Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Analysis of Wireless Sensor Networks Security Solutions and Countermeasures


Affiliations
1 Department of Computer Science & Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India
     

   Subscribe/Renew Journal


Wireless Sensor Network is special type of Ad-hoc network formed with autonomous motes with power and memory constraint. WSN is used in various applications such as healthcare, Environmental monitoring, habitat monitoring military, ecology, home and many more practicable solution for challenging applications of different areas. When wireless sensor networks are deployed in an open, hostile or specific defense environment the security becomes extremely important, since WSN motes are resource constraint there is scope for different types of malicious attacks on them. This paper analyses the security solutions and the security mechanisms that will overcome security issues and attacks and recommends adequate solution for the WSN threats.

Keywords

WSN, Attacks, Prevention, Confidentiality, Integrity, Availability.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Katyayini, K., and Ramamurthy, S. V. (2013). Global Journal of Computer Science and Technology Network Web and Security, 13, 24.
  • Martins, D., and Guyennet, H. (2010). Wireless sensor network attacks and security mechanism: A short survey. In 2010: 13th International Conference on Network-Based Information Systems (pp. 313-320).
  • Burgner, D. E., and Luay, A. (2011). Eighth International Conference on Information Technology: New Generations ( pp. 315-320).
  • Wang, Y., Attebury, G., and Ramamurthy, B. (2006). IEEE communication surveys, 8(2).
  • Al-Karaki, J. N., and Kamal, A. E. (2004). IEEE communications, 11(6).
  • Tubaishat, M. and Madria, S. (2003). Sensor network: An overview. IEEE Potentials, 22, 20-23.
  • Khan, W. Z., Xiang, Y., and Aalsalem, M . Y. (2011). Comprehensive study of selective forwarding attack in wireless sensor networks. International Journal of Computer Network and Information Security (IJCNIS), 3(1), 1-10.
  • Bekara, C., and Laurent-Maknavicius, M. (2007). A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks. WiMOB Third IEEE International Conference, 59
  • Znaidi, W., Minier, M., and Babau, J. P. (2008). An Ontology for Attacks in Wireless Sensor Networks. INRIA.
  • Chaudhari, H. C., and Kadam, L. U. (2011). Wireless Sensor Networks: Security, Attacks and Challenges. International Journal of Networking, 1(1), 04-16,
  • Raymond, D. R., and Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7, 74.
  • Culler, D. E., and Hong, W. (2004). Wireless sensor networks. Communication of the ACM, 47(6), 30-33.
  • Tun, Z., and Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. Proceedings of world Academy of Science. Engineering and Technology, 36, 549-554.
  • Mishra, D. P., and Kowar, M. K. (2010). International Journal of Multidisciplinary Research and Advances in Engineering, 2, 29.
  • Mishra, D. P., and Kowar, M. K. (2008). International Journal of Research in IT Management and Engineering, 1, 88.
  • Li, Y. X., Quin, L., and Liang, Q. (2010). International Conference on Computational Intelligence and Security.
  • Wang, Y., Attebury, G., and Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. IEEE communication surveys and tutorials, 8(2), 2-23.
  • Sheela, D., Naveen, K. C., and Mahadevan, G. (2011). A non cryptographic method of sink hole attack detection in wireless sensor networks,” in Proc. International Conference on Recent Trends in Information Technology (ICRTIT), 527-532
  • Padmavathi, G., and Shanmugapriya, D. (2009). A survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks [J]. International Journal of Computer Science and Information Security (IJCSIS), 4(1 and 2), 1-9.
  • Mishra, D. P., and Kumar, R. (2015). Vision of Hybrid Security Framework for Wireless Sensor Network. Indian Journal of Applied Research, 5, 167.
  • Sharma, R., and Diwakar, C. (2012). Security analysis of wireless sensor networks. IJREAS, 2(2).
  • Mohammadi, S. and Jadidoleslamy, H. (2011). International Journal on Applications of Graph Theory in Wireless Ad Hoc Networks and Sensor Networks, 3, 35.
  • Qiu, W., Zhou, Y., Zhu, B., Zheng, Y., Wen, M., and Gong, Z. (2009). Key-Insulated Encryption Based Key Pre- Distribution Scheme for WSN Advances in Information Security and Assurance (Vol. 557, pp. 200 209): Springer Berlin
  • Heidelbeg Sharma, K., Ghose, M. K., and Kuldeep. (2009). Complete Security Framework for Wireless Sensor Networks. International Journal of Computer Science and Information Security, 3(1), 196.
  • Qian, Y., Lu, K., and Tipper, D. (2007). A Design for Secure and Survivable Wireless Sensor Networks. IEEE Wireless Communications, 14(5), 30-37.

Abstract Views: 352

PDF Views: 2




  • Analysis of Wireless Sensor Networks Security Solutions and Countermeasures

Abstract Views: 352  |  PDF Views: 2

Authors

D. P. Mishra
Department of Computer Science & Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India
Ramesh Kumar
Department of Computer Science & Engineering, Bhilai Institute of Technology, Durg, Chhattisgarh, India

Abstract


Wireless Sensor Network is special type of Ad-hoc network formed with autonomous motes with power and memory constraint. WSN is used in various applications such as healthcare, Environmental monitoring, habitat monitoring military, ecology, home and many more practicable solution for challenging applications of different areas. When wireless sensor networks are deployed in an open, hostile or specific defense environment the security becomes extremely important, since WSN motes are resource constraint there is scope for different types of malicious attacks on them. This paper analyses the security solutions and the security mechanisms that will overcome security issues and attacks and recommends adequate solution for the WSN threats.

Keywords


WSN, Attacks, Prevention, Confidentiality, Integrity, Availability.

References