This document summarizes security schemes for wireless sensor networks, including TinySec, IEEE 802.15.4, and others. It discusses the challenges of WSNs like power constraints and limited resources. It also outlines common security threats to WSNs such as denial of service attacks, attacks on information in transit, Sybil attacks, black hole/sinkhole attacks, and hello flood attacks. The document evaluates the feasibility of applying basic security schemes like cryptography and steganography to WSNs given their unique constraints and requirements.
This document summarizes security issues and threats related to wireless sensor networks. It discusses how sensor networks deployed in hostile environments are vulnerable to attacks due to resource limitations. Common attacks include falsifying data, extracting private information, compromising network readings, and denial of service attacks. The document also analyzes security requirements at the link layer, including access control, message integrity, confidentiality, and discusses specific attacks like selective forwarding, sinkhole attacks, and HELLO flooding.
Security Key Management Model for Low Rate Wireless Personal Area Networks
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...
The document discusses key establishment techniques and cluster-based group key agreement protocols for wireless sensor networks. It reviews pairwise keying, clustering, and how integrating the two can provide security. Several cluster-based group key agreement protocols are described, including HKAP, GKA-CH, PB-GKA-HGM, and AP-1 and AP-2. These protocols establish cluster and group keys using different hierarchical structures and key agreement methods. The document concludes by comparing the protocols based on their topology and structure.
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
This document summarizes security issues and threats related to wireless sensor networks. It discusses how sensor networks deployed in hostile environments are vulnerable to attacks due to resource limitations. Common attacks include falsifying data, extracting private information, compromising network readings, and denial of service attacks. The document also analyzes security requirements at the link layer, including access control, message integrity, confidentiality, and discusses specific attacks like selective forwarding, sinkhole attacks, and HELLO flooding.
Security Key Management Model for Low Rate Wireless Personal Area NetworksCSCJournals
IEEE 802.15.4-based devices networks known by the name of LR-WPAN (Low Rate Wireless Personal Area Network) are characterized by low computation, memory and storage space, and they do not possess an infrastructure. This makes them dynamic and easy to deploy, but in the other hand, this makes them very vulnerable to security issues, as they are low energy so they cant implement current security solutions, and they are deployed in non-secure environments that makes them susceptible to eavesdropping attacks. Most proposed solutions draw out the security of the bootstrapping and commissioning phases as the percentage of existing of an intruder in this time is very low. In this paper, we propose a security model for LR-WPANs based on symmetric cryptography, which takes into account securing the bootstrapping phase, with an analysis of the effectiveness of this proposal and the measures of its implementation.
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTER...cscpconf
The document discusses key establishment techniques and cluster-based group key agreement protocols for wireless sensor networks. It reviews pairwise keying, clustering, and how integrating the two can provide security. Several cluster-based group key agreement protocols are described, including HKAP, GKA-CH, PB-GKA-HGM, and AP-1 and AP-2. These protocols establish cluster and group keys using different hierarchical structures and key agreement methods. The document concludes by comparing the protocols based on their topology and structure.
A survey on wireless sensor networks security with the integration of cluster...csandit
Keying technique in Wireless Sensor Networks(WSNs) is one of the most emerging fields of
WSN security. In order to provide security on WSN, the role of Key distribution technique is
considered to be very significant and thus the key management plays a crucial and fundamental
roles in the security service of WSNs. This paper reviews pairwise key establishment technique
along with the architecture and the environment of WSN. The cluster based group key
agreement protocols for infrastructure base WSN are discussed in this paper. This paper also
reviews how the security can be provided to WSNs with the integration of clustering and keying
techniques. The survey also provides a more detailed discussion on the comparison between
different cluster based group key agreement protocols.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
As the Supervisory Control and Data Acquisition (SCADA) system are deployed in infrastructures which are critical to the survival of a nation, they have emerged as a potential terrain for cyber-war, thus attracting the considered attention of ‘nation-states’. The analysis of worms like ‘stuxnet’ ‘flame’ and ‘duqu’ reveals the hand of a ‘nation-state’ in their design and deployment. Hence, the necessity to understand various issues in the defence of SCADA systems arises. The forensics of the SCADA system provide deep insight into the design and deployment of the worm (the malware) once the system is attacked. This is precisely the scope of this essay.
Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Net...ijtsrd
In this fast evolving world of technology where security plays a major role, the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment based on the functions allocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities in the system. Hence security plays a major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35738.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-network/35738/study-on-vulnerabilities-attack-and-security-controls-on-wireless-sensor-networks/dr-c-umarani
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
This document discusses distributed intrusion detection systems for wireless sensor networks. It begins by providing background on wireless sensor networks and the security issues they face, such as denial of service attacks, routing attacks, and Sybil attacks. Traditional intrusion detection systems cannot be directly applied to wireless sensor networks due to their resource constraints. The document then examines the need for intrusion detection systems in wireless sensor networks to provide a second line of defense against attacks. It outlines features an intrusion detection system should have to be suitable for wireless sensor networks, such as being distributed, minimizing resource usage, and not trusting any single node. Finally, it categorizes different types of intrusion detection system architectures for wireless sensor networks, including stand-alone, distributed
The document discusses security challenges in wireless sensor networks (WSNs) and proposes an advanced end-to-end data security method. It notes that existing hop-by-hop security designs are insufficient as they are vulnerable to attacks from compromised nodes. The proposed location aware end-end data security (LEDS) approach aims to provide end-to-end security to address this issue. It discusses how compromised nodes can currently intercept data or inject false reports, threatening the confidentiality, authenticity and availability of data in WSNs. The document reviews related work on data security in WSNs and argues that an end-to-end rather than hop-by-hop approach is needed to better protect against insider attacks.
