Necessitate for Security in Wireless Sensor Network and its Challenges
|
|
- Julian Joseph
- 8 years ago
- Views:
Transcription
1 Technology Volume 1, Issue 1, July-September, 2013, pp , IASTER Online: , Print: ABSTRACT Necessitate for Security in Wireless Sensor Network and its Challenges 1 Manjuprasad B, 2 Andhe Dharani 1 Research Scholar, 2 Associate Professor Department of MCA, R.V College of Engineering, Bangalore, India Wireless Sensor network is a recent advance trend in wireless communication and has a vast application in various filed. In this view WSNs need an efficient mechanism for routing or transmitting data, simple computational process and optimal energy usage and last but not the least the security. Currently many existing research works aiming to achieve the WSNs objectives but its needed to be updated as a technology grows, for example energy is not an issues for terrestrial WSNs as many latest technology are adopted by sensors so that it can harvest the energy from the environment itself. Like this security is also not an issue in some of the application of sensor networks. This a survey on security issues in WSNs, as many survey on security just glanced on the different security issues, challenges, solution but this paper aims to unearth the need of security in WSNs based on the types of applications for which the nodes are deployed. Keywords: Wireless Sensor Network, Sensor Nodes, Message Authentication Code, Jamming, Tampering. I. INTRODUCTION A wireless sensor network (WSN) is an assortment of numerous tiny nodes called as sensors that are connected with a petite range of some wireless links or channels like , [1]. This links are able to connect these nodes to some infrastructure to forward the collected or aggregated information to the centralized base station. Sensor nodes are equipped with low resources like battery, memory and with a low complex processing ability [2]. These WSNs is a network of infrastructure composed of sensing, computing and communication elements that enable administrators to observe and react to events and phenomena in a specified environment or applications [3]. The most recent trends in WSNs are the hard core of internet of things (IoT), and it is a blistering topic in the current research field [4]. Due to these characteristics WSNs has a very wide range of applications mainly divided into two categories: Monitoring and tracking in many fields such as real-time traffic analysis, habitat monitoring, and battle field reconnaissance. In all of these cases, a group of sensor nodes works in a monitored area, senses data from the field, and sends data back to a base station, where the data analysis takes place. The most important purpose of sensor networks is to answer queries about the status of the monitored area, such as calculating tracks of monitored objects, temperature, or enemy activity. In the transition to next-generation computing devices, the importance of WSN are self-evident. Therefore, more and more attentions have been paid to the development of WSN by the academia and industry [5] [6]. Wireless sensor networks must be considered how to add security mechanisms to protect the sensor nodes to communicate securely. Many such mechanisms have been designed according to the characteristics of the 21
2 wireless sensor network. Due to the resource constraints it is difficult to directly employ the conventional security mechanisms in WSNs, so there is a necessary to understand the limitations in this area [7][8]. The rest of the paper is organized as follows: Section 2 presents the need of security and requirements to achieve security in WSNs. Section 3 scripts the challenges and issues in securing WSNs. II. SECURITY ON WIRELESS SENSOR NETWORKS Security is the one of the important issue in all fields and it not limit to wireless sensor network [9]. But it is considered as complex problem in WSNs due to the medium and the devices constraints [10]. Thus, many security protocols were proposed trying to efficiently carry out the problem of security and the constraints of wireless networks [11, 6, 12]. Need of Security When coming to security the first question arises is why there is a need of security in WSNs or any other communication networks or anywhere [13]. This is to protect the physical or logical asset or information from unauthorized person or system, accidently or intentionally. Security in WSNs In many application the data obtained by the sensing nodes need to be kept confidential and has to be authenticated. Without security a malicious node could intercept private information or sometimes could send false messages to the other nodes in the networks. Even though there is no need of security in the application of habitat monitoring and tracking applications[14,15], but