Published August 1, 2016 | Version 10005414
Journal article Open

Security Threats on Wireless Sensor Network Protocols

Description

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Files

10005414.pdf

Files (446.3 kB)

Name Size Download all
md5:8a9bb15ee0eea2e3d412ba4fa048a199
446.3 kB Preview Download

Additional details

References

  • A. D. Jadhad and P. Goswami, "Evaluating the performance of routing protocols in wireless sensor networks," International Journal of Computer Technology and Electronics Engineering (IJCTEE), 2012, pp. 88-92.
  • Culpepper, B.J. and Seng, H.C. (2004) "Sinkhole intrusion indicators in DSR MANETs," Proceedings 1stInternational Conference on Broad Band Networks, 2004, pp.681–688.
  • Douceur, J.R. (2002) "The Sybil Attack," 1st International Workshop on Peer-To-Peer Systems (IPTPS'02), March 2002, LNCS 2429, pp.251–260.
  • Hu, L. and Evans, D. (2004) "Using Directional Antennas to Prevent Wormhole Attacks," Proceedings of the IEEE Symposium on Network and Distributed System Security (NDSS), 2004.
  • Perring, A., Hu, L. and D.B. Johnson, D.B. (2003) "Packet Leashes: A Defence against wormhole attacks in wireless sensor networks," Proceedings of 22nd Annual Conference of IEEE Computer and Communication Societies, Vol 3, April 2003, pp.1976–1986.
  • Saleh, M. and Khatib, I. A. "Throughput Analysis of WEP Security in AdHoc Sensor Networks," Proceedings, 2nd International Conference on Innovations in Information Technology (IIT05), Sept.26–28, Dubai, 2005.
  • Singh, S.K., Singh, M.P. and Singh, D.K. "A Survey on Network Security and Attack Defence Mechanism for Wireless Sensor Networks," International Journal of Computer Trends and Technology, May-June Issue, 2001.
  • Wood, A. D. and Stankovic, J.A. (2002) "Denial of service in sensor networks," IEEE ComputerMagazine, vol.5, no.10, Oct. 2002, pp.54–62.
  • Zheng, J. and Jamalipour, A. (2009), Wireless Sensor Networks: Networking Perspective, published by John & Sons, Inc and IEEE, 2009. [10] Haddad, I. F. & Gordon, D., 2002. Network Simulator 2: A Simulation Tool for Linux, Linux Journal. (Online) Available at: http://www.linuxjournal.com/article/5929 (Accessed 12 january 2016). [11] Kavitha, T. &Sridharan, D., 2010. Security vulnerabilities in wireless sensor networks: A survey. Journal of information Assurance and Security, 5(1), pp. 31-44. [12] Yu, Y., Li, K., Zhou, W. & Li, P., 2012. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), pp. 867-880.