The document describes an intrusion detection system for cluster-based wireless sensor networks. It proposes using MAC address-based intruder tracking to detect intruders early. The system divides the network into clusters, with cluster heads monitoring members. It uses port numbers, IP addresses and MAC addresses to authenticate nodes and detect intruders pretending to be valid nodes. If intruder behavior is detected, an alarm is raised. The approach aims to securely transmit data in the network by identifying and preventing malicious intrusions and attacks.
1) The document discusses security attacks in wireless sensor networks (WSNs). It provides an overview of the types of WSNs and their components.
2) It describes the main security challenges in WSNs like remote locations, lack of central control, and resource constraints.
3) The document outlines different security attacks in WSNs including denial of service attacks, traffic analysis, wormhole attacks, and jamming.
4) Defensive measures to secure WSNs like key establishment and intrusion detection are also discussed.
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
Passive monitoring to build Situational AwarenessDavid Sweigert
Passive network monitoring techniques can provide valuable situational awareness for network security professionals. The document describes techniques for passively discovering information about nodes on a network, including operating systems, roles, services, and configurations. This contextual information helps analysts by reducing false positives and focusing resources. The passive approach does not disrupt networks and can operate continuously, in contrast to active scanning tools. A network monitoring prototype is being developed to test these passive discovery techniques.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...ijwmn
Recent developments on Wireless Sensor Networks have made their application in a wide range
such as military sensing and tracking, health monitoring, traffic monitoring, video surveillance and so on.
Wireless sensor nodes are restricted to computational resources, and are always deployed in a harsh,
unattended or unfriendly environment. Therefore, network security becomes a tough task and it involves
the authorization of admittance to data in a network. The problem of authentication and pair wise key
establishment in sensor networks with mobile sink is still not solved in the mobile sink replication attacks.
In q-composite key pre distribution scheme, a large number of keys are compromised by capturing a
small fraction of sensor nodes by the attacker. The attacker can easily take a control of the entire network
by deploying a replicated mobile sinks. Those mobile sinks which are preloaded with compromised keys
are used authenticate and initiate data communication with sensor node. To determine the above problem
the system adduces the three-tier security framework for authentication and pair wise key establishment
between mobile sinks and sensor nodes. The previous system used the polynomial key pre distribution
scheme for the sensor networks which handles sink mobility and continuous data delivery to the
neighbouring nodes and sinks, but this scheme makes high computational cost and reduces the life time of
sensors. In order to overcome this problem a random pair wise key pre distribution scheme is suggested
and further it helps to improve the network resilience. In addition to this an Identity Based Encryption is
used to encrypt the data and Mutual authentication scheme is proposed for the identification and
isolation of replicated mobile sink from the network.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
This document summarizes security issues and challenges in wireless sensor networks (WSNs). WSNs are vulnerable to various security threats due to their wireless nature and constrained resources. The document outlines key requirements for WSN security like confidentiality, integrity, authentication, and availability. It discusses obstacles to security in WSNs like limited resources, unreliable communication, and unattended operation. Common attacks on WSNs are categorized as insider vs outsider, passive vs active, and mote-class vs laptop-class. The document provides a brief overview of security issues and threats at different layers of a WSN.
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Security Framework for Replication Attacks in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Next Generation Network: Security and Architectureijsrd.com
Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. Wireless Sensor Networks (WSN) are a most challenging and emerging technology for the Research due to their vital scope in the field coupled with their low processing power and associated low energy. As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design staring with a brief overview of the sensor networks security, a review is made of and how to provide the security in the wireless sensor networks. This paper studies the security problems, Requirement, Architecture of WSN and different platform, characterized by severely constrained computational and energy resources, and an ad hoc operational environment.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
Enhancing the Security in WSN using Three Tier Security ArchitectureAM Publications,India
Security is the main issue while setting up the WSN network for node communication. This report describes the efficient mechanism for achieving the security between node communications by creating three tier security architecture. This system implements three tier architecture with the use of two polynomial pools having sensor nodes, mobile sinks and some access points that are also sensor nodes, to get better security. Two pools are common mobile polynomial pool and common static polynomial pool. Mobile sinks and access point carries keys from common mobile polynomial pool were as, access points and sensor nodes carries keys from common static polynomial pool. Communication gets established from mobile sink to access point then from access point to sensor node that shows three tier architecture Authentication is the main aspect of the system, that is achieved by pairwise key predistribution methods and authentication of the nodes with the use of polynomial keys. Here, Mobile sink replication attack is implemented against the network. The malicious node, it is blocked. If it wants to communicate within the network then it needs to capture large no of keys from both the pools for authentication. But as the sufficient keys are not available with it, it cannot communicate with the other nodes in the network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews privacy preserving techniques in wireless sensor networks. It discusses the need for privacy in wireless sensor network applications due to various privacy attacks. It summarizes location privacy, data privacy, and network privacy techniques that have been developed to address challenges in preserving privacy for wireless sensor networks. The document also outlines unique challenges for privacy preservation in wireless sensor networks, such as an uncontrollable environment and resource constraints of sensor nodes.