security play an important role in battle field surveillance where security is very essential. Security depends on the purpose of the specific application for example sensors deployed for just recording the temperature for weather forecasting application is different from sensors deployed for detection of forest fire. In weather forecasting the security may be compromised but in the forest fire it can t because if some people try to destroy the forest resources by modifying the sensor deployed to monitor, if there is no secure system so these can lead to loss of natural resources, like this many application need a secure system for efficient information transmission with efficient resource utilization of WSNs. Security in WSNs can be afford by the following requirements Security services should be Confidentiality, Integrity, Authentication and Freshness [16, 17]. Confidentiality: The data that is processed by the sensor nodes which is to be sent to other trusted nodes must be kept in secret from any unauthorized entities in the network. This is one of the complex issues in WSNs because of the broadcast nature of the sensor nodes, so the security protocol applied for unicast communication cannot be applied or suitable for WSNs. 22
3 The standard approach for confidentiality is to encrypt the data with a secret key that should be able to use only by the authorized personal. But cryptography is too expensive to apply for the resource constrained sensor nodes. Integrity: Integrity means that the message that is being communicated by the trusted nodes should be un-altered during the transmission from a source to destination node by any malicious node. This is usually done in conventional network using MAC (Message Authentication Code) or digital signatures. Authentication: Is the process of identification that the receiving nodes are sure that the message it receives comes from a legal source and the sending nodes ensure that the message is received only by the authorized nodes [18]. Data Freshness: If a node sends a message to some destination it should ensure that there is a minimum delay, but while transmitting some intermediate or malicious nodes may try to hold the data for a sometime so that the data sent will be waste when it arrives at the receiving nodes. This plays a vital role in some application where the information should be communicated in time. So security is vital aspect in WSN applications [7, 19].It is important therefore to consider security solutions that guarantee data confidentiality, authenticity, integrity and freshness. III. SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS The reason why it is a complex task while providing a security for wireless sensor networks is because of the various types of attack that make a security protocol complex. The Attacks on wireless network can be broadly divided into 3 main classes [20, 21] as shown below: Interception is an attack on confidentiality, the sensor nodes may be compromised by an opponent node to gain unauthorized access to sensor node. Modification is an attack on integrity. Modification means an unauthorized node not only accesses the data but tampers it, for example by modifying the data packets being transmitted. Fabrication is an attack on authentication. An adversary node injects false data and tries to compromises to share the information transmitted. To implement a security protocol to WSNs one should know what are the types of attack that can compromises the security and decrease the performance of WSNs. So the attacks can be classified according to each layer of the WSNs OSI model [20, 21, 22] which as shown in the below figure OSI Layer Physical layer Types of Attack Jamming, Tampering Data link layer Network layer Transport layer Application layer Collision, Eavesdropping, Resource exhaustion, Traffic analysis Spoofing, black hole/ Sink holes, Sybil attacks, Denial-ofservice (DoS), Wormholes Flooding, Hello Flood Attack Injects false messages, Energy drain attacks False data injections, Attacks on reliability 23
4 In fig- we can observe the types of attack that can affect the performance of WSNs. Now these attacks can be analyzed so that in what ways they are harmful to WSNs. Table below parameters of WSNs which is more affected due to specific attacks. Types of Attacks Energy Resources Wastage Bandwi dth/cha nnel Mem ory Jamming, Tampering Yes Yes Traffic/Del ay Decrease in Performance Loss of Data/Confident iality False Data Collision Yes Yes Yes Eavesdroppi ng Yes DoS Yes Hello Flood Attack Yes Yes Yes Warm Hole Yes Yes Yes Spoofing Yes Yes Yes Flooding Yes Yes Yes Sink Hole Yes Yes Sybil Yes Yes IV. CONCLUSION This Survey aims to find the various security challenges and issues in wireless sensor networks. The reason why there is a need of security in WSNs, so that one can design the security protocol by focusing on the specific application of WSNs. The survey also focus on the constraints and limitation in WSNs that play a vital role in security issues and classified the different types of based on these limitations of WSNs. REFERENCES [ 1] Chungen Xu, Yanhong Ge,The Public Key Encryption to Improve the Security on Wireless Sensor Networks,2009 Second International Conference on Information and Computing Science, / IEEE [ 2] O.Moussaoui and al, Efficient saving in wireless sensor networks through hierarchicalbased clustering, In proceeding of the International IEEE Global Information Infrastructure Symposium, Marrakeche, Morocco, pp , July, [ 3] ManjuPrasad, Andhe Dharani, A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networks, International Journal Of Advanced Smart Sensor Network Systems (IJASSN) a free journal, , Vol 3, No.2, April 2013 [ 4] Shirui Ji1, Qingqi Pei1*, Yong Zeng2, Chao Yang2, Shu-po Bu, An Automated Black-box Testing Approach for WSN Security Protocols, 2011 Seventh International Conference on Computational Intelligence and Security, / IEEE [ 5] I.F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8, 2002, pp [ 6] Perrig, J. Stankovic an d D Wagner, Security in Wireless Sensor Networks," Comm. ACM, vol. 47, no. 6, 2004, pp
5 [ 7] Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Performance Evaluation Of Encryption Algorithm For Wireless Sensor Networks, 2012 International Conference on Information Technology and e-services, /12,2012 IEEE [ 8] Alippi, C.; Galperti, C., "An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes," Circuits and Systems I: Regular Papers, IEEE Transactions, vol.55, no.6, pp , July [ 9] ZhangYu Department of Software Engineering Cheng Du Polytechnic Chengdu, Sichuan Province, The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security, China / IEEE [ 10] R. Ramanathan and J. Redi, "A Brief Overview of Ad Hoc Networks: Challenges and Directions", IEEE Commun. Mag., vol. 40, no. 5, pp , 2002 [ 11] Benamar KADRI, Abdallah M'HAMED, Mohammed FEHAM. " Secured Clustering Algorithm for Mobile Ad hoc Networks", International Journal of Computer Science and Network Security, Vol.7, No.3, pp 27-34; March [ 12] G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp [ 13] Andhe Dharani, Vijayalakshmi, Manjuprasd, Vijay Singh, An Epigrammatic Study of some of the Fundamental Concepts in Wireless Sensor Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 9, , September [ 14] Wendi B,Heinzelman,Anantha P,Chandrakasan,Hari Balakrishnan. An Application-Specific Protocol Architecture for Wireless Microsensor Networks.IEEE transactions on Wireless Communications,pp ,Oct 2002 [ 15] Deb B, Bhatnagar S, Nath B. A topology discovery algorithm for sensor networks with applications to network management. DCS Technical Report DCS-TR-441, Rutgers University 2001 [ 16] D.Manivannan1, B.Vijayalakshmi2 P.Neelamegam3, An Efficient Authentication Protocol Based on Congruence for Wireless Sensor networks, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, IEEE, MIT, Anna University, Chennai. June 3-5, 2011 [ 17] Perrig, R.Szewczyk, V.Wen, D.Culler, and J.Tygar. Spins: Security protocol for sensor networks, In proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001 [ 18] Taekyoung Kwon and Jin Hong, Secure and Efficient Broadcast Authentication in Wireless Sensor Networks, IEEE Transactions on computers, Vol.59, No.8,August 2010 [ 19] SkipJack and KEA algorithm Specifications,National Institute of Standards and Technology, Mai [ 20] Anil M. Hingmire, Enhancing Security of Wireless Sensor Network, International Journal of Engineering Science and Innovative Technology (IJESIT) : Volume 2, Issue 2, March 2013, [ 21] Anitha S Sastry, Shazia Sulthana, Dr. S Vagdevi, Security Threats in Wireless Sensor Networks in Each Layer, Int. J. Advanced Networking and Applications, Volume: 04 Issue: 04 Pages: (2013) : [ 22] Security Issues in Wireless Sensor Networks by Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmaz INTERNATIONAL JOURNAL OF COMMUNICATIONS Issue 1, Vol 2,
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationA Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
More informationWireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
More informationWireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
More informationAnomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches
Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches Md. Safiqul Islam *1, Syed AshiqurRahman *2 Department of Computer Science and Engineering Daffodil
More informationDENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
More informationSome Security Trends over Wireless Sensor Networks
Some Security Trends over Wireless Sensor Networks ZORAN BOJKOVIC, BOJAN BAKMAZ, MIODRAG BAKMAZ Faculty of Transport and Traffic Engineering University of Belgrade Vojvode Stepe 305 SERBIA Abstract: -
More informationAN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationA NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
More informationSecurity for Ad Hoc Networks. Hang Zhao
Security for Ad Hoc Networks Hang Zhao 1 Ad Hoc Networks Ad hoc -- a Latin phrase which means "for this [purpose]". An autonomous system of mobile hosts connected by wireless links, often called Mobile
More informationProtecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More information(I2OR), Publication Impact Factor: 3.785 (ISRA), Impact Factor: 2.114
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SURVEY ON SECURITY OF WIRELESS SENSOR NETWORKS Pratima Pandhare M.Tech student, Dept. of ISE BMS College of Engineering Bengaluru-India
More informationIntroduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
More informationSecurity and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 4 (2014), pp. 381-388 Research India Publications http://www.ripublication.com/aeee.htm Security and Privacy Issues in Wireless
More informationSecure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationEvaluation of Security Mechanisms for Information Dissemination. in Wireless Sensor Networks
2013 First International Conference on Artificial Intelligence, Modelling & Simulation Evaluation of Security Mechanisms for Information Dissemination in Wireless Sensor Networks Mohamad Nazim Jambli,
More informationSECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS S. Jayapraba 1 and A.F.Sheik Hakkani 2 1 Department of MCA, Jayam College of Engineering and Technology, Bharathiyar University,
More informationAccess Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
More informationSecurity and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
More informationSecurity Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
More informationSECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
More informationPreventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
More informationSecurity in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
More informationSensor Networks - An Insight on Market Perspective and Real Time Border Monitoring System
International Journal of Sensors and Sensor Networks 2015; 3(3): 18-23 Published online October 9, 2015 (http://www.sciencepublishinggroup.com/j/ijssn) doi: 10.11648/j.ijssn.20150303.11 Sensor Networks
More informationSECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
More informationSPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
More information3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
More informationTo Study the Various Attacks and Protocols in MANET
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet
More informationAnalysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
More informationDenial of Service in Sensor Networks
Denial of Service in Sensor Networks Authors : From: Anthony D. Wood John A. Stankovic University of Virginia Presented by: Luba Sakharuk Agenda for the DOS in Sensor Networks Abstract Theory and Application
More informationSECURITY VULNERABILITY ISSUES IN WIRELESS
SECURITY VULNERABILITY ISSUES IN WIRELESS SENSOR NETWORKS: A SHORT SURVEY C K Marigowda 1, Manjunath Shingadi 2 Associate Professor, Department of Information Science & Eng, Acharya Institute of Technology,
More informationReview of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More informationChap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
More informationWireless Sensor Networks: Security, Attacks and Challenges
Wireless Sensor Networks: Security, Attacks and Challenges Chaudhari H.C. and Kadam L.U. Swami Vivekanand Mahavidyalaya, Udgir e-mail: latakadam2010@rediffmail.com Abstract The significant advances of
More informationSTUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW
STUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW Jyoti 1, Mrs. Sonal Beniwal 2 1 M.Tech Scholar BPSMV, Khanpur, Sonepat 2 Assistant Professor, BPSMV, Khanpur, Sonepat Abstract: Wireless security
More informationAnalysis of Typical Secure Routing Protocols in WSN
, pp.41-50 http://dx.doi.org/10.14257/ijsia.2014.8.6.04 Analysis of Typical Secure Routing Protocols in WSN Jingsha He 1,2,a, Bo Zhou 1,b and Ruohong Liu 2,c 1 School of Software Engineering, Beijing University
More informationHow To Secure Data Aggregation In A Wireless Sensor Network
A Framework: Secure Data Aggregation in Wireless Sensor Networks Vimal Pambhar 1, Bhoomi Bangoria 2, Bhavik Kataria 3 Assistant professor, Dept. of CSE/IT, Dr. Shubhash Technical campus, Junagadh, Gujarat,
