Snehlata Yadav1*, Kamlesh Gupta2*, Sanjay Silakari3*
1Govt. Women’s Polytechnic College, Bhopal MP, India
2Jaypee University of Engineering and Technology, Guna, MP, India
3UIT, RGPV Bhopal, MP, India
* Corresponding Author : ssilakari@yahoo.com
Received : - Accepted : - Published : 21-12-2010
Volume : 1 Issue : 2 Pages : 1 - 6
J Inform Syst Comm 1.2 (2010):1-6
Wireless sensor networks are a new type of networked systems, characterized by every constrained computational and energy resources, and an ad hoc operational environment Network security to Wireless Sensor Networks is a very essential requirement because they are easily susceptible to many threats like Denial-of-Service attacks [15]. The most important security services required are confidentiality and authentication. Many researchers have tried to provide security by using only symmetric key mechanisms thinking that public key cryptosystems are not feasible to implement in these networks because they are constrained with less resources. This paper studies the security aspects of these networks. The paper first introduces sensor networks, and then presents its related security problems, threats, risks and characteristics.
[1] Adrian Perrig, Robert Szewczyk, Victor
Wen, David Culler, Tygar J. D. (2001)
Security Protocols for Sensor Networks.
In The Seventh Annual International
Conference on Mobile Computing
andNetworking (MobiCom 2001).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[2] Sasha lijepcevic, Miodrag Potkonjak,
Vlasios Tsiatsis, Scott Zimbeck, Mani
B.Srivastava (2002) On Communication
Security in Wireless Ad-Hoc Sensor
Networks. In The Proceedings of the
Eleventh IEEE. International Workshops
on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-
02).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[3] Hu Y.C., Perrig A., and Johnson D. B.
(2002) “Wormhole detection in wireless
ad hoc networks,” Department of
Computer Science, Rice University,
Tech. Rep.TR01- 384.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[4] Jeffery Under coffer, Sasikanth
Avancha, Anupam Joshi and John
Pinkston. In Security for Sensor
Networks
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[5] Chris Karl, David Wagner. In Secure
Routing in Wireless Sensor Networks:
Attacks and Countermeasures
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[6] Wadaa, Olariu S.,Wilson L., Eltoweissy
M., Jones K. (2004) On Providing
Anonymity in Wireless Sensor
Networks. In Proceedings of the Tenth
International Conference on Parallel and
Distributed Systems (ICPADS’04).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[7] Chris Karlof, Naveen Sastry, David
Wagner. (2004) TinySec: A Link Layer
Security Architecture for Wireless
Sensor Networks. ACM SenSys.
November 3-5
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[8] Sencun Zhu, Sanjeev Setia, Sushil
Jajodia. (2003) LEAP: Efficient Security
Mechanisms for Large-Scale Distributed
Sensor Networks. In The Proceedings of
the 10th ACM conference on Computer
and communications security
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[9] Alan Mainwaring, Joseph Polastre,
Robert Szewczyk and David Culler.
(2002) Wireless sensor networks for
habitat monitoring. In First ACM
International Workshop on Wireless
Sensor Networks and Applications
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[10] Robert Szewczyk, Joseph Polastre,
Alan Mainwaring and David Culler.
(2004) Lessons from a sensor network
expedition. In First European Workshop
on Wireless Sensor Networks (EWSN-
04).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[11] Matt Welsh, Dan Myung, Mark Gaynor
and Steve Moulton. (2003)
Resuscitation monitoring with a wireless
sensor network. In Supplement to
Circulation: Journal of the American
Heart Association.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[12] Duckworth G.L., Gilbert D.C. and Barger
J.E. (1993) Acoustic counter-sniper
system. In SPIE International
Symposium on Enabling Technologies
for Law Enforcement and Security
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[13] Hill J., Szewczyk R., Woo A., Hollar
S.,Culler D. and Pister K. (2000) System
architecture directions for
networkedsensors. In Proceedings of
ACM ASPLOS IX
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[14] Intanagonwiwat C., Govindan R. and
Estrin. D. (2000) Directed diffusion: A scalable and robust Communication
paradigm for sensor networks In
Proceedings of MobiCOM-00
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[15] Boston, Massachussetts, Karlof C., Li Y.
and Polastre J. (2003) ARRIVE: An
Architecture for Robust RoutingIn
Volatile Environments.Technical Report
UCB/CSD-03-1233, University of
Californi at Berkeley
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[16] Madden S., Szewczyk R., Franklin M.
and Culler D. (2002) Supporting
Aggregate Queries over Ad-Hoc
Wireless Sensor Networks. In 4th IEEE
Workshop on Mobile Computing
Systems and Applications
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[17] Stajano F. and Anderson R. (1999) “The
Resurrecting Duckling: Security Issues
for Ad-hoc Wireless Networks”, 3rd
AT&T Software Symposium,
Middletown, Newzealand
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[18] Douceur J. R. (2002) “The Sybil Attack,”
in 1st International Workshop on Peerto-
Peer Systems (IPTPS-02).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[19] Rivest R. L., Robshaw M.J.B., Sidney R.
and Yin Y.L., “The RC6 Block Cipher”,
AES submission
http://theory.lcs.mit.edu/~rivest/rc6. pdf
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[20] Hu Y.C., Perrig A. and Johnson D.
B.(2002) “Wormhole detection in
wireless ad hoc networks", Department
of ComputerScience, Rice University
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[21] Shafi Goldwasser and Silvio Micali.
(1984) Probabilistic encryption. Journal
ofComputer Security, 28:270–299
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[22] Adrian Perrig, Ran Canetti, Dawn
Song,and Tygar J. D. (2001) Efficient
and securesource Authentication for
multicast. In Network and Distributed
System Security Symposium, NDSS-01
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[23] Adrian Perrig, Ran Canetti, Tygar J.D.
and Dawn Song N. (2000) Efficient
authentication and signing of multicast
streams over lossy channels. In
IEEESymposium on Security and
Privacy
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[24] Samuel R., Michael J., Franklin, Joseph
M.,Hellerstein and Wei Hong (2002)
TAG: A tiny aggregation service for adhoc
sensor networks. In The Fifth
Symposium on Operating Systems
Design andImplementation
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[25] Samuel R., Madden, Robert
Szewczyk,Michael Franklin J. and David
Culler (2002)Supporting Aggregate
Queries over ad-hocwireless sensor
networks. In Workshop on Mobile
Computing and SystemsApplications
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[26] Bellare M., Desai A., Jokipii E.
andRogawayP. (1997) A concrete
security treatment ofSymmetric
encryption: Analysis of the DESModes of operation. In Proceedings of
38thAnnual Symposium on Foundations
ofComputer Science (FOCS-97).
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[27] Bruce Schneier (1996)
AppliedCryptography, Second Edition.
John Wiley & Sons.
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus
[28] Mihir Bellare, Joe Kilian and Phillip
Rogaway (2000) the security of the
cipher block chaining message
authenticationcode.Journal of Computer
and SystemSciences
» CrossRef » Google Scholar » PubMed » DOAJ » CAS » Scopus