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
The emergence of wireless sensor networks (WSNs) can be considered one of the most important
revolutions in the field of information and communications technology (ICT). Recently, there has been a
dramatic increase in the use of WSN applications such as surveillance systems, battleground applications,
object tracking, habitat monitoring, forest fire detection and patient monitoring. Due to limitations of
sensor nodes in terms of energy, storage and computational ability, many security issues have arisen in
such applications. As a result, many solutions and approaches have been proposed for different attacks and
vulnerabilities to achieve security requirements. This paper surveys different security approaches for
WSNs, examining various types of attacks and corresponding techniques for tackling these. The strengths
and weaknesses for each technique are also discussed at the conclusion of this paper.
Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworksIOSR Journals
This document discusses providing security for data transmission in a hybrid wireless sensor network (HWSN). In an HWSN, static sensors monitor the environment and detect events, then mobile sensors are dispatched to the event locations to conduct further analysis. The document focuses on securing the data transmission between the base station and mobile sensors when an event occurs. It proposes using the Sensor Network Encryption Protocol (SNEP), one of the building blocks of the Security Protocols for Sensor Networks (SPINS), to encrypt the data and provide confidentiality, authentication, integrity and freshness during transmission. SNEP is an appropriate security mechanism for this application as it is efficient and meets the security requirements for sensor network communications.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
This document reviews various techniques for preserving privacy in wireless sensor networks. It discusses the challenges of privacy preservation in WSNs due to their unique characteristics like resource constraints and topological constraints. It then summarizes several key techniques explored in research for preserving data privacy, source location privacy, sink location privacy and network privacy. These techniques include clustering-based approaches, random walk-based approaches and mixing-based approaches. The document concludes that while progress has been made, more research is still needed in areas like peer-to-peer network privacy preservation.
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
1. This document reviews privacy preserving techniques in wireless sensor networks. It discusses challenges to privacy in WSNs including data privacy, location privacy, and network privacy.
2. Wireless sensor networks face unique challenges to privacy preservation due to their constrained environment, limited sensor resources, and multi-hop network topology. This makes existing privacy techniques difficult to apply directly to WSNs.
3. The document surveys several techniques that have been proposed for preserving different types of privacy in WSNs, including location privacy, data privacy during aggregation, and preventing traffic analysis attacks on network privacy. More research is still needed to address open problems in privacy for WSNs.
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...ijtsrd
Wireless Sensor Networks are gaining popularity in various fields and areas. But these nodes are vulnerable as they are open networks and easily accessible. The major challenge is to have a secure data transmission between the nodes. To establish a secure transmission, we require a security scheme like a cryptographic algorithm, but this also requires a secure key distribution between nodes. The WSN’s have constraints like limited area, power and memory which restrict all the categories of cryptographic algorithm. Depending upon the criteria’s and constraints, cryptographic algorithm like Elliptic Curve Cryptography ECC is best suitable for WSN’s environment. ECC has a smaller key size, high security and less computation time which makes the node an efficient crypto system. In order to protect the security of data, we propose a novel secure transmission strategy based on Cryptography. In this design, we acquire sensitive information securely so as to make use of the advantage of encryption. Our approach deal with the weakness of limitation in sensor node resources and the security threats, it is suitable for stream data in sensor nodes. The simulation experiments also demonstrate that this approach is effective in transmitting sensitive data covertly with the characteristics of lower energy consumptions and invisibility. This paper describes the implementation of ECC cryptosystem for WSN for secure key and data transmission between the nodes. Shahid Ishaq | Rashmi Raj "Analyzing & Securing Data Transmission in Wireless Sensor Networks through Cryptography Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30328.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30328/analyzing-and-securing-data-transmission-in-wireless-sensor-networks-through-cryptography-techniques/shahid-ishaq
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
This document summarizes a research paper that proposes a scheme to securely dispatch mobile sensors in a hybrid wireless sensor network. The scheme uses the Sensor Network Encryption Protocol (SNEP) to provide data security between the base station and mobile sensors. SNEP provides data confidentiality, authentication, integrity and freshness. When static sensors detect an event, the data is sent securely to the base station using SNEP. The base station then sends the data to the mobile sensor using SNEP, and the mobile sensor is dispatched to the event location for further analysis. The scheme aims to address the challenge of securely communicating sensitive data between network components in wireless sensor networks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
Similar to A Security Overview of Wireless Sensor Network (20)
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Erasmo Purificato
Slide of the tutorial entitled "Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Emerging Trends" held at UMAP'24: 32nd ACM Conference on User Modeling, Adaptation and Personalization (July 1, 2024 | Cagliari, Italy)
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
How Social Media Hackers Help You to See Your Wife's Message.pdfHackersList
In the modern digital era, social media platforms have become integral to our daily lives. These platforms, including Facebook, Instagram, WhatsApp, and Snapchat, offer countless ways to connect, share, and communicate.
Choose our Linux Web Hosting for a seamless and successful online presencerajancomputerfbd
Our Linux Web Hosting plans offer unbeatable performance, security, and scalability, ensuring your website runs smoothly and efficiently.
Visit- https://onliveserver.com/linux-web-hosting/
Best Practices for Effectively Running dbt in Airflow.pdfTatiana Al-Chueyr
As a popular open-source library for analytics engineering, dbt is often used in combination with Airflow. Orchestrating and executing dbt models as DAGs ensures an additional layer of control over tasks, observability, and provides a reliable, scalable environment to run dbt models.
This webinar will cover a step-by-step guide to Cosmos, an open source package from Astronomer that helps you easily run your dbt Core projects as Airflow DAGs and Task Groups, all with just a few lines of code. We’ll walk through:
- Standard ways of running dbt (and when to utilize other methods)
- How Cosmos can be used to run and visualize your dbt projects in Airflow
- Common challenges and how to address them, including performance, dependency conflicts, and more
- How running dbt projects in Airflow helps with cost optimization
Webinar given on 9 July 2024
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionBert Blevins
Cybersecurity is a major concern in today's connected digital world. Threats to organizations are constantly evolving and have the potential to compromise sensitive information, disrupt operations, and lead to significant financial losses. Traditional cybersecurity techniques often fall short against modern attackers. Therefore, advanced techniques for cyber security analysis and anomaly detection are essential for protecting digital assets. This blog explores these cutting-edge methods, providing a comprehensive overview of their application and importance.
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfNeo4j
Presented at Gartner Data & Analytics, London Maty 2024. BT Group has used the Neo4j Graph Database to enable impressive digital transformation programs over the last 6 years. By re-imagining their operational support systems to adopt self-serve and data lead principles they have substantially reduced the number of applications and complexity of their operations. The result has been a substantial reduction in risk and costs while improving time to value, innovation, and process automation. Join this session to hear their story, the lessons they learned along the way and how their future innovation plans include the exploration of uses of EKG + Generative AI.
Quality Patents: Patents That Stand the Test of TimeAurora Consulting
Is your patent a vanity piece of paper for your office wall? Or is it a reliable, defendable, assertable, property right? The difference is often quality.
Is your patent simply a transactional cost and a large pile of legal bills for your startup? Or is it a leverageable asset worthy of attracting precious investment dollars, worth its cost in multiples of valuation? The difference is often quality.
Is your patent application only good enough to get through the examination process? Or has it been crafted to stand the tests of time and varied audiences if you later need to assert that document against an infringer, find yourself litigating with it in an Article 3 Court at the hands of a judge and jury, God forbid, end up having to defend its validity at the PTAB, or even needing to use it to block pirated imports at the International Trade Commission? The difference is often quality.
Quality will be our focus for a good chunk of the remainder of this season. What goes into a quality patent, and where possible, how do you get it without breaking the bank?
** Episode Overview **
In this first episode of our quality series, Kristen Hansen and the panel discuss:
⦿ What do we mean when we say patent quality?
⦿ Why is patent quality important?
⦿ How to balance quality and budget
⦿ The importance of searching, continuations, and draftsperson domain expertise
⦿ Very practical tips, tricks, examples, and Kristen’s Musts for drafting quality applications
https://www.aurorapatents.com/patently-strategic-podcast.html
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
Sustainability requires ingenuity and stewardship. Did you know Pigging Solutions pigging systems help you achieve your sustainable manufacturing goals AND provide rapid return on investment.
How? Our systems recover over 99% of product in transfer piping. Recovering trapped product from transfer lines that would otherwise become flush-waste, means you can increase batch yields and eliminate flush waste. From raw materials to finished product, if you can pump it, we can pig it.
An invited talk given by Mark Billinghurst on Research Directions for Cross Reality Interfaces. This was given on July 2nd 2024 as part of the 2024 Summer School on Cross Reality in Hagenberg, Austria (July 1st - 7th)
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
Transcript: Details of description part II: Describing images in practice - T...
A Security Overview of Wireless Sensor Network
1. A SECURITY OVERVIEW OF WIRELESS SENSOR NETWORK
Muhammad Zulkifl Hasan1
, Zaka Ullah2
, Muhammad Zunnurain Hussain3
[1,2]
Department of Computer Science
[1,2]
Lahore Garrison University, Lahore, Pakistan, 3
Bahria University Lahore Campus, Lahore Pakistan
zulkifl.hasan@lgu.edu.pk, zakaullah@lgu.edu.pk, zunnurain.bulc@bahria.edu.pk
Abstract
As of late, remote sensor organize (WSN) is
utilized in numerous application zones, for
example, checking, following, and controlling. For
some utilizations of WSN, security is an essential
necessity. In any case, security arrangements in
WSN vary from conventional systems because of
asset confinement and computational
requirements. This paper investigates security
arrangements: Tiny Sec, IEEE 802.15.4, Twists,
Mini SEC, LSec, LLSP, LISA, and Drawl in
WSN. The paper additionally introduces qualities,
security prerequisites, assaults, encryption
calculations, and operation modes. This paper is
thought to be valuable for security planners in
WSNs.
Keywords: Tiny Sec, IEEE 802.15.4, Twists, Mini
SEC, LSec, LLSP, LISA, and Drawl in WSN.
Introduction
A wireless sensor network consists of substantial
number of distributed nodes which works to gather
information for making a decision about a logical
problem or issue. There comes a situation where
information security is a critical issue. Data loss or
integrity is questionable in some scenarios which
led to massive loss to applications which are
critical in context to military, home security & in
health sector. Senor networks are prone to several
traditional attacks with addition to newly
introduced attacks such as, Sinkholes. The main
aim of any attack is to interrupt the functioning of
existing network with modification in data as an
unauthorized user in the network. In this paper, we
will critically discuss the security issues &
handling with all types of attacks.(Abd-El-Barr,
Al-Otaibi, & Youssef, 2005)
Challenges in Wireless Sensor Networks
Few critical factors in WSNs which are considered
as challenges for the use of network are:
Power Constraints: Most of the applications of
sensor network requires more power to operate but
due to limited power many applications fail.
Limited Resources: Senor node size is a critical
factor for allocating bandwidth & computation
abilities. The smaller the size of node the more are
the limitation.
Flexibility & Portability of nodes: Due to
frequent movement of nodes in sensor network it
encounters situation where link failure changes the
nodes communication throughout the network.
(Anjali, Shikha, & Sharma, 2014)
Related Work
Sweeping examination is being done in the region
of Remote Sensor Systems. Analysts have been
focusing on settling an assortment of difficulties
extending from constrained asset capacities to
secure correspondence. Writing demonstrates that
sensor systems are conveyed in broad daylight or
relinquished zones, over unreliable remote
channels, it is along these lines charming for a
pernicious gadget/interloper to spy or infuse
messages into the system. The customary answer
for this issue has been to take up procedures, for
example, message confirmation codes, open key
cryptography and symmetric key encryption plans.
In any case, since there are asset shortages for bits,
the real test is to devise these encryption strategies
in an effective way without yielding their rare
assets. One strategy for protecting any system
against outer assaults is to apply a direct key
foundation. Be that as it may, it is realized that
worldwide keys don't give arrange flexibility and
match shrewd keys are most certainly not hearty
arrangement. A more instinctive arrangement is
required for WSNs(Bin Lu, Habetler, Harley, &
Gutierrez, 2005).
Security Requirements in WSNs
It imparts a few shared traits to a run on the mill
PC organize, yet in addition shows numerous
qualities which are remarkable to it. The security
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
94 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
2. benefits in a WSN ought to ensure the data
conveyed over the system and the assets from
assaults and misconduct o hubs. The most vital
security necessities in WSN are recorded
underneath:
Information privacy: The security instrument
ought to guarantee that no message in the system is
comprehended by anybody aside from expected
beneficiary. a sensor hub ought not enable its
readings to be gotten to by its neighbors unless
they are approved to do as such, key dispersion
component ought to be to a great degree hearty,
open data, for example, sensor characters, and
open keys on the hubs ought to likewise be
encoded in specific bodies of evidence to secure
against movement investigation assaults.
Information trustworthiness: The component
ought to guarantee that no message can be adjusted
by an element as it navigates from the sender to
the beneficiary.
Accessibility: These prerequisites guarantees that
the administrations on a WSN ought to be
accessible constantly even in nearness on an inside
or outer assaults, for example, a dissent on
administration assault. While a few instruments
make utilization on extra correspondence among
hubs, others propose utilization on a local access
control framework to guarantee effective
conveyance on each message to its beneficiary.
Security vulnerabilities of WSN:
Remote Sensor Systems are powerless against
different sorts of assaults. These assaults are for
the most part of three sorts. Assaults on mystery
and confirmation: standard cryptographic
procedures can secure the mystery and legitimacy
of correspondence channels from pariah assaults
for example, listening stealthily, parcel replay
assaults, and adjustment or mocking of parcels.
Assaults on arrange accessibility: assaults on
accessibility of WSN are regularly alluded to as
dissent of-benefit (DoS) assaults. Stealthy assault
against benefit respectability: in a stealthy assault,
the objective of the assailant is to influence the
system to acknowledge a false information esteem.
For instance, an assailant bargains a sensor hub
and infuses a false information esteem through that
sensor hub. In these assaults, keeping the sensor
arrange accessible for its proposed utilize is basic.
DoS assaults against WSNs may allow genuine
harm to the wellbeing and security of individuals.
The DoS assault more often than not alludes to an
enemy's endeavor to upset, subvert, or crush a
system. Be that as it may, a DoS assault can be any
occasion that reduces or disposes of a system's
ability to play out its normal capacities (Dr. G.
Padmavathi, 2009).
Feasibility of Basic Security Schemes in
Wireless Sensor Networks
Security is a comprehensively utilized term
including the qualities of verification, honesty,
protection, nonrepudiation, and hostile to playback
The more the dependency on the information
provided by the networks has been increased, the
more the risk of secure transmission of information
over the networks has increased. For the secure
transmission of various types of information over
networks, several cryptographic, stenographic and
other techniques are used which are well known.
In this section, we discuss the network security
fundamentals and how the techniques are meant
for wireless sensor networks.
Cryptography
The encryption-decryption techniques devised for
the traditional wired networks are not feasible to
be applied directly for the wireless networks and in
particular for wireless sensor networks. WSNs
consist of tiny sensors which really suffer from the
lack of processing, memory and battery power/
Applying any encryption scheme requires
transmission of extra bits, hence extra processing,
memory and battery power which are very
important resources for the sensors’ longevity.
Applying the security mechanisms such as
encryption could also increase delay, jitter and
packet loss in wireless sensor networks Moreover,
some critical questions arise when applying
encryption schemes to WSNs like, how the keys
are generated or disseminated. How the keys are
managed, revoked, assigned to a new sensor added
to the network or renewed for ensuring robust
security for the network. As minimal (or no)
human interaction for the sensors, is a fundamental
feature of wireless sensor networks, it becomes an
important issue how the keys could be modified
time to time for encryption. Adoption of pre-
loaded keys or embedded keys could not be an
efficient solution.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
95 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
3. Steganography
While cryptography aims at hiding the content of a
message, steganography aims at hiding the
existence of the message. Steganography is the art
of covert communication by embedding a message
into the multimedia data (image, sound, video,
etc.)]. The main objective of steganography is to
modify the carrier in a way that is not perceptible
and hence, it looks just like ordinary. It hides the
existence of the covert channel, and furthermore,
in the case that we want to send a secret data
without sender information or when we want to
distribute secret data publicly, it is very useful.
However, securing wireless sensor networks is not
directly related to steganography and processing
multimedia data (like audio, video) with the
inadequate resources of the sensors is difficult and
an open research issue.
Physical Layer Secure Access
Physical layer secure access in wireless sensor
networks could be provided by using frequency
hopping. A dynamic combination of the
parameters like hopping set (available frequencies
for hopping), dwell time (time interval per hop)
and hopping pattern (the sequence in which the
frequencies from the available hopping set is used)
could be used with a little expense of memory,
processing and energy resources. Important points
in physical layer secure access are the
efficient design so that the hopping sequence is
modified in less time than is required to discover it
and for employing this both the sender and
receiver should maintain a synchronized clock. A
scheme as proposed in could also be utilized which
introduces secure physical layer access employing
the singular vectors with the channel synthesized
modulation.
Security Threats and Issues in Wireless Sensor
Networks
Most of the threats and attacks against security in
wireless networks are almost similar to their wired
counterparts while some are exacerbated with the
inclusion of wireless connectivity. In fact, wireless
networks are usually more vulnerable to various
security threats as the unguided transmission
medium is more susceptible to security attacks
than those of the guided transmission medium. The
broadcast nature of the wireless communication is
a simple candidate for eavesdropping. In most of
the cases various security issues and threats related
to those we consider for wireless ad hoc networks
are also applicable for wireless sensor networks.
These issues are well-enumerated in some past
researches and also a number of security schemes
are already being proposed to fight against them.
However, the security mechanisms devised for
wireless ad hoc networks could not be applied
directly for wireless sensor networks because of
the architectural disparity of the two networks.
While ad hoc networks are self-organizing,
dynamic topology, peer to peer networks formed
by a collection of mobile nodes and the centralized
entity is absent the wireless sensor networks could
have a command node or a base station
(centralized entity, sometimes termed as sink). The
architectural aspect of wireless sensor network
could make the employment of a security schemes
little bit easier as the base stations or the
centralized entities could be used extensively in
this case. Nevertheless, the major challenge is
induced by the constraint of resources of the tiny
sensors. In many cases, sensors are expected to be
deployed arbitrarily in the enemy territory
(especially in military reconnaissance scenario) or
over dangerous or hazardous areas. Therefore,
even if the base station (sink) resides in the
friendly or safe area, the sensor nodes need to be
protected from being compromised.
Attacks in Wireless Sensor Networks
Attacks against wireless sensor networks could be
broadly considered from two different levels of
views. One is the attack against the security
mechanisms and another is against the basic
mechanisms (like routing mechanisms). Here we
point out the major attacks in wireless sensor
networks
Denial of Service
Denial of Service (DoS) is produced by the
unintentional failure of nodes or malicious action.
The simplest DoS attack tries to exhaust the
resources available to the victim node, by sending
extra unnecessary packets and thus prevents
legitimate network users from accessing services
or resources to which they are entitled. DoS attack
is meant not only for the adversary’s attempt to
subvert, disrupt, or destroy a network, but also for
any event that diminishes a network’s capability to
provide a service. In wireless sensor networks,
several types of DoS attacks in different layers
might be performed. At physical layer the DoS
attacks could be jamming and tampering, at link
layer, collision, exhaustion, unfairness, at network
layer, neglect and greed, homing, misdirection,
black holes and at transport layer this attack could
be performed by malicious flooding and
desynchronization. The mechanisms to prevent
DoS attacks include payment for network
resources, pushback, strong authentication and
identification of traffic.
Attacks on Information in transit
Sensors in sensor organize watch the varieties of
different factors or qualities and state to the sink as
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
96 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
4. indicated by the necessity. While sending the
report, the data in travel might be adjusted, mock,
replayed again or vanished. As remote
correspondence is powerless against listening
stealthily, any aggressor can screen the movement
stream and get vigorously to intrude on, block,
alter or create parcels in this way, give wrong data
to the base stations or sinks. As sensor hubs
ordinarily have short scope of transmission and
rare asset, an assailant with high preparing power
and bigger correspondence range could assault a
few sensors in the meantime to change the genuine
data amid transmission.
