Wireless Sensor Networks: An Overview on its Security Threats

作者: M K Ghose , Kalpana Sharma

DOI:

关键词:

摘要: Wireless sensor networks have become a growing area of research and development due to the tremendous number applications that can greatly benefit from such systems has lead tiny, cheap, disposable self contained battery powered computers, known as nodes or “motes”, which accept input an attached sensor, process this data transmit results wirelessly transit network. Despite making possible, very wireless nature sensors presents security threats when deployed for certain like military ,surveillances etc . The problem is constrained resources on nodes, means architectures used traditional are not viable. Furthermore, additional vulnerability because often placed in hostile dangerous environment where they physically protected. In paper we discuss some challenges faced by WSNs.

参考文章(13)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
M. Tubaishat, S. Madria, Sensor networks: an overview IEEE Potentials. ,vol. 22, pp. 20- 23 ,(2003) , 10.1109/MP.2003.1197877
Feng Zhao, P. Havinga, J.C. Hou, Wireless sensor networks ,(2004)
Deepak Ganesan, Ramesh Govindan, Scott Shenker, Deborah Estrin, Highly-resilient, energy-efficient multipath routing in wireless sensor networks ACM SIGMOBILE Mobile Computing and Communications Review. ,vol. 5, pp. 11- 25 ,(2001) , 10.1145/509506.509514
Chris Karlof, Naveen Sastry, David Wagner, TinySec: a link layer security architecture for wireless sensor networks international conference on embedded networked sensor systems. pp. 162- 175 ,(2004) , 10.1145/1031495.1031515
M. Zorzi, R.R. Rao, Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multihop performance IEEE Transactions on Mobile Computing. ,vol. 2, pp. 337- 348 ,(2003) , 10.1109/TMC.2003.1255648
Chris Karlof, David Wagner, Secure routing in wireless sensor networks: attacks and countermeasures Ad Hoc Networks. ,vol. 1, pp. 293- 315 ,(2003) , 10.1016/S1570-8705(03)00008-8
Edith H. Ngai, Jiangchuan Liu, Michael Lyu, On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks 2006 IEEE International Conference on Communications. ,vol. 8, pp. 3383- 3389 ,(2006) , 10.1109/ICC.2006.255595
Anthony D Wood, John A Stankovic, None, Denial of service in sensor networks IEEE Computer. ,vol. 35, pp. 54- 62 ,(2002) , 10.1109/MC.2002.1039518
A.S.K. Pathan, Choong Seon Hong, Hyung-Woo Lee, Security in wireless sensor networks: issues and challenges international conference on advanced communication technology. ,vol. 2, pp. 1043- 1048 ,(2006) , 10.1109/ICACT.2006.206151