CHAUDHARI H.C.1, KADAM L.U.2*
1Swami Vivekanand Mahavidyalaya, Udgir
2Swami Vivekanand Mahavidyalaya, Udgir
* Corresponding Author : latakadam2010@rediffmail.com
Received : - Accepted : - Published : 01-11-2011
Volume : 1 Issue : 1 Pages : 4 - 16
Int J Networking 1.1 (2011):4-16
Conflict of Interest : None declared
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. Sensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. Security is becoming a major concern for WSN protocol designers because of the wide security-critical applications of WSNs .In this paper we have made an effort to document all the known security issues in wireless sensor networks and discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced. In this paper we took up the challenge and have proposed an integrated comprehensive security that will provide security services for all services of sensor network. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats.
[1] Adrian Perrig, John Stankovic, David Wagner, “Security in
Wireless Sensor Networks” Communications of the ACM,
Page53-57, year 2004
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong,
“Security in Wireless Sensor Networks: Issues and Challenges”,
International conference on Advanced Computing Technologies,
Page1043-1045, year 2006
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] Chris Karlof, David Wagner, “Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures”, AdHoc
Networks (elsevier), Page: 299-302, year 2003
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] Ian F. Akykildiz, Weilian Su, Yogesh Sankarasubramaniam, and
Erdal Cayirci, “A Survey on Sensor Networks”, IEEE
Communication Magazine, year 2002
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin
Chaudhary, “Wireless Sensor Network Security: A Survey”,
Security in Distributed, Grid and Pervasive Computing Yang
Xiao (Eds), Page3-5, 10-15, year 2006
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[6] Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security
in wireless sensor networks: issues and challenges” Advanced
Communication Technology (ICACT), Page(s):6, year 2006
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[7] Tahir Naeem, Kok-Keong Loo, Common Security Issues and
Challenges in Wireless Sensor Networks and IEEE 802.11
Wireless Mesh Networks, International Journal of Digital
Content Technology and its Applications, Page 89-90 Volume 3,
Number 1, year 2009
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[8] Undercoffer, J., Avancha, S., Joshi, A. and Pinkston, J.
“Security for sensor networks”. In Proceedings of the CADIP
Research Symposium, University of Maryland, Baltimore
County, USA, year 2002
http://www.cs.sfu.ca/~angiez/personal/paper/sensor-ids.pdf
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[9] Zia, T.; Zomaya, A., “Security Issues in Wireless Sensor
Networks”, Systems and Networks Communications (ICSNC)
Page(s):40 – 40, year 2006
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[10] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou,
Sensor Network Security: A Survey, IEEE Communications
Surveys & Tutorials, vol. 11, no. 2,page(s): 52-62, year 2009.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus