Technology Volume 1, Issue 1, July-September, 2013, pp. 21-25, IASTER 2013 www.iaster.com, Online: 2347-5099, Print: 2348-0009 ABSTRACT Necessitate for Security in Wireless Sensor Network and its Challenges 1 Manjuprasad B, 2 Andhe Dharani 1 Research Scholar, 2 Associate Professor Department of MCA, R.V College of Engineering, Bangalore, India Wireless Sensor network is a recent advance trend in wireless communication and has a vast application in various filed. In this view WSNs need an efficient mechanism for routing or transmitting data, simple computational process and optimal energy usage and last but not the least the security. Currently many existing research works aiming to achieve the WSNs objectives but its needed to be updated as a technology grows, for example energy is not an issues for terrestrial WSNs as many latest technology are adopted by sensors so that it can harvest the energy from the environment itself. Like this security is also not an issue in some of the application of sensor networks. This a survey on security issues in WSNs, as many survey on security just glanced on the different security issues, challenges, solution but this paper aims to unearth the need of security in WSNs based on the types of applications for which the nodes are deployed. Keywords: Wireless Sensor Network, Sensor Nodes, Message Authentication Code, Jamming, Tampering. I. INTRODUCTION A wireless sensor network (WSN) is an assortment of numerous tiny nodes called as sensors that are connected with a petite range of some wireless links or channels like 802.11, 802.15.4[1]. This links are able to connect these nodes to some infrastructure to forward the collected or aggregated information to the centralized base station. Sensor nodes are equipped with low resources like battery, memory and with a low complex processing ability [2]. These WSNs is a network of infrastructure composed of sensing, computing and communication elements that enable administrators to observe and react to events and phenomena in a specified environment or applications [3]. The most recent trends in WSNs are the hard core of internet of things (IoT), and it is a blistering topic in the current research field [4]. Due to these characteristics WSNs has a very wide range of applications mainly divided into two categories: Monitoring and tracking in many fields such as real-time traffic analysis, habitat monitoring, and battle field reconnaissance. In all of these cases, a group of sensor nodes works in a monitored area, senses data from the field, and sends data back to a base station, where the data analysis takes place. The most important purpose of sensor networks is to answer queries about the status of the monitored area, such as calculating tracks of monitored objects, temperature, or enemy activity. In the transition to next-generation computing devices, the importance of WSN are self-evident. Therefore, more and more attentions have been paid to the development of WSN by the academia and industry [5] [6]. Wireless sensor networks must be considered how to add security mechanisms to protect the sensor nodes to communicate securely. Many such mechanisms have been designed according to the characteristics of the 21
wireless sensor network. Due to the resource constraints it is difficult to directly employ the conventional security mechanisms in WSNs, so there is a necessary to understand the limitations in this area [7][8]. The rest of the paper is organized as follows: Section 2 presents the need of security and requirements to achieve security in WSNs. Section 3 scripts the challenges and issues in securing WSNs. II. SECURITY ON WIRELESS SENSOR NETWORKS Security is the one of the important issue in all fields and it not limit to wireless sensor network [9]. But it is considered as complex problem in WSNs due to the medium and the devices constraints [10]. Thus, many security protocols were proposed trying to efficiently carry out the problem of security and the constraints of wireless networks [11, 6, 12]. Need of Security When coming to security the first question arises is why there is a need of security in WSNs or any other communication networks or anywhere [13]. This is to protect the physical or logical asset or information from unauthorized person or system, accidently or intentionally. Security in WSNs In many application the data obtained by the sensing nodes need to be kept confidential and has to be authenticated. Without security a malicious node could intercept private information or sometimes could send false messages to the other nodes in the networks. Even though there