Challenges for Security in Wireless Sensor Networks (WSNs)

Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, computational power and lower memory. Researchers working in this area have proposed a number of security techniques for this purpose. Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks. This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.





References:
[1] N. Boudriga, A new scheme for mobility, sensing and security
management in WSB" IEEE Annual simulation symposium (ANSS),
2006.
[2] J. Albath, S. Madaria, Practical Algorithms for Data Security (PADS) in
wireless sensor networks Mobi-De 07, Beijing, China 2007.
[3] N. D. Vasumathyl, G. Velmathil, N.SkalavosII, On the Rijndael
Encryption Algorithm Matalb Based implementation Department of
Electronics and Communication Engineering, Sirsiva Subramania Nadar
college of Engineering Tamalnadu, India, 2008.
[4] www.wikipedia.com ttp://en.wikipedia.org/wiki/Advanced Encryption
Standard, Jan 2009.
[5] L. Tobarra, D. Cazorla, F. Cuartero, Formal Analysis of Sensor Network
Encryption Protocol (SNEP) IEEE Internatonal Conference on Mobile
Ad-hoc and Sensor Systems, MASS 2007, PISA, 8-11 Oct. 2007.
[6] S. Zhu, S. Setia, S. Jajodia, LEAP, Efficient Security Mechanism For
Large Scale Distributed sensor Networks Proceeding of ACM
Conference on Computer and Communication Security, (CSS,03) pp,62-
72, 2003.
[7] M. Sherin. M. Yousef, A. Baith. Mohamd, mark A. Mikial, An
Enhanced Security Architecture For Wireless Sensor Network Recent
Advances on Data Networks, Communications, Computers, ISBN-1790-
5109, Sep 2009.
[8] C. karlof, D. Wagner, Secure Routing in Wireless Sensor Networks,
Attacks and Countermeasures Elsevier-s Ad-hoc Network Journal,
Special Issue on Sensor Network Applications and Protocols, pp, 293-
315, September 2003.
[9] B.J. Culpepper, H.C. Tseng, Sink hole intrusion indicators in DSR
MANET-s Proceeding of International Conference Broad Band
Networks. PP, 681-688, 2004.
[10] Blackrert, W.J. Gregg, D.M. Castner, A. k. Kyle, E.M. Home, Jokerst.
R.M, Analyzing Interaction between Distributed Denial of service
Attacks and Mitigation Technoologies Proceeding of International
Conference information Survivability and Exposition, DARPA, pp, 26-
36, 22-24, April 2003.
[11] Wang. B.T, Schulzarinne.H, An IP Traceback Mechanism for Reflective
DOS Attacks Canadian Conference on Electrical and Computer
Engineering, pp, 901-904, 2-5, May 2004.
[12] Al-Sakib khan pathan, Hyung-Woo Lee, Choong Seon Hong, Security in
Wireless Sensor Networks: Issues and Challenges International
Conference ICACT-o6. 20-22 Feb, 2006.
[13] Douceur. J, The Sybil Attacks First International workshop on Peer to
Peer Systems 2002.
[14] Newsome. J, Shi. E, Song. D, Perrig. A, The Sybil Attacks in sensor
Networks Analysis and Defenses Proceeding of International
Symposium on Information Processing in Sensor Networks, ACM, pp
269-268, 2004.
[15] Pfleeger C. P, Pleeger. S. L, security in Computing 3rd Edition Prentice
Hall, 2003.
[16] Mona sharifnejad, Mohsen Sharifi, Mansoureh Ghiasabdai, S. Beheshti
"A Survey on Wireless Sensor Networks Security" International
Conference Science of Electronics, Technologies of Information and
Telecommunication, Tunisia, March 25-29, 2007.
[17] B. Parno, A. Perrig, V. Gligor, Distributed Detection of Node
Replication Attacks in Sensor Networks Proceeding of IEEE
Symposium on Security and Privacy, May 2005.
