Open Access   Article Go Back

WSN – An Emerging Technology and its Security Meaures

Shafiqul Abidin1

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 260-264, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.260264

Online published on Sep 30, 2018

Copyright © Shafiqul Abidin . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shafiqul Abidin, “WSN – An Emerging Technology and its Security Meaures,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.260-264, 2018.

MLA Style Citation: Shafiqul Abidin "WSN – An Emerging Technology and its Security Meaures." International Journal of Computer Sciences and Engineering 6.9 (2018): 260-264.

APA Style Citation: Shafiqul Abidin, (2018). WSN – An Emerging Technology and its Security Meaures. International Journal of Computer Sciences and Engineering, 6(9), 260-264.

BibTex Style Citation:
@article{Abidin_2018,
author = {Shafiqul Abidin},
title = {WSN – An Emerging Technology and its Security Meaures},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {260-264},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2855},
doi = {https://doi.org/10.26438/ijcse/v6i9.260264}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.260264}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2855
TI - WSN – An Emerging Technology and its Security Meaures
T2 - International Journal of Computer Sciences and Engineering
AU - Shafiqul Abidin
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 260-264
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
470 336 downloads 269 downloads
  
  
           

Abstract

Wireless Sensor Network (WSN) is one of the merging network technologies. It is an extensively distributed network equipped with low powered and lightweight wireless sensor nodes. WSN are being deployed to monitor system and environment. WSN are being used in health sectors, military operations, automation industries, traffic monitoring, oil refineries etc. But with the emerging applications, WSN is prone to attacks and threats. These attacks and threats must be studied thoroughly in order to counter them. Today security issues are the major challenges faced by WSN. The deployment of wireless sensor nodes in hostile environments makes them the subject of lethal attacks, also due to the limitations of resources processing capability, power consumption & communication range WSN are vulnerable to many types of threats/attacks. There are serious consequences if security of WSN gets compromised by any means such as information theft, lack of privacy, etc. Thus it must be our utmost priority to save WSNs from malicious attacks. In this study we have highlighted the various fatal attacks that can destruct WSN with their impacts and consequences.

Key-Words / Index Term

Wireless Sensor Network (WSN), Network Security, Cryptography, Confidentiaity, Authenicity, Blackhole, Jammming.

References

[1] Al-Sakib Khan Pathan ,Hyung-Woo Lee, ChoongSeon Hong, “Security in Wireless Sensor Networks: Issues and Challenges”, Proc. ICACT 2006, Volume 1, 20-22 Feb, 2006, pp. 1043-1048.
[2] N. Gura, A. Patel, et al. "Comparing elliptic curve cryptography and RSA on 8-bit CPUs." Cryptographic Hardware and Embedded Systems-CHES 2004, pp 925-943, 2004.
[3] Hung, X, L, et al. “An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge,” Sensors, Vol 8. 2008, 7753-7782.
[4] L. Jialiang, Valois, F.; Dohler, M.; Min-You Wu; , "Optimized Data Aggregation in WSNs Using Adaptive ARMA," Sensor Technologies and Applications (SENSORCOMM), 2010 Fourth International Conference on, , pp.115-120, 18-25 July 2010.
[5] RobertSzewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN 04), January 2004.
[6] Kalpana Sharma, M.K. Ghose, Deepak Kumar, Raja Peeyush Kumar Singh,Vikas Kumar Pandey. “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”. In IJAST, Vol 7, April 2010.
[7] Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., and Jokerst, R.M., "Analyzing interaction between distributed denial of service attacks and mitigation technologies", Proc. DARPA Information Survivability Conference and Exposition, Volume 1, 22-24 April, 2003, pp. 26 - 36.
[8] Douceur, J. "The Sybil Attack", 1st International Workshop on Peer-to-Peer Systems (2002).
[9] Hu, Y.-c., Perrig, A., and Johnson, D.B., "Packet leashes: a defense against wormhole attacks in wireless networks", Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, Vol. 3, 30 March-3 April 2003, pp. 1976 - 1986.
[10] Sheela D. Naveen K,C and Mahadevan G, A non cryptographic method of sink hole attack detectionin wireless sensor networks, Recent Trends in Information Technology (ICRTIT), 2011 International Conference IEEE.
[11] Hamid, M. A., Rashid, M-O., and Hong, C. S., “Routing Security in Sensor Network: Hello Flood Attack and Defense”, to appear in IEEE ICNEWS 2006.
[12] Choong Seon Hong. "Security in wireless sensor networks: issues and challenges", 2006 8th International Conference Advanced Communication Technology, 2006.
[13] Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, Wang Liangmin, “Lightweight Defense Scheme against Selective Forwarding Attacks in Wireless Sensor Networks’ pp 226-232, IEEE 2009.
[14] Ahmad Salehi, S., M.A. Razzaque, Parisa Naraei, and Ali Farrokhtala. "Security in Wireless Sensor Networks: Issues and challanges", 2013 IEEE International Conference on Space Science and Communication (IconSpace), 2013.