A REVIEW ON NETWORK SECURITY IN WIRELESS SENSOR NETWORKS
Abstract
Wireless Sensor Networks (WSNs) are a new technology foreseen to be used increasingly in the near future due to their data acquisition and data processing abilities. Security for WSNs is an area that needs to be considered in order to protect the functionality of these networks, the data they convey and the location of their members. The security models & protocols used in wired and other networks are not suited to WSNs because of their strict resource constrictions.
Full Text:
PDFReferences
Jitender Grover, Shikha Sharma, “Security Issues in Wireless Sensor Network – A Reviewâ€, 5th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Sep. 7-9, 2016, AIIT, Amity University Uttar Pradesh, Noida, India, pp. 397-404, IEEE, 2016.
Bhavna Arora, “A Threat Model Approach for Classification of Network Layer Attacks in WSNâ€, International Journal of Computer Applications (0975 – 8887) Volume 63– No.9, February 2013
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,†IEEE Communication Magazine, Aug. 2002.
R. Roman, J. Zhou, and J. Lopez, “The security of wireless sensor networks,†in International Conference on Computational Science and Its Applications – ICCSA 2005, May 9-12 2005, vol. 3482 of Lecture Notes in Computer Science, (Singapore), pp. 681–690, Springer Verlag, Heidelberg, D-69121, Germany, 2005.
Jitender Grover, Shikha and Mohit Sharma, “Location Based Protocols in Wireless Sensor Network – A Reviewâ€, IEEE Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT 2014), Hefei, Anhui, China, DOI: 10.1109/ICCCNT.2014.6962990, pp. 1-5, July 11-13, 2014.
Jitender Grover, Shikha Sharma and Mohit Sharma, “Reliable SPIN in Wireless Sensor Networkâ€, IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO 2014), Amity University, Noida, DOI: 10.1109/ICRITO.2014.7014694, pp. 01-06, October 8-10, 2014.
G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networksâ€, International Journal of Computer Science and Information Security (IJCSIS), Volume 4, Issue 1 & 2, pp. 1-9, August 2009.
Daniel E. Burgner, Luay A. Wahsheh, "Security of Wireless Sensor Networks", 2011 Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, NV, pp. 315-320, 2011.
Lukman Sharif and Munir Ahmed, “The Wormhole Routing Attack in Wireless Sensor Networks (WSN)â€, Journal of Information Processing Systems, Volume 6, Issue 2, pp. 177-184, June 2010.
Kyung-Ah Shim, "A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, Vol. 18, Issue: 1, pp. 577-601, 2015.
Banta Singh Jangra and Vijeta Kumawat, “A Survey on Security Mechanisms and Attacks in Wireless Sensor Networksâ€, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 3, pp. 291-296, September 2012.
Leela Krishna Bysani and Ashok Kumar Turuk, “A Survey on Selective Forwarding Attack in Wireless Sensor Networksâ€, IEEE International Conference on Devices and Communications (ICDeCom), pp. 1-5, February 2011.
Gurudatt Kulkarni, Rupali Shelk, Kiran Gaikwad, Vikas Solanke, Sangita Gujar, Prasad Khatawkar, "Wireless sensor network security threats", Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), Bangalore, pp. 131-135, 2013.
Jyoti Ahlawat, Mukesh Chawla and Kavita Sharma, “Attacks and Countermeasures in Wireless Sensor Networkâ€, International Journal of Computer Science and Communication Engineering (IJCSCE), pp. 66-69. 2012.
Manju.V.C, “A Survey on Wireless Sensor Network Attacksâ€, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 2, pp. 23-28, August 2012.
Abhishek Pandey and R.C.Tripathi, “A survey on Wireless Sensor Networks Securityâ€, International Journal of Computer Applications, Volume 3, Issue 2, pp. 43-49, June 2010.
T.C. Aseri and N. Singla, “Enhanced Security Protocol in Wireless Sensor Networksâ€, International Journal of Computers, Communications & Control, Volume 6, Issue 2, pp. 214-221, June 2011.
Hero Modares, Rosli Salleh, Amirhossein Moravejosharieh, "Overview of Security Issues in Wireless Sensor Networks", 2011 Third International Conference on Computational Intelligence, Modelling & Simulation, Langkawi, pp. 308-311, 2011.
Sencun Zhu, Sanjeev Setia and Sushil Jajodia, “LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networksâ€, 10th ACM Conference on Computer and Communications Security (CCS 03), pp. 62-72, October 2010.
Daojing He, Sammy Chan, Mohsen Guizani, Haomiao Yang, Boyang Zhou, " Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, Vol. 26, Issue: 4, pp. 1129- 1139, 2014.
Sneha Ghormare, Vaishali Sahare, "Implementation of data confidentiality for providing high security in Wireless Sensor Network", International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, pp. 1-5, 2015.
C. Karlof, N. Sastry, and D. Wagner, “Tinysec: A link layer security architecture for wireless sensor networks,†in SenSys’04 - Proceedings of the Second International Conference on Embedded Networked Sensor Systems, Nov 3-5 2004, pp. 162–175, 2004.
A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks,†Communications of the ACM, vol. 47, no. 6, pp. 53–57, 2004.
Lina Nachabe, Marc Girod-Genet, Bachar El Hassan, "Unified Data Model for Wireless Sensor Network", IEEE Sensors Journal, Vol. 15, Issue: 7, pp. 3657-3667, 2015.
Kalpana Sharma and M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threatsâ€, IJCA Special Issue on Mobile Ad-hoc Networks (MANETs), Volume 1, Issue 8, pp.42-45, 2010.
Refbacks
- There are currently no refbacks.