[18] R. Anderson, M. Khun, Low Cost Attacks on Tamper Resistant Devices
International Workshop on security Protocols, LNCS-1997-98.
[19] Yang Xaio Security in Distributed, Grid and Pervasive Computing
Auerbach Publications, CRC Press 2006.
[20] H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang Security in Mobile Ad-hoc
Networks: Challenges Solutions IEEE Wireless Communiaction, Vol-
11, pp 38-47, Feb 2004.
[21] K. Sharma, m. K. Ghose, D. Kumar, R. P. Kumar, V. K. pandy, A
Comparative Study of various Security Approaches used in wireless
Sensor Networks International Journal of Advanced Science and
Technology. Vol-17, April, 2010.
[22] S. Capkun and J. P. Hubaux Secure Positioning in Wireless Networks
IEEE Journal on selected Areas in Communication, pp, 221-232, 2006.
[23] Y. C. Hu., A. Perrig, D. B. Johnson, Packet Leashes. A Defense against
Wormhole Attacks in Wireless Networks 22nd Annual Conference of
IEEE Computer and Communication Societies, IEEE ONFOCOM 2003,
pp, 1976-1986, 3 April, 2003.
[24] W. Du, J. Deng, S. Han, P. K. Varshney, A Pairwise Key Predistribution
scheme for Wireless Sensor Networks Proceeding of ACM
international Conference on Computer and Communication Security, pp,
42-51, 2003.
[25] Z. Karakehayov, Using REWARD, to Detect Team Balckhole Attacks
in Wireless sensor Networks Workshop on Real world Wireless Sensor
Networks, (REAL WSN, 05) Stockholm, Swedan, June 2005.
[26] C. Karlof, N. Sandy, D. Wagner, TinySec: A Link Layer Security
Architecture for Wireless Sensor Networks In Proceeding. of the 2nd
international conference on Embedded networked sensor systems,
Baltimore, MD, USA, pp. 162-175, 2004.
[27] B. Przydatek, D. Song, A. Perrig, SIA: Secure information aggregation
in Sensor Networks Proceedings of International conference on
Embedded Networked Sensor Systems.-ACM,-pp.-255-265,-2003.
[28] L. F. van Hoesel, P. J. Havinga, A Lightweight Medium Access
Protocol (LMAC) for Wireless Sensor Networks Reducing Preamble
Transmissions and Transceiver State Switches," in INSS, June 2004.
[29] S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B.
Srivastava, On Communication Security in Wireless Ad-hoc Sensor
Networks 11th IEEE International Workshops on Enabling
Technologies, Infrastructure for Collaborative Enterprises, pp.139-144,
10-12 June, 2002.
[30] Fan. Ye, H. Luo, Songwu. Lu. L. Zhang. Statistical en-route Filtering of
injected False Data in Sensor Networks IEEE Journal on Selected Areas
in Communications, Vol-23, (4), pp. 839-850, April 2005.
[31] T. Aura, P. Nikader, J. Leiwo. DoS Resistant Authentication with Client
Puzzels In Revised Papers from 8th International Workshop on security
Protocols, pages 170-177, Springer, Verlag, 2001.
[32] A.D. Wood, J. A. Stankovic Denial of Service in Sensor Network
Computer, IEEE, Volume 35, pp.54-62, Oct, 2002.
[33] H. Zhu, F. Bao, R.H.Deng, k. Kim Computing of Trust in Wireless
Networks In proceeding of IEEE International Conference on Vehicular
Technology, Los Angles, California, September 2004.
[34] Z. Yan, P. Zhang, T. Virtanen Trust Evaluation Based Security Solution
in Ad-hoc Networks Proceeding of 7th Nordic Workshop on Secure IT
System, 2003.
[35] H. Chan, A. Perrig, and D. X. Song, Random key pre-distribution
schemes for Sensor Networks in IEEE Symposium on Security and
Privacy. IEEE Computer Society, 2003.