Necessitate for Security in Wireless Sensor Network and its Challenges



Similar documents
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

A Security Architecture for. Wireless Sensor Networks Environmental

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Network: Challenges, Issues and Research

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches

DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES

Some Security Trends over Wireless Sensor Networks

AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

Security for Ad Hoc Networks. Hang Zhao

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

(I2OR), Publication Impact Factor: (ISRA), Impact Factor: 2.114

Introduction to Wireless Sensor Network Security

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

Secure Routing in Wireless Sensor Networks

Securing MANET Using Diffie Hellman Digital Signature Scheme

Evaluation of Security Mechanisms for Information Dissemination. in Wireless Sensor Networks

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Access Control And Intrusion Detection For Security In Wireless Sensor Network

Security and Privacy Issues in Wireless Sensor Networks for Healthcare

Security Sensor Network. Biswajit panja

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Security in Ad Hoc Network

Sensor Networks - An Insight on Market Perspective and Real Time Border Monitoring System

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

To Study the Various Attacks and Protocols in MANET

Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation

Denial of Service in Sensor Networks

SECURITY VULNERABILITY ISSUES IN WIRELESS

Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

Chap. 1: Introduction

Wireless Sensor Networks: Security, Attacks and Challenges

STUDY OF VARIOUS WIRELESS NETWORK SECURITY ISSUES: A REVIEW

Analysis of Typical Secure Routing Protocols in WSN

How To Secure Data Aggregation In A Wireless Sensor Network

International Journal of Advancements in Research & Technology, Volume 2, Issue 7, July-2013 ISSN

A PKI over Ant Colony based Routing Algorithms for MANETs AntPKI

THIS: THreshold security for Information aggregation in Sensor networks

Keywords Wireless Sensor Networks, energy efficient, security, security mechanisms. Figure 1. WSN Architecture

Strictly as per the compliance and regulations of:

INTRUSION DETECTION SYSTEM ON MOBILE AD HOC NETWORK

Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

Electronic Network - Advantages and Disadvantages

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

A Secure Data Transmission for Cluster based Wireless Sensor Network Using LEACH Protocol

SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS

An Implementation of Secure Wireless Network for Avoiding Black hole Attack

ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES

Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks

WIRELESS SENSOR NETWORKS ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THREATS AND ITS COUNTERMEASURES

A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks

How To Write A Transport Layer Protocol For Wireless Networks

SECURE ROUTING PROTOCOL IN SENSOR NETWORK FOR VAMPIRE ATTACK

COSC 472 Network Security

Cryptography and Network Security

Efficient Data Transmission For Wireless Sensor Networks

CERIAS Tech Report

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Prediction of DDoS Attack Scheme

A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED

Secure Data Transmission in Wireless Sensor Network Using Randomized Dispersive Routing Algorithm

SECURE AND EFFICIENT ROUTE TRANSFER AND REPUTATION MANAGEMENT SYSTEM FOR GENERIC ADHOC NETWORK

Foundation University, Islamabad, Pakistan

Wireless Sensor Network Safety Study M.Shankar 1, Dr.M.Sridar 2, Dr.M.Rajani 3

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Resistance of Denial-of-Service Attack in Network Coding using Node Authenticity

Tema 5.- Seguridad. Problemas Soluciones

The Network and Security Analysis for Wireless Sensor Network : A Survey

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Problems of Security in Ad Hoc Sensor Network

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

About the Authors Preface Acknowledgements List of Acronyms

Empirical Study on Secure Routing Protocols in Wireless Sensor Networks

SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN

Survey on different attacks in Wireless Sensor Networks and their prevention system

WIRELESS SENSOR NETWORK SECURITY ANALYSIS

Special Properties of Ad-hoc Wireless Network and Security Models

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Energy Effective Routing Protocol for Maximizing Network Lifetime of WSN

International Journal of Advanced Research in Computer Science and Software Engineering

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

International Journal of Advanced Research in Computer Science and Software Engineering

Cyber-Physical Security for Wireless Sensor Networks

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶


Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks

DESIGNING SECURE SENSOR NETWORKS

Information System Security

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

Transcription:

Technology Volume 1, Issue 1, July-September, 2013, pp. 21-25, IASTER 2013 www.iaster.com, Online: 2347-5099, Print: 2348-0009 ABSTRACT Necessitate for Security in Wireless Sensor Network and its Challenges 1 Manjuprasad B, 2 Andhe Dharani 1 Research Scholar, 2 Associate Professor Department of MCA, R.V College of Engineering, Bangalore, India Wireless Sensor network is a recent advance trend in wireless communication and has a vast application in various filed. In this view WSNs need an efficient mechanism for routing or transmitting data, simple computational process and optimal energy usage and last but not the least the security. Currently many existing research works aiming to achieve the WSNs objectives but its needed to be updated as a technology grows, for example energy is not an issues for terrestrial WSNs as many latest technology are adopted by sensors so that it can harvest the energy from the environment itself. Like this security is also not an issue in some of the application of sensor networks. This a survey on security issues in WSNs, as many survey on security just glanced on the different security issues, challenges, solution but this paper aims to unearth the need of security in WSNs based on the types of applications for which the nodes are deployed. Keywords: Wireless Sensor Network, Sensor Nodes, Message Authentication Code, Jamming, Tampering. I. INTRODUCTION A wireless sensor network (WSN) is an assortment of numerous tiny nodes called as sensors that are connected with a petite range of some wireless links or channels like 802.11, 802.15.4[1]. This links are able to connect these nodes to some infrastructure to forward the collected or aggregated information to the centralized base station. Sensor nodes are equipped with low resources like battery, memory and with a low complex processing ability [2]. These WSNs is a network of infrastructure composed of sensing, computing and communication elements that enable administrators to observe and react to events and phenomena in a specified environment or applications [3]. The most recent trends in WSNs are the hard core of internet of things (IoT), and it is a blistering topic in the current research field [4]. Due to these characteristics WSNs has a very wide range of applications mainly divided into two categories: Monitoring and tracking in many fields such as real-time traffic analysis, habitat monitoring, and battle field reconnaissance. In all of these cases, a group of sensor nodes works in a monitored area, senses data from the field, and sends data back to a base station, where the data analysis takes place. The most important purpose of sensor networks is to answer queries about the status of the monitored area, such as calculating tracks of monitored objects, temperature, or enemy activity. In the transition to next-generation computing devices, the importance of WSN are self-evident. Therefore, more and more attentions have been paid to the development of WSN by the academia and industry [5] [6]. Wireless sensor networks must be considered how to add security mechanisms to protect the sensor nodes to communicate securely. Many such mechanisms have been designed according to the characteristics of the 21

wireless sensor network. Due to the resource constraints it is difficult to directly employ the conventional security mechanisms in WSNs, so there is a necessary to understand the limitations in this area [7][8]. The rest of the paper is organized as follows: Section 2 presents the need of security and requirements to achieve security in WSNs. Section 3 scripts the challenges and issues in securing WSNs. II. SECURITY ON WIRELESS SENSOR NETWORKS Security is the one of the important issue in all fields and it not limit to wireless sensor network [9]. But it is considered as complex problem in WSNs due to the medium and the devices constraints [10]. Thus, many security protocols were proposed trying to efficiently carry out the problem of security and the constraints of wireless networks [11, 6, 12]. Need of Security When coming to security the first question arises is why there is a need of security in WSNs or any other communication networks or anywhere [13]. This is to protect the physical or logical asset or information from unauthorized person or system, accidently or intentionally. Security in WSNs In many application the data obtained by the sensing nodes need to be kept confidential and has to be authenticated. Without security a malicious node could intercept private information or sometimes could send false messages to the other nodes in the networks. Even though there is no need of security in the application of habitat monitoring and tracking applications[14,15], but security play an important role in battle field surveillance where security is very essential. Security depends on the purpose of the specific application for example sensors deployed for just recording the temperature for weather forecasting application is different from sensors deployed for detection of forest fire. In weather forecasting the security may be compromised but in the forest fire it can t because if some people try to destroy the forest resources by modifying the sensor deployed to monitor, if there is no secure system so these can lead to loss of natural resources, like this many application need a secure system for efficient information transmission with efficient resource utilization of WSNs. Security in WSNs can be afford by the following requirements Security services should be Confidentiality, Integrity, Authentication and Freshness [16, 17]. Confidentiality: The data that is processed by the sensor nodes which is to be sent to other trusted nodes must be kept in secret from any unauthorized entities in the network. This is one of the complex issues in WSNs because of the broadcast nature of the sensor nodes, so the security protocol applied for unicast communication cannot be applied or suitable for WSNs. 22

The standard approach for confidentiality is to encrypt the data with a secret key that should be able to use only by the authorized personal. But cryptography is too expensive to apply for the resource constrained sensor nodes. Integrity: Integrity means that the message that is being communicated by the trusted nodes should be un-altered during the transmission from a source to destination node by any malicious node. This is usually done in conventional network using MAC (Message Authentication Code) or digital signatures. Authentication: Is the process of identification that the receiving nodes are sure that the message it receives comes from a legal source and the sending nodes ensure that the message is received only by the authorized nodes [18]. Data Freshness: If a node sends a message to some destination it should ensure that there is a minimum delay, but while transmitting some intermediate or malicious nodes may try to hold the data for a sometime so that the data sent will be waste when it arrives at the receiving nodes. This plays a vital role in some application where the information should be communicated in time. So security is vital aspect in WSN applications [7, 19].It is important therefore to consider security solutions that guarantee data confidentiality, authenticity, integrity and freshness. III. SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS The reason why it is a complex task while providing a security for wireless sensor networks is because of the various types of attack that make a security protocol complex. The Attacks on wireless network can be broadly divided into 3 main classes [20, 21] as shown below: Interception is an attack on confidentiality, the sensor nodes may be compromised by an opponent node to gain unauthorized access to sensor node. Modification is an attack on integrity. Modification means an unauthorized node not only accesses the data but tampers it, for example by modifying the data packets being transmitted. Fabrication is an attack on authentication. An adversary node injects false data and tries to compromises to share the information transmitted. To implement a security protocol to WSNs one should know what are the types of attack that can compromises the security and decrease the performance of WSNs. So the attacks can be classified according to each layer of the WSNs OSI model [20, 21, 22] which as shown in the below figure OSI Layer Physical layer Types of Attack Jamming, Tampering Data link layer Network layer Transport layer Application layer Collision, Eavesdropping, Resource exhaustion, Traffic analysis Spoofing, black hole/ Sink holes, Sybil attacks, Denial-ofservice (DoS), Wormholes Flooding, Hello Flood Attack Injects false messages, Energy drain attacks False data injections, Attacks on reliability 23

In fig- we can observe the types of attack that can affect the performance of WSNs. Now these attacks can be analyzed so that in what ways they are harmful to WSNs. Table below parameters of WSNs which is more affected due to specific attacks. Types of Attacks Energy Resources Wastage Bandwi dth/cha nnel Mem ory Jamming, Tampering Yes Yes Traffic/Del ay Decrease in Performance Loss of Data/Confident iality False Data Collision Yes Yes Yes Eavesdroppi ng Yes DoS Yes Hello Flood Attack Yes Yes Yes Warm Hole Yes Yes Yes Spoofing Yes Yes Yes Flooding Yes Yes Yes Sink Hole Yes Yes Sybil Yes Yes IV. CONCLUSION This Survey aims to find the various security challenges and issues in wireless sensor networks. The reason why there is a need of security in WSNs, so that one can design the security protocol by focusing on the specific application of WSNs. The survey also focus on the constraints and limitation in WSNs that play a vital role in security issues and classified the different types of based on these limitations of WSNs. REFERENCES [ 1] Chungen Xu, Yanhong Ge,The Public Key Encryption to Improve the Security on Wireless Sensor Networks,2009 Second International Conference on Information and Computing Science,978-0-7695-3634-7/09 2009 IEEE [ 2] O.Moussaoui and al, Efficient saving in wireless sensor networks through hierarchicalbased clustering, In proceeding of the International IEEE Global Information Infrastructure Symposium, Marrakeche, Morocco, pp. 226-229, July, 2007. [ 3] ManjuPrasad, Andhe Dharani, A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networks, International Journal Of Advanced Smart Sensor Network Systems (IJASSN) a free journal, 2231-4482, Vol 3, No.2, April 2013 [ 4] Shirui Ji1, Qingqi Pei1*, Yong Zeng2, Chao Yang2, Shu-po Bu, An Automated Black-box Testing Approach for WSN Security Protocols, 2011 Seventh International Conference on Computational Intelligence and Security, 978-0-7695-4584-4/11 2011 IEEE [ 5] I.F. Akyildiz et al., "A Survey on Sensor Networks," IEEE Communications Magazine, vol. 40, no. 8, 2002, pp. 102-114. [ 6] Perrig, J. Stankovic an d D Wagner, Security in Wireless Sensor Networks," Comm. ACM, vol. 47, no. 6, 2004, pp. 53-57. 24