is no need of security in the application of habitat monitoring and tracking applications[14,15], but security play an important role in battle field surveillance where security is very essential. Security depends on the purpose of the specific application for example sensors deployed for just recording the temperature for weather forecasting application is different from sensors deployed for detection of forest fire. In weather forecasting the security may be compromised but in the forest fire it can t because if some people try to destroy the forest resources by modifying the sensor deployed to monitor, if there is no secure system so these can lead to loss of natural resources, like this many application need a secure system for efficient information transmission with efficient resource utilization of WSNs. Security in WSNs can be afford by the following requirements Security services should be Confidentiality, Integrity, Authentication and Freshness [16, 17]. Confidentiality: The data that is processed by the sensor nodes which is to be sent to other trusted nodes must be kept in secret from any unauthorized entities in the network. This is one of the complex issues in WSNs because of the broadcast nature of the sensor nodes, so the security protocol applied for unicast communication cannot be applied or suitable for WSNs. 22
The standard approach for confidentiality is to encrypt the data with a secret key that should be able to use only by the authorized personal. But cryptography is too expensive to apply for the resource constrained sensor nodes. Integrity: Integrity means that the message that is being communicated by the trusted nodes should be un-altered during the transmission from a source to destination node by any malicious node. This is usually done in conventional network using MAC (Message Authentication Code) or digital signatures. Authentication: Is the process of identification that the receiving nodes are sure that the message it receives comes from a legal source and the sending nodes ensure that the message is received only by the authorized nodes [18]. Data Freshness: If a node sends a message to some destination it should ensure that there is a minimum delay, but while transmitting some intermediate or malicious nodes may try to hold the data for a sometime so that the data sent will be waste when it arrives at the receiving nodes. This plays a vital role in some application where the information should be communicated in time. So security is vital aspect in WSN applications [7, 19].It is important therefore to consider security solutions that guarantee data confidentiality, authenticity, integrity and freshness. III. SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS The reason why it is a complex task while providing a security for wireless sensor networks is because of the various types of attack that make a security protocol complex. The Attacks on wireless network can be broadly divided into 3 main classes [20, 21] as shown below: Interception is an attack on confidentiality, the sensor nodes may be compromised by an opponent node to gain unauthorized access to sensor node. Modification is an attack on integrity. Modification means an unauthorized node not only accesses the data but tampers it, for example by modifying the data packets being transmitted. Fabrication is an attack on authentication. An adversary node injects false data and tries to compromises to share the information transmitted. To implement a security protocol to WSNs one should know what are the types of attack that can compromises the security and decrease the performance of WSNs. So the attacks can be classified according to each layer of the WSNs OSI model [20, 21, 22] which as shown in the below figure OSI Layer Physical layer Types of Attack Jamming, Tampering Data link layer Network layer Transport layer Application layer Collision, Eavesdropping, Resource exhaustion, Traffic analysis Spoofing, black hole/ Sink holes, Sybil attacks, Denial-ofservice (DoS), Wormholes Flooding, Hello Flood Attack Injects false messages, Energy drain attacks False data injections, Attacks on reliability 23
In fig- we can observe the types of attack that can affect the performance of WSNs. Now these attacks can be analyzed so that in what ways they are harmful to WSNs. Table below parameters of WSNs which is more affected due to specific attacks. Types of Attacks Energy Resources Wastage Bandwi dth/cha nnel Mem ory Jamming, Tampering Yes Yes Traffic/Del ay Decrease in Performance Loss of Data/Confident iality False Data Collision Yes Yes Yes Eavesdroppi ng Yes DoS Yes Hello Flood Attack Yes Yes Yes Warm Hole Yes Yes Yes Spoofing Yes Yes Yes Flooding Yes Yes Yes Sink Hole Yes Yes Sybil Yes Yes IV. CONCLUSION This Survey aims to find the various security challenges and issues in wireless sensor networks. The reason why there is a need of security in WSNs, so that one can design the security protocol by focusing on the specific application of WSNs. The survey also focus on the constraints and limitation in WSNs that play a vital role in security issues and classified the different types of based on these limitations of WSNs. REFERENCES [ 1] Chungen Xu, Yanhong Ge,The Public Key Encryption to Improve the Security on Wireless Sensor Networks,2009 Second International Conference on Information and Computing Science,978-0-7695-3634-7/09 2009 IEEE [ 2] O.Moussaoui and al, Efficient saving in wireless sensor networks through hierarchicalbased clustering, In proceeding of the International IEEE Global Information Infrastructure Symposium, Marrakeche, Morocco, pp. 226-229, July, 2007. [ 3] ManjuPrasad, Andhe Dharani, A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networks, International Journal Of Advanced Smart Sensor Network Systems (IJASSN) a free journal, 2231-4482, Vol 3, No.2, April 2013 [ 4] Shirui Ji1, Qingqi Pei1*, Yong Zeng2, Chao Yang2, Shu-po Bu, An Automated Black-box Testing Approach for WSN Security Protocols, 2011 Seventh International Conference on Computational Intelligence and Security, 978-0-7695-4584-4/11 2011 IEEE [ 5] I.F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8, 2002, pp. 102-114. [ 6] Perrig, J. Stankovic an d D Wagner, Security in Wireless Sensor Networks," Comm. ACM, vol. 47, no. 6, 2004, pp. 53-57. 24
[ 7] Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Performance Evaluation Of Encryption Algorithm For Wireless Sensor Networks, 2012 International Conference on Information Technology and e-services,978-1-4673-1166-3/12,2012 IEEE [ 8] Alippi, C.; Galperti, C., "An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes," Circuits and Systems I: Regular Papers, IEEE Transactions, vol.55, no.6, pp.1742-1750, July 2008. [ 9] ZhangYu Department of Software Engineering Cheng Du Polytechnic Chengdu, Sichuan Province, The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security, China 978-1-4673-2008-5/12 2012 IEEE [ 10] R. Ramanathan and J. Redi, "A Brief Overview of Ad Hoc Networks: Challenges and Directions", IEEE Commun. Mag., vol. 40, no. 5, pp. 20-22, 2002 [ 11] Benamar KADRI, Abdallah M'HAMED, Mohammed FEHAM. " Secured Clustering Algorithm for Mobile Ad hoc Networks", International Journal of Computer Science and Network Security, Vol.7, No.3, pp 27-34; March 2007. [ 12] G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp. 428 433. [ 13] Andhe Dharani, Vijayalakshmi, Manjuprasd, Vijay Singh, An Epigrammatic Study of some of the Fundamental Concepts in Wireless Sensor Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 9, 2250-2459, September 2012. [ 14] Wendi B,Heinzelman,Anantha P,Chandrakasan,Hari Balakrishnan. An Application-Specific Protocol Architecture for Wireless Microsensor Networks.IEEE transactions on Wireless Communications,pp. 660-670,Oct 2002 [ 15] Deb B, Bhatnagar S, Nath B. A topology discovery algorithm for sensor networks with applications to network management. DCS Technical Report DCS-TR-441, Rutgers University 2001 [ 16] D.Manivannan1, B.Vijayalakshmi2 P.Neelamegam3, An Efficient Authentication Protocol Based on Congruence for Wireless Sensor networks, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, IEEE, MIT, Anna University, Chennai. June 3-5, 2011 [ 17] Perrig, R.Szewczyk, V.Wen, D.Culler, and J.Tygar. Spins: Security protocol for sensor networks, In proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001 [ 18] Taekyoung Kwon and Jin Hong, Secure and Efficient Broadcast Authentication in Wireless Sensor Networks, IEEE Transactions on computers, Vol.59, No.8,August 2010 [ 19] SkipJack and KEA algorithm Specifications,National Institute of Standards and Technology, Mai. 1998. [ 20] Anil M. Hingmire, Enhancing Security of Wireless Sensor Network, International Journal of Engineering Science and Innovative Technology (IJESIT) : 2319-5967 Volume 2, Issue 2, March 2013, [ 21] Anitha S Sastry, Shazia Sulthana, Dr. S Vagdevi, Security Threats in Wireless Sensor Networks in Each Layer, Int. J. Advanced Networking and Applications, Volume: 04 Issue: 04 Pages:1657-1661 (2013) : 0975-0290 [ 22] Security Issues in Wireless Sensor Networks by Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmaz INTERNATIONAL JOURNAL OF COMMUNICATIONS Issue 1, Vol 2, 2008. 25