Sybil Attack
Much of the time, the sensors in a remote sensor
system may need to cooperate to achieve an
assignment, thus they can utilize appropriation of
sub undertakings and excess of data. In such a
circumstance, a hub can put on a show to be more
than one hub utilizing the personalities of other
true blue hubs (Figure 1). This kind of assault
where a hub manufactures the personalities of
more than one hub is the Sybil assault. Sybil
assault tries to corrupt the respectability of
information, security and asset use that the
disseminated calculation endeavors to accomplish.
Sybil assault can be performed for assaulting the
dispersed stockpiling, directing component,
information accumulation, voting, reasonable asset
designation and bad conduct location. Essentially,
any distributed system (particularly remote adhoc
systems) is defenseless against sybil assault.
Notwithstanding, as WSNs can have a type of base
stations or entryways, this assault could be avoided
utilizing productive conventions. Douceur
demonstrated that, without a sensibly concentrated
expert, sybil assaults are constantly conceivable
aside from under outrageous and improbable
presumptions of asset equality and coordination
among substances. Notwithstanding, location of
sybil hubs in a system isn't so natural. Newsome
utilized radio asset testing to recognize the
nearness of sybil node(s) in sensor arrange and
demonstrated that the likelihood to distinguish the
presence of a sybil hub is:
Where, n is the quantity of hubs in a neighbor set,
s is the quantity of Sybil hubs, m malignant hubs,
g number of good hubs, c is the quantity of hubs
that can be tried at once by a hub, of which S are
Sybil hubs, M are pernicious (flawed) hubs, G are
great (revise) hubs and r is the quantity of rounds
to repeat the test.
Black hole/Sinkhole Attack
In this assault, a pernicious hub goes about as a
dark gap to draw in all the movement in the sensor
organize. Particularly in a flooding based
convention, the assailant tunes in to demands for
courses at that point answers to the objective hubs
that it contains the high caliber or briefest way to
the base station. Once the vindictive gadget has
possessed the capacity to embed itself between the
imparting hubs (for instance, sink and sensor hub),
it can do anything with the parcels going between
them. Truth be told, this assault can influence even
the hubs those are extensively a long way from the
base stations. Figure 2 demonstrates the reasonable
perspective of a black hole/sinkhole assault.
Hello Flood Attack
Hi Flood Attack is presented in this assault utilizes
HELLO bundles as a weapon to persuade the
sensors in WSN.
In this kind of assault an aggressor with a high
radio transmission (named as a PC class assailant
in) range and preparing power sends HELLO
bundles to various sensor hubs which are scattered
in a substantial territory inside a WSN. The
sensors are along these lines convinced that the
enemy is their neighbor. As a result, while sending
the data to the base station, the casualty hubs
endeavor to experience the assailant as they realize
that it is their neighbor and are eventually parodied
by the aggressor.
Wormhole Attack
Wormhole assault is a basic assault in which the
aggressor records the parcels (or bits) at one area
in the system and passages those to another area.
The burrowing or retransmitting of bits should be
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
97 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
5. possible specifically. Wormhole assault is a
noteworthy danger to remote sensor systems,
since; this kind of assault does not require
bargaining a sensor in the system rather, it could
be performed even at the underlying stage when
the sensors begin to find the neighboring data.
Figure 3 (an and b) demonstrates a circumstance
where a wormhole assault happens. At the point
when a hub B (for instance, the base station or
some other sensor) communicates the steering
demand bundle, the assailant gets this parcel and
replays it in its neighborhood. Each neighboring
hub accepting this replayed bundle will view itself
as in the scope of Node B, and will check this hub
as its parent. Henceforth, regardless of whether the
casualty hubs are multi-hop separated from B,
assailant for this situation persuades them that B is
just a solitary jump far from them, along these
lines makes a wormhole.
In the current years, remote sensor arrange security
has possessed the capacity to draw in the
considerations of various analysts around the
globe. In this segment we audit and guide different
security plans proposed or executed so far for
remote sensor systems. The below tables were
taken from the source. (Sen 2010)
Security Schemes for Wireless Sensor Networks
Gives an investigation of secure directing in
remote sensor systems. Concentrates how to
configuration secure appropriated sensor systems
with numerous supply voltages to lessen the
vitality utilization on calculation and in this
manner to expand the system's lifetime. Goes for
expanding vitality productivity for enter
administration in remote sensor systems and
employments.
System demonstrate for its application thinks
about DoS assaults against various layers of sensor
convention stack displays a mapping convention
which recognizes a stuck district in the sensor
system and evades the broken area to keep steering
inside the system, accordingly handles DoS
assaults caused by sticking.
Table 1: Different Security Techniques applied to
Wireless Sensor Networks
Security
Methods
Attacks Main Features
JAM Dos Attack Point to point
nodes used to
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
98 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
6. stop avoidance of
the jammed
region.
Based on
wormhole
Dos Attack Utilizes
wormholes to
avoid jamming
Random key
pre-
distribution,
radio resource
testing, etc.
Sybil Attack By using radio
resources,
random key pre-
distribution,
registration
procedure,
verification of
position, and
code testing Sybil
entity attacks are
detecting.