More informationInternational Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN 2278-7763 473
473 Comparative Analysis of Hop-to-Hop and End-to-End Secure Communication Shital Y. Gaikwad M. Tech. (Second Year Student) (Computer Network and Information Security) SGGS Institute of Engineering and
More informationA PKI over Ant Colony based Routing Algorithms for MANETs AntPKI
International Journal of Network Security, Vol.15, No.1, PP.42-49, Jan. 2013 42 A PKI over Ant Colony based Routing Algorithms for MANETs AntPKI Benamar Kadri, Djilalli Moussaoui, and Mohammed Feham (corresponding
More informationTHIS: THreshold security for Information aggregation in Sensor networks
THIS: THreshold security for Information aggregation in Sensor networks Hai Vu Neeraj Mittal S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75083, USA hai.vu@student.utdallas.edu
More informationKeywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture
Volume 4, Issue 5, May 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Energy Efficient
More informationStrictly as per the compliance and regulations of:
Global Journal of Computer Science and Technology Volume 12 Issue 9 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationINTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK
INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK Kruahnadeo Belerao M.E. student JSPM Imperial College Of Engg. Wagholi,Pune Vinod Wadane M.E. student JSPM Imperial College Of Engg. Wagholi,Pune ABSTRACT
More informationEnergy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks
I.J. Information Technology and Computer Science, 2014, 01, 50-56 Published Online December 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2014.01.06 Energy-efficient Secure Directed Diffusion
More informationElectronic Network - Advantages and Disadvantages
Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism Shobhana S PG Scholar, Dept of CSE, Apollo Priyadarshanam Institute of Technology, Chennai Abstract Wireless
More informationDoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks
DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks Sunho Lim (Ph.D., Assistant Professor) T 2 WISTOR: TTU Wireless Mobile Networking Laboratory Dept. of Computer Science Texas Tech
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More informationA Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol
A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol Vinoda B Dibbad 1, C M Parameshwarappa 2 1 PG Student, Dept of CS&E, STJIT, Ranebennur, Karnataka, India 2 Professor,
More informationSECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES
ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES Sunil Ghildiyal 1, Ashish Gupta 2, Musheer Vaqur 3, Anupam Semwal 4 1 Assistant Professor, Department of CSE, Uttaranchal University,
More informationComparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
More informationWIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES
WIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES Ranjit Panigrahi 1, Kalpana Sharma 2, M.K. Ghose 1 Department of Computer Sc. & Engineering, SMIT,
More informationA Review of the Vulnerabilities and Attacks for Wireless Sensor Networks
보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 3호 2012년 6월 A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks Ju young Kim 1), Ronnie D. Caytiles 2), Kyung Jung Kim 3) Abstract
More informationHow To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
More informationSECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 3, Mar 2014, 45-50 Impact Journals SECURE ROUTING PROTOCOL IN
More informationCOSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
More informationEfficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
More informationCERIAS Tech Report 2007-04
CERIAS Tech Report 2007-04 SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION by Mohit Saxena Center for Education and Research in Information Assurance and Security, Purdue University,
More informationQUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES
QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationAdvanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
More informationPrediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
More informationA SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
More informationSecure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm
Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm Pallavi Motharkar 1, Dr.P.R.Deshmukh 2 and Prof.G.S.Thakare 3 1 M.E. (Computer Engineering), 2,3 Department
More informationSECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK
SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK Paulraj*1, A.Syam Prasad*2 M.Tech (CSE) Student, Department of CSE, MRCET, Kompally, Hyderabad, A.P, India
