SECURITY ISSUES IN WIRELESS SENSOR NETWORKS

Snehlata Yadav1*, Kamlesh Gupta2*, Sanjay Silakari3*
1Govt. Women’s Polytechnic College, Bhopal MP, India
2Jaypee University of Engineering and Technology, Guna, MP, India
3UIT, RGPV Bhopal, MP, India
* Corresponding Author : ssilakari@yahoo.com

Received : -     Accepted : -     Published : 21-12-2010
Volume : 1     Issue : 2       Pages : 1 - 6
J Inform Syst Comm 1.2 (2010):1-6

Cite - MLA : Snehlata Yadav, et al "SECURITY ISSUES IN WIRELESS SENSOR NETWORKS." Journal of Information Systems and Communication 1.2 (2010):1-6.

Cite - APA : Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari (2010). SECURITY ISSUES IN WIRELESS SENSOR NETWORKS. Journal of Information Systems and Communication, 1 (2), 1-6.

Cite - Chicago : Snehlata Yadav, Kamlesh Gupta, and Sanjay Silakari "SECURITY ISSUES IN WIRELESS SENSOR NETWORKS." Journal of Information Systems and Communication 1, no. 2 (2010):1-6.

Copyright : © 2010, Snehlata Yadav, et al, Published by Bioinfo Publications. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided the original author and source are credited.

Abstract

Wireless sensor networks are a new type of networked systems, characterized by every constrained computational and energy resources, and an ad hoc operational environment Network security to Wireless Sensor Networks is a very essential requirement because they are easily susceptible to many threats like Denial-of-Service attacks [15]. The most important security services required are confidentiality and authentication. Many researchers have tried to provide security by using only symmetric key mechanisms thinking that public key cryptosystems are not feasible to implement in these networks because they are constrained with less resources. This paper studies the security aspects of these networks. The paper first introduces sensor networks, and then presents its related security problems, threats, risks and characteristics.

References

[1] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, Tygar J. D. (2001) Security Protocols for Sensor Networks. In The Seventh Annual International Conference on Mobile Computing andNetworking (MobiCom 2001).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[2] Sasha lijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, Mani B.Srivastava (2002) On Communication Security in Wireless Ad-Hoc Sensor Networks. In The Proceedings of the Eleventh IEEE. International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE- 02).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[3] Hu Y.C., Perrig A., and Johnson D. B. (2002) “Wormhole detection in wireless ad hoc networks,” Department of Computer Science, Rice University, Tech. Rep.TR01- 384.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[4] Jeffery Under coffer, Sasikanth Avancha, Anupam Joshi and John Pinkston. In Security for Sensor Networks  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[5] Chris Karl, David Wagner. In Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[6] Wadaa, Olariu S.,Wilson L., Eltoweissy M., Jones K. (2004) On Providing Anonymity in Wireless Sensor Networks. In Proceedings of the Tenth International Conference on Parallel and Distributed Systems (ICPADS’04).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[7] Chris Karlof, Naveen Sastry, David Wagner. (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. ACM SenSys. November 3-5  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[8] Sencun Zhu, Sanjeev Setia, Sushil Jajodia. (2003) LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In The Proceedings of the 10th ACM conference on Computer and communications security  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[9] Alan Mainwaring, Joseph Polastre, Robert Szewczyk and David Culler. (2002) Wireless sensor networks for habitat monitoring. In First ACM International Workshop on Wireless Sensor Networks and Applications  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[10] Robert Szewczyk, Joseph Polastre, Alan Mainwaring and David Culler. (2004) Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN- 04).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[11] Matt Welsh, Dan Myung, Mark Gaynor and Steve Moulton. (2003) Resuscitation monitoring with a wireless sensor network. In Supplement to Circulation: Journal of the American Heart Association.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[12] Duckworth G.L., Gilbert D.C. and Barger J.E. (1993) Acoustic counter-sniper system. In SPIE International Symposium on Enabling Technologies for Law Enforcement and Security  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[13] Hill J., Szewczyk R., Woo A., Hollar S.,Culler D. and Pister K. (2000) System architecture directions for networkedsensors. In Proceedings of ACM ASPLOS IX  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[14] Intanagonwiwat C., Govindan R. and Estrin. D. (2000) Directed diffusion: A scalable and robust Communication paradigm for sensor networks In Proceedings of MobiCOM-00  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[15] Boston, Massachussetts, Karlof C., Li Y. and Polastre J. (2003) ARRIVE: An Architecture for Robust RoutingIn Volatile Environments.Technical Report UCB/CSD-03-1233, University of Californi at Berkeley  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[16] Madden S., Szewczyk R., Franklin M. and Culler D. (2002) Supporting Aggregate Queries over Ad-Hoc Wireless Sensor Networks. In 4th IEEE Workshop on Mobile Computing Systems and Applications  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[17] Stajano F. and Anderson R. (1999) “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, 3rd AT&T Software Symposium, Middletown, Newzealand  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[18] Douceur J. R. (2002) “The Sybil Attack,” in 1st International Workshop on Peerto- Peer Systems (IPTPS-02).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[19] Rivest R. L., Robshaw M.J.B., Sidney R. and Yin Y.L., “The RC6 Block Cipher”, AES submission http://theory.lcs.mit.edu/~rivest/rc6. pdf  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[20] Hu Y.C., Perrig A. and Johnson D. B.(2002) “Wormhole detection in wireless ad hoc networks", Department of ComputerScience, Rice University  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[21] Shafi Goldwasser and Silvio Micali. (1984) Probabilistic encryption. Journal ofComputer Security, 28:270–299  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[22] Adrian Perrig, Ran Canetti, Dawn Song,and Tygar J. D. (2001) Efficient and securesource Authentication for multicast. In Network and Distributed System Security Symposium, NDSS-01  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[23] Adrian Perrig, Ran Canetti, Tygar J.D. and Dawn Song N. (2000) Efficient authentication and signing of multicast streams over lossy channels. In IEEESymposium on Security and Privacy  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[24] Samuel R., Michael J., Franklin, Joseph M.,Hellerstein and Wei Hong (2002) TAG: A tiny aggregation service for adhoc sensor networks. In The Fifth Symposium on Operating Systems Design andImplementation  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[25] Samuel R., Madden, Robert Szewczyk,Michael Franklin J. and David Culler (2002)Supporting Aggregate Queries over ad-hocwireless sensor networks. In Workshop on Mobile Computing and SystemsApplications  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[26] Bellare M., Desai A., Jokipii E. andRogawayP. (1997) A concrete security treatment ofSymmetric encryption: Analysis of the DESModes of operation. In Proceedings of 38thAnnual Symposium on Foundations ofComputer Science (FOCS-97).  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[27] Bruce Schneier (1996) AppliedCryptography, Second Edition. John Wiley & Sons.  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus  

[28] Mihir Bellare, Joe Kilian and Phillip Rogaway (2000) the security of the cipher block chaining message authenticationcode.Journal of Computer and SystemSciences  
» CrossRef   » Google Scholar   » PubMed   » DOAJ   » CAS   » Scopus