode. The architecture of a WSN is shown in Fig.1. The WSN uses a gateway known as a sink to
connect a wired network and the distributed wireless sensors. The sensors collect the data sent to
the gateway, which sends it to the user through a network or internet.
Figure 1. Architecture of WSNs
2.2. Attack
Attacks are the techniques that attackers use to find and exploit program flaws. An attack can
attempt to gain unauthorized access to a service or information. These WSNs are subject to
numerous attacks. Because the nodes can be in a dangerous environment. once a node has been
hacked, the attacker can steal the node's key materials. On these networks, there are various
attacks that can be categorized as routing attacks, data traffic attacks and on various points of
view can be outsider vs insider, passive vs active, node capture attack and attacks on layers.
2.3. Security
One of the difficulties of WSNs is meeting high-security standards when working with limited
capital. Node protection, user confidentiality, anti-compromise, and resilience against traffic
manipulation are all security standards in WSNs. The implementation sensors must pass a node
authentication review by their respective manager nodes or cluster heads to distinguish both
trustworthy and incompetent nodes from a security standpoint, and unauthorized nodes may be
separated from WSNs during the node authentication process. Similarly, all packets sent between
a sensor and the manager node must be kept secret to prevent eavesdroppers from intercepting,
modifying, and analyzing WSN data and discovering sensitive information.
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
57
2.4. Application of WSNs
The potential applications of WSNs to any field in the world are virtually limitless, ranging from
environmental monitoring and control to medical and healthcare systems, as well as other areas
such as positioning and tracking, localization, and logistics. It is important to stress that the
advantages and applications influence the preference of wireless machinery to be used. If the
application's specifications have been established, network designers must pick and choose the
machinery that will enable these requirements to be met. WSNs have received a lot of acclaim for
their versatility in addressing problems in many application areas, and they have what it takes to
transform the environment in a variety of respects, such as military applications, applications in
area monitoring, transportation applications, medical/health applications, environmental
applications, structural applications, industrial applications, and agricultural applications.
2.4.1. Security requirement of wireless sensor network:
The objective of security services in WSNs is to protect and preserve the information and
resources from attacks and manipulation. In this section, we discuss different types of security
requirements for wireless sensor networks.
Yan-Xiao Li et al. (2010) mentioned the security services in WSNs are usually centered around
cryptography. Security requirements in WSNs include (availability, authorization, authentication,
confidentiality, integrity, nonrepudiation). and they suggested it should also be considered to (1)
forward secrecy it is sensor should not be able to read any future messages after it leaves the
network. (2) backward secrecy, it is joining sensor should not be able to read any previously
transmitted message [3].
Muazzam A. Khan et al. (2011) explained the requirements by considering the importance. In
each of the (data integrity, confidentiality, and data freshness). Also mentioned, any compromise
on these requirements could cause huge destruction in the network. Other than what was said
(Yan-Xiao Li et al.), two new requirements were added it is. (1) Flexibility it is external
conditions as well as demands of the user changes rapidly example in emergency scenarios and
battlefield. So according to the nature of mission or changing conditions the sensor nodes may
have flexibility to adopt these changes. (2) Secure localization it is accurate location of a sensor
node is very important for data or warding as well as trust management[4].
Discussed Mahsa Teymourzadeh et al. (2013) [2].The requirements and how would the attacker
have worked If the requirement is not present in WSNs and confidentiality is a fundamental
security service.
Compared to what others have said, Vikash Kumar et al. (2014) security goals are classified as
primary and secondary. The primary goals are known as standard security goals such as
confidentiality, integrity, authentication, and availability. The secondary goals are data freshness,
self-organization, time synchronization and secure localization. finally, vikash kumar et al.
(2014). add new requirement secure localization from secondary goals. and explain most sensor
network applications rely on some form of time synchronization [1].
We summarize the security requirements in Fig.2 that have been put forward by the researchers
and we emphasize the importance of requirements for the WSNs.
● Confidentiality: Is a fundamental security service Commonly, is required in sensor
networks to protect information traveling between the sensor nodes of the network or
between the sensors and the base station.
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
58
● Integrity: Data integrity is very significant in such networks, mostly used for security
purposes. That further guarantee the message sent from one node to another is not
modified by malicious intermediate nodes.
● Availability: This ensures that the required network services are accessible even in the
presence of attacks. The most harmful danger to network availability is a denial of
service [2].
