Security issues in wireless sensor networks

作者: Mohammad S. Obaidat , Sudip Misra

DOI: 10.1017/CBO9781139030960.011

关键词:

摘要: Providing security to wireless sensor networks is very challenging, as they include protection against damages, losses, attacks, and dangers. Moreover, a node has limited computation power, memory, I/O resources. The classic issues that are usually considered in upholding the secrecy avoiding intrusion. Securing access general difficult task when compared fixed/wired because use transmission medium. WSNs more challenging than for traditional networks. This mainly due resources of harsh working environments these systems most cases. In this chapter, we present key issues, challenges, vulnerabilities, existing solutions, comparison major techniques related WSNs. Background general, heterogeneous systems. They contain general-purpose computing elements with actuators tiny sensors. have computational bandwidth, peripherals. These aspects make it design secure WSN system [1–71], secured schemes require large power consumption, among other providing not an easy resource limitation on nodes, high risk physical density size networks, unknown topology prior deployment, also nature characteristics communication channels.

参考文章(37)
Miodrag R. Bakmaz, Bojan M. Bakmaz, Zoran S. Bojkovic, Security Issues in Wireless Sensor Networks ,(2008)
Mohammad Obaidat, Noureddine Boudriga, Security of e-Systems and Computer Networks ,(2007)
M K Ghose, Kalpana Sharma, Wireless Sensor Networks: An Overview on its Security Threats International Journal of Computer Applications. pp. 42- 45 ,(2010)
Harald Vogt, Exploring message authentication in sensor networks security of ad hoc and sensor networks. pp. 19- 30 ,(2004) , 10.1007/978-3-540-30496-8_3
Kai Xing, Shyaam Sundhar Rajamadam Srinivasan, Major Jose “Manny” Rivera, Jiang Li, Xiuzhen Cheng, Attacks and Countermeasures in Sensor Networks: A Survey Springer, Boston, MA. pp. 251- 272 ,(2010) , 10.1007/978-0-387-73821-5_11
Guowei Wu, Xiaojie Chen, Mohammad S. Obaidat, Chi Lin, , A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set Security and Communication Networks. ,vol. 6, pp. 230- 238 ,(2013) , 10.1002/SEC.570
G. Padmavathi, D. Shanmugapriya, A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks arXiv: Cryptography and Security. ,(2009)
Xiaojiang Du, Hsiao-Hwa Chen, Security in wireless sensor networks IEEE Wireless Communications. ,vol. 15, pp. 60- 66 ,(2008) , 10.1109/MWC.2008.4599222
Krishna Paul, Romit RoyChoudhuri, Somprakash Bandyopadhyay, Survivability Analysis of Ad Hoc Wireless Network Architecture mobile and wireless communication networks. ,vol. 1818, pp. 31- 46 ,(2000) , 10.1007/3-540-45494-2_3
S. Misra, S. Dash, M. Khatua, A.V. Vasilakos, M.S. Obaidat, Jamming in underwater sensor networks: detection and mitigation Iet Communications. ,vol. 6, pp. 2178- 2188 ,(2012) , 10.1049/IET-COM.2011.0641