Open Access   Article Go Back

Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review

A.K. Nuristani1 , Jawahar Thakur2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 436-444, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.436444

Online published on Oct 31, 2018

Copyright © A.K. Nuristani, Jawahar Thakur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.K. Nuristani, Jawahar Thakur, “Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.436-444, 2018.

MLA Style Citation: A.K. Nuristani, Jawahar Thakur "Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review." International Journal of Computer Sciences and Engineering 6.10 (2018): 436-444.

APA Style Citation: A.K. Nuristani, Jawahar Thakur, (2018). Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review. International Journal of Computer Sciences and Engineering, 6(10), 436-444.

BibTex Style Citation:
@article{Nuristani_2018,
author = {A.K. Nuristani, Jawahar Thakur},
title = {Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {436-444},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3043},
doi = {https://doi.org/10.26438/ijcse/v6i10.436444}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.436444}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3043
TI - Security Issues and Comparative Analysis of Security Protocols in Wireless Sensor Networks: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - A.K. Nuristani, Jawahar Thakur
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 436-444
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
463 456 downloads 210 downloads
  
  
           

Abstract

Wireless sensor network (WSN) is a wireless network with large number of sensor nodes or it could be defined as a set of distributed devices which could be used to monitor sensible and natural conditions. These sensors can execute processing and sensing tasks, and additionally equipped for communicating with each other. Because of the extensive area of its applications it became one of the premier research topics recently. The main objective of wireless sensor network is regularly to gather sensing data from all sensors to particular sink nodes (base stations) and after that performing additionally operations at these sink nodes. Currently wireless sensor networks are available as a subject at advanced undergrad and graduate levels at some universities around the world. One of the challenges in WSNs is to devise and implement high security protocols with limited resources. This paper debated the security issues; challenges and protocols that are discussed and reviewed on the basis of attributes (confidentiality, availability, freshness, encryption methods, MAC authentication, key management, attacks protected and scalability) and tabulated WSNs security protocols, on the basis of (authors, protocols, advantages, disadvantages and applications) based on researches done by the researchers.

Key-Words / Index Term

WSNs, Attacks in WSN, Security Protocols

References

[1] S. Misra, I. Woungang and S. C. Misra, “Guide toWireless Sensor Networks”, c Springer-Verlag London Limited, pp. 1, 2009
[2] J. Zheng and A. Jamalipour, “Wireless Sensor Networks A Networking Perspective”, A John Wiley & Sons, Inc., Publication, pp. xxiii-2, 2009
[3] C. S. Raghavendra, K. M. Sivalingam and T. Znati, “wireless sensor networks”, Kluwer academic publishers New York, Boston, Dordrecht, London, Moscow, pp. xiv, 2004
[4] M. U. Aftab, O. Ashraf, M. Irfan, M. Majid, A. Nisar and M. A. Habib, “A Review Study of Wireless Sensor Networks and Its Security”, Communications and Network, Vol. 7, No.4, pp.172-179, 2015
[5] Kahina Chelli, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering, London, U.K. (Vol. 1, pp. 1-3, 2015
[6] Murat Dener, “Security Analysis in Wireless Sensor Networks”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Vol.10, No.10, pp.303501, 2014
[7] David Martins and Herve Guyennet, “Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey”, pp. 313-320, 2010
[8] C. Dhivya Devi and B.Santhi, “Study on Security Protocols in Wireless Sensor Networks”, International Journal of Engineering and Technology, Vol.5, No.5, pp.200-207, 2013
[9] M. Revathi and Dr. B. Amutha, “A Survey on Security Protocols in Wireless Sensor Network”, International Journal of Pure and Applied Mathematics, 2017
[10] R. Sharma, Y. Chaba and Y. Singh, “Analysis of Security Protocols in Wireless Sensor Network”, IJANA 2010
[11] Y. Bazband and K. Fahimi, “Performance Comparison Wireless Sensor Network Security Protocols: LLSP and TinySEC”, International Journal of Engineering Sciences and Research Technology, 2014
[12] A. S. Ahmed, “An Evaluation of Security Protocols on Wireless Sensor Network”, TKK –T Seminar of Internetworking, 2009
[13] L. E. Lighfoot, J. Ren and T. Li, “An Energy Efficient Link- Layer Security Protocol for Wireless Sensor Networks”, IEEE EIT 2007 proceedings, pp. 233-238, 2007
[14] J. Ren, T. Li and D. Aslam, “A Power Efficient Link-Layer Security Protocol LLSP for Wireless Sensor Networks”, Military Communications Conference, pp. 1002-1007, 2005
[15] C. Karlof, N. Sastry and D. Wagner, “TinySec: A Link Layer Security Architecture for Wireless Sensor Networks”, Baltimore, Maryland, USA, pp. 162-175, 2004
[16] L. Tobarra, D. Cazorla, F. Cuartero, G. Diaz and E. Cambronero, “Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP”, in wireless sensor and actor networks, Springer, Boston, MA, pp.95-106, 2007
[17] L. Krontiris, T. Dimitriou, H. Soroush and M. Salajegheh, “WSN Link-Layer Security Frameworks”, wireless sensor network security, Athens Information Technology, Greece, pp. 142, 2008
[18] A. Perrig, R. Szewczyk, J. D. Tygar, V.Wen and D. E. Culler, “SPINS: Security Protocols for Sensor Networks”, Kluwer Academic Publishers. Manufactured in Netherlands, Vol.8 No.5 pp.521-534, 2002
[19] K. M Pattani and P. J Chauhan, “SPIN Protocol for Wireless Sensor Network”, International Journal of Advance Research in Engineering, Science and Technology, 2015
[20] S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks”, Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C., USA, Vol. 2, No.4, pp.500-528, 2003
[21] D. Alsoufi, K. Elleithy, T. Abuzaghleh and A. Nassar, “Security in Wireless Sensor Networks-Improving the LEAP Protocol”, International Journal of Computer Science and Engineering Survey, 2012
[22] A. A. Andhale and Prof. B. N. Jagdale, “Light Weight Security Protocol for Wireless Sensor Networks (WSN)”, International Journal of Engineering Research and Technology, 2014
[23] K. Ren, W. Lou and Y. Zhang, “LEDS: Providing Location- Aware End-to-End Data Security in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, Vol. 7, No.5, pp.585-598. 2008
[24] J. G. Ndia, “A Survey of Security Protocols for Wireless Sensor Networks”, International Journal of Applied Computer Science, 2017
[25] T. Park and K. G. Shin, “LiSP: A Lightweight Security Protocol for Wireless Sensor Networks”, ACM Transactions on Embedded Computing Systems, Vol. 3, No.3, pp.634-660, 2004
[26] A. Sharma, G. Tripathi, M. S. Khan and K. A. Kumar, “A Survey Paper on Security Protocols of Wireless Sensor Networks”, International Research Journal of Engineering and Technology, 2015
[27] M. Luk, G. Mezzour and A. Perrig, “MiniSec: A Secure Sensor Network Communication Architecture”, IPSN Cambridge, Massachusetts, IEEE USA, pp. 479-488). 2007
[28] E. Sharifi, M. Khandan and M. Shamsi, “MAC Protocols Security in Wireless Sensor Networks: A Survey”, International Journal of Computer and Information Technology, A survey 1, 2014