● Data Freshness: It means that the information is recent and ensures that no opponent can
replay old messages.
● Self-Organization: The harm resulting from an attack or even the risky environment can
be devastating if sensor network lacking self -organization.
Figure 2. Security Requirements
2.4.2. Related word:
This section provides a review of some works on security in wireless sensor networks. It covers
different papers from all aspects that relate to threats in WSNs and security solutions for that.
Clarified Kumar et al. [1]challenges and issues in sensor networks. As they mentioned, ad-hoc
wireless sensor networks pose major challenges when it comes to developing protection chimes.
Also, proposed some security solutions to protect the WSN from this threat. Presented also
Mahsa Teymourzadeh et al. [2]issues and challenges in WSNs, but from different perspectives
examined the state of the art in analyzing network and sensor security, and discusses some
potential future research directions.
Discussed Rani and Kumar [5] survey about security in wireless sensor networks in 2017. And
mentioned WSNs are vulnerable to several threats if they are not adequately protected. Various
aspects of security have been examined, including cryptography, key management, and stable
routing protocols to improves and enhances the security mechanism in the WSNs. According to
Yan-Xiao Li et al. [3]components without security can easily be exploited and they become
vulnerable to attacks, Incorporate security into every part to pervade security and privacy into
every element of the design. And mentioned each of the security solutions may be used to help
secure a WSN.
Muawia A. Elsadig [6]et al discussed Security in WSNs is challenging and critical to the
functionality of this type of network. Therefore, a combining effort to represent a common model
that takes into consideration the security issues concerning each layer still a challenge.
Cryptography is an adequate security solution for many scenarios of WSNs but still needs more
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
59
enhancements to reduce the overheads to an acceptable rate that fit WSNs particularities and
constraints. Moreover, introduced Modares et al. [7].The challenges in WSN include routing,
QoS provisioning, energy efficiency, stability, and multicasting. Since security is a mechanism
rather than a product, the developer of the system can keep up with the latest trends in embedded
system attacks. Important devices' protection should be re-evaluated on a daily basis to prepare
for new detections. The application's level of protection is needed.
Muazzam A. Khan et al [4].Discussed security requirements for wireless sensor networks, and
sensor that works without a battery Since networks have inherent limits, they said physical
protection is required in addition to communications security. and in this kind of network, the
most frequent attack is for a node to compromise and accept tempered data before forwarding it
onward. As a result, cryptography alone is insufficient to keep such networks stable. It may be
possible for sensor nodes to authenticate and encrypt data. David Martins et al [8]. Clarified
science strategies to fight attacks in wireless sensor networks have been suggested, but they do
not resolve all attacks. and Sensors' low processing capacity and, more significantly, their limited
energy are impediments to the introduction of advanced techniques, and we are still looking for
solutions that can handle security, while still combining lifetime and sensor latency.
Anuj Kumar and Patro [9]explained in their paper WSNs have two significant security aspects.
The first is a taxonomy of WSN security specifications, followed by a taxonomy of WSN attacks.
They also gave a snapshot of possible countermeasures to various WSN attacks. Kalpana Sharma
et al [10]mentioned in their paper both vulnerability attacks, such as the hello flood attack,
wormhole attack, sybil attack, and sinkhole attack, have the same goal in mind: to breach the
network's credibility. They concentrated on the security risks in WSN in their report. They
summarized the challenges to WSNs that impact various levels, as well as their defensive
mechanisms.
3. ATTACKS IN WIRELESS SENSOR NETWORKS
The attacks pose a major threat to the security of wireless sensor networks where they destabilize
the security. The network layers are divided in to: physical layer, data link layer, network layer,
and transport layer. Each layer is vulnerable to different types of attacks. Here comes the role of
security attacks so that the interaction between layers can be exploited. In this section, we make a
list of the latest attacks on wireless sensor networks.
Yan-Xiao Li et al. in (2010) suggest attacks in sensor networks can be classified into the
following categories mote-class versus laptop-class attacks, outsider versus insider attacks and
passive versus active attacks. finally, mentioned classify according to the security requirements in
WSNs such as attacks on secrecy and authentication, attacks on network availability and stealthy
attacks against service integrity [3].Discuss also, Khan et al. in (2011), different types of attacks
and their affects in WSN. And the comparison between active attacks is easily identifiable and
passive attacks are more dangerous as compared to active attacks because in passive attacks you
are unable to recognize your attacker [4].