Two-directional
verification
Multi-base
station routing,
multi-routing
Hello flood
Attack
Two-directional
verification and
multiple base
station routing
and multi routing
are used. And
also adopts a
secret,
probabilistic,
sharing
compartment.
Based on
communication
security
Information
or data
spoofing
Efficient use of
the resources.
Protects the
network even if
part of the
network is
compromised.
Pre-distribution
of random key
Data and
information
spoofing.
Attacks
information
in transit
Provides
flexibility in the
network protects
the network,
even if part of the
network is
compromised,
provides
authentication
measures for
senor nodes.
REWARD Black-hole
attacks
Uses geographic
routing and takes
advantage of
being the sender
to see the nearer
transmission and
detects black-
hole attacks.
TinySec Data and
information
spoofing,
the
messages
repeat the
attacks.
Centered on
providing
message
authenticity,
integrity and
confidentiality
messages works
in the link layer.
SNEP y µTESLA Data and
information
spoofing,
the
messages
repeat the
attacks.
Semantic
security, Replay
protection, data
authentication,
low
communication
overhead.
REWARD is a steering calculation which battles
against dark gaps in the system. Proposes isolate
security plans for information with different
affectability levels and an area based plan for
remote sensor arranges that ensures whatever
remains of the system, notwithstanding when parts
of the system are traded off. Executes symmetric
key cryptographic calculations with deferred key
exposure on bits to build up secure correspondence
channels between a base station and sensors inside
its range. What's more, propose key pre-
appropriation plans, which focus to enhance the
flexibility of the system. In Table 1 we condense
different security conspires alongside their
fundamental properties proposed so far for remote
sensor systems.(Kaschel, Mardones et al. 2013)
All-encompassing Security in Wireless Sensor
Networks
An all-encompassing methodology goes for
enhancing the execution of remote sensor systems
as for security, life span and network under
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
99 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
7. changing natural conditions. The comprehensive
approach of security worries about including every
one of the layers for guaranteeing general security
in a system. For such a system, a solitary security
answer for a solitary layer won't not be a
productive arrangement rather utilizing a
comprehensive approach could be the best choice.
The comprehensive approach has some essential
standards like, in a given system; security is to be
guaranteed for every one of the layers of the
convention stack, the cost for guaranteeing
security ought not outperform the evaluated
security chance at a particular time, if there is no
physical security guaranteed for the sensors, the
safety efforts must have the capacity to show an
elegant debasement if a portion of the sensors in
the system are traded off, out of request or caught
by the foe and the safety efforts ought to be
produced to work in a decentralized manner. On
the off chance that security isn't considered for the
majority of the security layers, for instance; if a
sensor is some way or another caught or stuck in
the physical layer, the security for the general
system breaks in spite of the way that, there are
some effective security components working in
different layers. By building security layers as in
the comprehensive approach, assurance could be
built up for the general system.
Conclusion
The vast majority of the assaults against security in
remote sensor systems are caused by the addition
of false data by the traded off hubs inside the
system. For shielding the consideration of false
reports by bargained hubs, a method is required for
distinguishing false reports. In any case, growing
such a discovery component and making it
effective speaks to an extraordinary research
challenge. Once more, guaranteeing
comprehensive security in remote sensor arrange is
a noteworthy research issue. A considerable lot of
the present proposed security plans depend on
particular system models. As there is an absence of
joined push to take a typical model to guarantee
security for each layer, in future however the
security components turn out to be entrenched for
every individual layer, consolidating every one of
the systems together to make them work, as a team
with each other will cause a hard research
challenge. Regardless of whether all-encompassing
security could be guaranteed for remote sensor
arranges, the cost-adequacy and vitality
productivity to utilize such systems could in any
case posture incredible research challenge in the
coming days.
References
Abd-El-Barr, M. L., Al-Otaibi, M. M., & Youssef,
M. a. (2005). Wireless sensor networks- part
II: routing protocols and security issues.
Canadian Conference on Electrical and
Computer Engineering, 2005., (May).
https://doi.org/10.1109/CCECE.2005.155687
9
Anjali, Shikha, & Sharma, M. (2014). Wireless
Sensor Networks : Routing Protocols and
Security Issues. 5th ICCNT, 3–7.
https://doi.org/10.1109/ICCCNT.2014.69629
92
Bin Lu, Habetler, T. G., Harley, R. G., &
Gutierrez, J. A. (2005). Applying Wireless
Sensor Networks in Industrial Plant Energy
Management Systems - Part I: A Closed-
Loop Scheme. IEEE Sensors, 2005., 2005,
145–150.
https://doi.org/10.1109/ICSENS.2005.15976
57
Dr. G. Padmavathi, M. D. (2009). A Survey of
Attacks, Security Mechanisms and
Challenges in Wireless Sensor Networks.
International Journal of Computer Science
and Information Security, IJCSIS, Vol. 4,
No. 1 & 2, August 2009, USA, 9.
KASCHEL, H., MARDONES, J. and QUEZADA,
G., 2013. Safety in Wireless Sensor Networks:
Types of Attacks and Solutions. Studies in
Informatics and Control, 22(3), pp. 323-329.
SEN, J., 2010. A survey on wireless sensor
network security. arXiv preprint arXiv:1011.1529,
.
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 5, May 2018
100 https://sites.google.com/site/ijcsis/
ISSN 1947-5500