[ 7] Soufiene Ben Othman, Abdelbasset Trad, Habib Youssef, Performance Evaluation Of Encryption Algorithm For Wireless Sensor Networks, 2012 International Conference on Information Technology and e-services,978-1-4673-1166-3/12,2012 IEEE [ 8] Alippi, C.; Galperti, C., "An Adaptive System for Optimal Solar Energy Harvesting in Wireless Sensor Network Nodes," Circuits and Systems I: Regular Papers, IEEE Transactions, vol.55, no.6, pp.1742-1750, July 2008. [ 9] ZhangYu Department of Software Engineering Cheng Du Polytechnic Chengdu, Sichuan Province, The Scheme of Public Key Infrastructure for Improving Wireless Sensor Networks Security, China 978-1-4673-2008-5/12 2012 IEEE [ 10] R. Ramanathan and J. Redi, "A Brief Overview of Ad Hoc Networks: Challenges and Directions", IEEE Commun. Mag., vol. 40, no. 5, pp. 20-22, 2002 [ 11] Benamar KADRI, Abdallah M'HAMED, Mohammed FEHAM. " Secured Clustering Algorithm for Mobile Ad hoc Networks", International Journal of Computer Science and Network Security, Vol.7, No.3, pp 27-34; March 2007. [ 12] G. Guimaraes, E. Souto, D. Sadok, J. Kelner, Evaluation of security mechanisms in wireless sensor networks, in: Systems Communications Proceedings 2005, pp. 428 433. [ 13] Andhe Dharani, Vijayalakshmi, Manjuprasd, Vijay Singh, An Epigrammatic Study of some of the Fundamental Concepts in Wireless Sensor Networks, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 9, 2250-2459, September 2012. [ 14] Wendi B,Heinzelman,Anantha P,Chandrakasan,Hari Balakrishnan. An Application-Specific Protocol Architecture for Wireless Microsensor Networks.IEEE transactions on Wireless Communications,pp. 660-670,Oct 2002 [ 15] Deb B, Bhatnagar S, Nath B. A topology discovery algorithm for sensor networks with applications to network management. DCS Technical Report DCS-TR-441, Rutgers University 2001 [ 16] D.Manivannan1, B.Vijayalakshmi2 P.Neelamegam3, An Efficient Authentication Protocol Based on Congruence for Wireless Sensor networks, IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011, IEEE, MIT, Anna University, Chennai. June 3-5, 2011 [ 17] Perrig, R.Szewczyk, V.Wen, D.Culler, and J.Tygar. Spins: Security protocol for sensor networks, In proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001 [ 18] Taekyoung Kwon and Jin Hong, Secure and Efficient Broadcast Authentication in Wireless Sensor Networks, IEEE Transactions on computers, Vol.59, No.8,August 2010 [ 19] SkipJack and KEA algorithm Specifications,National Institute of Standards and Technology, Mai. 1998. [ 20] Anil M. Hingmire, Enhancing Security of Wireless Sensor Network, International Journal of Engineering Science and Innovative Technology (IJESIT) : 2319-5967 Volume 2, Issue 2, March 2013, [ 21] Anitha S Sastry, Shazia Sulthana, Dr. S Vagdevi, Security Threats in Wireless Sensor Networks in Each Layer, Int. J. Advanced Networking and Applications, Volume: 04 Issue: 04 Pages:1657-1661 (2013) : 0975-0290 [ 22] Security Issues in Wireless Sensor Networks by Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmaz INTERNATIONAL JOURNAL OF COMMUNICATIONS Issue 1, Vol 2, 2008. 25