Mahsa et al. (2013) explain to us there are many reasons for importance of security in WSN of
which, exist the nodes are in a dangerous or hazardous setting. Their physical protection is
jeopardized in this environment. WSNs could be more vulnerable to denial-of-service attacks
Also, many kinds of DoS attacks in various layers in wireless sensor networks [2]. Mentioned
Vikash et al. (2014) about wireless sensor networks it will be vulnerable to attacks because of the
due to the broadcast nature of the transmission medium. Identify two categories is active attacks
and passive attacks [1].
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
60
According to Aditi &Sanjeet (2017), WSNs are vulnerable to several attacks. Attacks in WSNs
can be categorized on the basis of different layers physical layer, link layer, network layer, and
transport layer. Mentioned some attacks such as selective forwarding (SF), sinkhole, sybil,
acknowledgment spoofing (AS), and collision [5]. According to singh & Patro (2019), WSNs
work in harsh and hostile areas it is vulnerable to different threats and attacks, and the attacks
section on WSNs in five categories based on, layers, authentication, privacy [9]. Elsadig et al.
Focused (2019) on mentioning two subsections to two types of WSN attack as layered-based
classification and the internalexternal classification [6].The attacks be classified in terms of:
Active attacks are when data flow into the communication channel is tracked, listened
to, and updated by unauthorized attackers, and passive are attacks transmission of
information or data files to an attacker without the user's permission or awareness,
In an external attack, an additional sensor node is installed in the WSN to be targeted.
This remote node lacks access to the WSN's security parameters and cryptographic keys.
In an internal attack, the security of an internal sensor node is breached in order to
undermine the network's security. In Fig.3, shows the classification for most of the
attacks.
Figure 3. Active / passive attacks and external / internal attacks
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
61
Wireless sensor networks are layered in organized. Because of their architecture, these networks
are vulnerable to a variety of attacks. It is one of the classifications for attacks, layer-based
classification [5][9]. Based on the Fig.4, when compared layers, the number of network layer
attacks is obviously the most prevalent followed by data link layer and physical layer finally
application and transport in approximately same number attacks.
Figure 4. network layer attacks
4. SECURITY MECHANISMS IN WSNS
To counter these attacks that threaten wireless sensor networks. We have to find simple solutions
that allow securing the network. These solutions are to prevent and detect different security
attacks in wireless sensor networks. In this section, we discuss a list of solutions.
David Martins &Hervé Guyennet (2010) discuss a list from the mechanisms. And they mentioned
we must simple solutions that enable us to secure the network while using as little energy as
possible. such as the data partitioning, cryptography, trust management and steganography [8].
Kalpana Sharma &Ghose (2010) mentioned to other methods to defense some threats in WSNs.
And summarized of defense mechanisms. DOS prevention can use priority messages, and
encryption. Selective Forwarding attack prevention can use routing dawwsen proactive and
detection by signal strength. Identity certificates can defense Sybil attack [10] .
Aditi &Sanjeet (2017) ,WSNs play an important role in providing protection at the nodal and
network levels. Explained of the various security aspects like cryptography, secure routing
protocols. Mentioned by considering at node level is used cryptography and network levels is
used Secure Routing Protocol and Key management [5].Vikash Kumar (2014) mentioned to
counter malicious attacks, a wide range of protection schemes can be devised, and these can be
classified as high-level and low-level as secure routing , key establishment and trust Setup and
secrecy and authentication[1].
We explain some of the security mechanisms that have been suggested by researchers, and we
want to emphasize in our view, Its importance for WSNs.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
62
4.1. Data Partitioning
One of the solutions to prevent information capture in wireless sensor networks by data
partitioning. The aim is to divide the information into several parts. If a sensor tries to send
information, it cuts the data into several packets of fixed size. Each packet is sent on a different
route from another route. And Packets pass in different nodes. Packets are eventually received,
which could then bring packets together to reproduce information. An attacker has to catch all
packets of a message if it wants to know the information. And To do it, it has to be able to listen
to the entire network. It is more complicated for an attacker to have the information, but this
solution increases energy consumption and needs to use many nodes more essential to
communicate.