More informationFoundation University, Islamabad, Pakistan qasim_1987@hotmail.com
Kerberos Authentication in Wireless Sensor Networks Qasim Siddique Foundation University, Islamabad, Pakistan qasim_1987@hotmail.com ABSTRACT We proposed an authentication mechanism in the wireless sensor
More informationWireless Sensor Network Safety Study M.Shankar 1, Dr.M.Sridar 2, Dr.M.Rajani 3
Wireless Sensor Network Safety Study M.Shankar 1, Dr.M.Sridar 2, Dr.M.Rajani 3 1 Associate Professor and Head, for UG and PG studies Department of Electrical and Electronics Engineering Kuppam Engineering
More informationThe Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
More informationResistance of Denial-of-Service Attack in Network Coding using Node Authenticity
Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity P. ANITHA PG Scholar Dept. of Computer Science Velalar College of Engineering and Technology ANNA UNIVERSITY, CHENNAI anita4890@gmail.com
More informationTema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
More informationThe Network and Security Analysis for Wireless Sensor Network : A Survey
The Network and Security Analysis for Wireless Sensor Network : A Survey Alok Ranjan Prusty Computer Science & Engineering Koustuv Institute Of Technology (KIT) Biju Patnaik University of Technology (B.P.U.T),
More informationPreventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
More informationProblems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationEmpirical Study on Secure Routing Protocols in Wireless Sensor Networks
Empirical Study on Secure Routing Protocols in Wireless Sensor Networks Ali Modirkhazeni Msc Student, Faculty of Computer Science and Information Systems,University Technology Malaysia Mali25@live.utm.my
More informationSECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN
SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela, elleithy}
More informationSurvey on different attacks in Wireless Sensor Networks and their prevention system
Survey on different attacks in Wireless Sensor Networks and their prevention system Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise 1 BE IT, Department of Information Technology, PCCOE, Maharashtra,
More informationWIRELESS SENSOR NETWORK SECURITY ANALYSIS
WIRELESS SENSOR NETWORK SECURITY ANALYSIS Hemanta Kumar Kalita 1 and Avijit Kar 2 1 Department of Computer Engineering, Jadavpur University, Kolkata, India hemanta91@yahoo.co.in 2 Department of Computer
More informationSpecial Properties of Ad-hoc Wireless Network and Security Models
Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of
More informationAriadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
More informationEnergy Effective Routing Protocol for Maximizing Network Lifetime of WSN
Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN Rachana Ballal 1, S.Girish 2 4 th sem M.tech, Dept.of CS&E, Sahyadri College of Engineering and Management, Adyar, Mangalore, India
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 1, January 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of
More informationSurvey on Load balancing protocols in MANET S (mobile ad-hoc networks)
Survey on Load balancing protocols in MANET S (mobile ad-hoc networks) Ramandeep Kaur 1, Gagandeep Singh 2, Sahil Vashist 3 1 M.tech Research Scholar, Department of Computer Science & Engineering, Chandigarh
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 2, February 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Stochastic
More informationCyber-Physical Security for Wireless Sensor Networks
Cyber-Physical Security for Wireless Sensor Networks Position Paper Gordon W. Skelton, PhD Center for Defense Integrated Data (CDID) Jackson State University 1230 Raymond Road Box 1200 Jackson, MS 39204
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationssumathy@vit.ac.in upendra_mcs2@yahoo.com
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India ssumathy@vit.ac.in 2 School of Computing Sciences, VIT University, Vellore-632 014,
More informationRobust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
More informationUsing Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks
Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks Sajid Hussain* and Md Shafayat Rahman Jodrey School of Computer Science, Acadia University
More informationDESIGNING SECURE SENSOR NETWORKS
WIRELESS SENSOR NETWORKS DESIGNING SECURE SENSOR NETWORKS ELAINE SHI AND ADRIAN PERRIG, CARNEGIE MELLON UNIVERSITY Sensor networks are a promising approach for a variety of applications, such as monitoring
More informationInformation System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
More informationVulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology erjica@gmail.com Abstract intrusion detection
More information