4.1.1. Key management
For solutions of key management, we find four types that can be used in security mechanisms
against attacks:
Table 1. Key management types in security mechanisms
4.2. Trust management
Another solution is to use trust and reputation mechanisms that Exist in peer-to-peer networks,
community networks, or even market websites like eBay. In this kind of network, as in wireless
sensor networks, it is hard, because of the large number of nodes, to know which node can be a
malicious node. To detect and protect the network's integrity, each node of the network monitors
Key Type Definition Role in security
Global key
The entire network shares one key the sender sends
a message and information encrypted with this key.
Once it receives the message, it can be decrypted
with the same key.
The solution with limited security
because: If an attacker could find the key,
he can hear the entire network that
communicates with this unique key, then
to know this key allows the possibility to
insert a malicious node in the network.
Pair-wise key
node
Each node has a different key to communicate with
a neighboring node that shares this key. a node that
sends a message must encrypt the message with a
key neighbor who receives the information. The
neighboring decrypts information to re-encrypt with
the key corresponding to the following receiver.
This solution increases the network's
security because if an attacker discovers a
key, this key can communicate with two
nodes. The attacker has to find all pair-
wise keys to listen to the entire network
Pair-wise key
group
Each group or cluster has a key to communicating
between nodes in the cluster. Cluster-heads use a
single key for all cluster-heads to communicate
between two cluster heads.
The solution increases the work of cluster
heads, which have to decrypt and encrypt
the information.
Individual
key
Each node has its own key to encrypt data. The sink
only knows this key. the message sent by this node
goes around hidden on the network until it reaches
the sink.
This solution secures only communication
between a node and the sink.
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
63
its neighboring nodes and their actions over time. Depending on its neighboring nodes' actions, a
node will increase these nodes' trust based on its reputation. When a node does not carry out a
request, its level of trust falls. If this node always sends correct data, its level of trust increases.
With these levels of trust, a node will then choose the most secure route for sending data. Instead
of going through the fastest path (geographical distance), the node will transmit its data via nodes
with the highest trust level (the safest route). These techniques make it possible to eliminate
potentially dangerous nodes and protect data from going through these nodes. Solutions based on
trust management are energy efficient.
Many different classification methods have been used in literature. In this paper we collect the
attacks and classify each attack according to what was mentioned in terms of classification types
on different perspectives [3] [4] [2] [1] [5][9][6]. Several studies are being conducted in order to
find suitable solutions to attacks wireless sensor networks. We identify defenses for all attacks
and according to what was mentioned in [8][10][5][4]. We explain in the table 2.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
64
Table 2. WSNs Attacks Classification & Defense mechanisms.
Attacks Definition
Layer-based
Classification
Internal/Ext
ernal
Classificatio
n
active
/passive
Classifi
cation
Defenses
Collision
There is this type in the link layer when
two nodes try to transmit at the same
time on the same frequency where there
is a collision due to the collision of the
packets with each other
Data Link
layer
Internal passive
Error-correcting
code[9]
Wormhole
is a serious attack, an attacker records
packets at one location in the network
and tunnels them to another location.
This attack needs to insert in the
network at least two [Short Survey].
Network
Layer
Internal passive
An efficient
monitoring
system[3].
Hello flood
An adversary node broadcasts hello
packets with high transmission capacity,
allowing the majority of the network's
nodes to choose it as the cluster head.
Network
Layer
Internal
/External
Active
Suspicious node
detection by signal
strength[10].
Node
replication
In this attack, the attacker creates a new
sensor node in the network by copying
an existing sensor node's node ID.
Network
Layer
External Active
Line selected
multicast[4]
Selective
Forwarding
(SF)
It is the attacker creating a corrupt node
in the network so that it can intentionally
drop some important messages while
forwarding only a few of them
Network
Layer
Internal Active
Multipath
routing[5]
Sinkhole
In this type, the attacker is keen to make
the defected node be very attractive
compared to the rest, in order to be able
to reach his goal, which is for the
surrounding nodes to send data to that
defected node
Network
Layer
Internal Active
Geographic routing
protocols[10]
Sybil
It is also known as clone attack, In this
type, attackers rely on placing copies of
each node in order to be able to leak data
or be able to place false data
Network
Layer
Internal Active
utilize identity
certificates[10]
Acknowledgm
ent spoofing
(AS)
Attacking nodes that provide false
information to other nodes, such as
claiming that a dead node is still alive
but actually dead
Data Link
Layer
Internal
/External
Passive
ِAuthentication
mechanism[5]
Eavesdroppin
g
Is the attacker listening to listen the
network to intercept information on the
network so that he can steal it when sent
without encryption. This attack is
difficult to detect because there is no
modification to the data, so it is difficult
to detect
physical layer External passive
Encryption of data
and messages[9]
Radio jammer
The attacker uses radio waves to disturb
the communication between the nodes
by sending the waves to the same
frequency so that they cannot
communicate
physical layer External passive
Spread spectrum,
priority
messages[10].
Denial of
Service
In a conventional network, this is an
intentional intrusion like denial of
service. The assault disrupts the wireless
sensor network, and the influx of data
causes sensors to run, wasting their
resources.
Physical
layers
Internal
/External
Active
payment for
network resources,
Priority messages,
monitoring,
authorization,
encryption[10]
Flooding
Flooding occurs when an attacker
attacks a source node in such a way that
it receives a large number of requests
frequently and its memory becomes
complete.
Transport
Layer
Internal Passive
Strong
authentication
mechanism[9]
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 14, No 3, June 2022
65
5. CONCLUSION
Wireless sensor networks have become more commonly used as a result of recent technical
developments. It is, however, also vulnerable to a variety of attacks, for example like sinkhole,
Sybil, selective forwarding. They are used for many important applications. As a result, the
protection of WSNs is a major concern for researchers. In this paper we discussed security
requirement for wireless sensor networks. We mentioned various security threats and potential
attacks as well as current security methods suggested by various studies.
REFERENCES
[1] V. Kumar, A. Jain, and P. N. Barwal, “Wireless Sensor Networks: Security Issues, Challenges and
Solutions,” Int. J. Inf. Comput. Technol., vol. 4, no. 8, pp. 859–868, 2014, [Online]. Available:
http://www.irphouse.com.
[2] M. Teymourzadeh, R. Vahed, S. Alibeygi, and N. Dastanpor, “Security in Wireless Sensor Networks:
Issues and Challenges,” arXiv, 2020, doi: 10.47277/ijcncs/1(7)7.
[3] Y. X. Li, Lian-Qin, and Qian-Liang, “Research on wireless sensor network security,” Proc. - 2010
Int. Conf. Comput. Intell. Secur. CIS 2010, pp. 493–496, 2010, doi: 10.1109/CIS.2010.113.
[4] M. A. Khan, G. A. Shah, and M. Sher, “Challenges for security in Wireless sensor networks
(WSNs),” World Acad. Sci. Eng. Technol., vol. 80, no. 8, pp. 390–396, 2011, doi:
10.5281/zenodo.1334423.
[5] A. Rani and S. Kumar, “A survey of security in wireless sensor networks,” 3rd IEEE Int. Conf. , pp.
3–7, 2017, doi: 10.1109/CIACT.2017.7977334.
[6] M. A. Elsadig, A. Altigani, and M. A. A. Baraka, “Security issues and challenges on wireless sensor
networks,” Int. J. Adv. Trends Comput. Sci. Eng., vol. 8, no. 4, pp. 1551–1559, 2019, doi:
10.30534/ijatcse/2019/78842019.
[7] H. Modares, R. Salleh, and A. Moravejosharieh, “Overview of security issues in wireless sensor
networks,” Proc. - CIMSim 2011 3rd Int. Conf. Comput. Intell. Model. Simul., pp. 308–311, 2011,
doi: 10.1109/CIMSim.2011.62.
[8] D. Martins and H. Guyennet, “Wireless sensor network attacks and security mechanisms: A short
survey,” Proc. - 13th Int. Conf. Network-Based Inf. Syst. NBiS 2010, pp. 313–320, 2010, doi:
10.1109/NBiS.2010.11.
[9] M. Al and K. Yoshigoe, “Security and attacks in wireless sensor networks,” Netw. Secur. Adm.
Manag. Adv. Technol. Pract., vol. 14, no. 2, pp. 183–216, 2011, doi: 10.4018/978-1-60960-777-
7.ch010.
[10] A. Nelli and S. Mangasuli, “Wireless Sensor Networks: An Overview on Security Issues and
Challenges,” Int. J. Adv. Eng. Manag. Sci., vol. 3, no. 3, pp. 209–214, 2017, doi:
10.24001/ijaems.3.3.10.