Wireless Sensor Networks Security Issues, Attacks and Challenges: A Survey

  • T. ShanmugapriyaEmail author
  • K. Kousalya
  • J. Rajeshkumar
  • M. Nandhini
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 49)


In recent years, Wireless Sensor Networks (WSN) are developing a real workforce in true condition. WSNs are broadly utilized in the following checking and controlling applications. Inspite of their predominant role in wireless applications, it may also introduce some research complexities. This paper focuses on the survey of various security issues faced by wireless sensor networks such as data security at node and network level and recommends solutions to secure WSN. Despite the difficulties in wireless sensor network, this survey centers around the attacks of different varieties in WSNs such as physical, communication, Base station, and routing protocol attacks and provides some solutions for the attacks. This paper address the issues on versatility, correspondence steering conventions, and security. This study center around security prerequisites, WSN applications, distinctive attacks and safeguards, and various ongoing issues and difficulties. This paper gives a brief overview on challenges of WSN like routing and application based challenges, key management, and new technology based challenges. Moreover, Software Defined Networking (SDN) mechanism is used to support the bendable routing and communication between sensor nodes. This survey discusses the challenges and security issues of SDN in WSN.


Wireless Sensor Network (WSN) Software Defined Networking (SDN) Routing protocol attacks Application based challenges Key management 


  1. 1.
    Bangash, Y.A., Abid, Q.D., Ali, A.A.A., Al-Salhi, Y.E.A.: Security issues and challenges in wireless sensor networks: a survey. IAENG Int. J. Comput. Sci. 44(2). IJCS_44_2_02Google Scholar
  2. 2.
    Singh, C., Kaur, R., Kaur, M.: Review of security enhancement techniques for wireless sensor network. Int. J. Electron. Eng. Res. 9(8), 1185–1196 (2017). ISSN 0975-6450 Research India PublicationsGoogle Scholar
  3. 3.
    Mottola, L., Picco, G.P.: Programming wireless sensor networks: fundamental concepts and state of the art. ACM Comput. Surv. (CSUR) 43(3), 19:1–19:51 (2011)CrossRefGoogle Scholar
  4. 4.
    Singh, R., Singh, J., Singh, R.: Security challenges in wireless sensor networks. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS), 6(3) (2016). ISSN 2249–9555Google Scholar
  5. 5.
    Pathan, A.S.K., Lee, H.W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. ISBN 89-5519-129-4Google Scholar
  6. 6.
    Rudramurthy, V.C., Aparna, R.: Security issues and challenges in wireless sensor networks: a survey. Int. J. Innov. Res. Comput. Commun. Eng. (An ISO 3297: 2007 Certified Organization) 3(10), 9648–9656 (2015)Google Scholar
  7. 7.
    Kumar, V., Jain, A., Barwal, P.N.: Wireless sensor networks: security issues, challenges and solutions. Int. J. Inf. Comput. Technol. 4(8), 859–868 (2014). ISSN 0974-2239Google Scholar
  8. 8.
    Kamat, P., Zhang, Y., Trappe, W., Ozturk, C.: Enhancing source-location privacy in sensor network routing. In: Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS 2005), pp. 599–608 (2005)Google Scholar
  9. 9.
    Kumar, A.D., Smys, S.: An energy efficient and secure data forwarding scheme for wireless body sensor network. Int. J. Netw. Virtual Organ. 21(2), 163–186 (2019)CrossRefGoogle Scholar
  10. 10.
    Dener, M.: Security analysis in wireless sensor networks. Int. J. Distrib. Sens. Netw. 10(10), 303501 (2014)CrossRefGoogle Scholar
  11. 11.
    McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)CrossRefGoogle Scholar
  12. 12.
    Laouid, A., Messai, M.L., Bounceur, A., Euler, R., Dahmani, A., Tari, A.: A dynamic and distributed key management scheme for wireless sensor networks. In: Proceedings of the International Conference on Internet of Things and Cloud Computing, ICC 2016, New York, NY, USA, pp. 70:1–70:6 (2016)Google Scholar
  13. 13.
    Tripathi, K., Pandey, M., Verma, S.: Comparison of reactive and proactive routing protocols for different mobility conditions in WSN. In: Proceedings of the International Conference on Computing, Communication and Security (ICCCS 2011), pp. 156–161 (2011)Google Scholar
  14. 14.
    Elsts, A., Selavo, L.: A user-centric approach to wireless sensor network programming languages. In: Proceedings of the 3rd International Workshop on Software Engineering for Sensor Network Applications (SESENA), pp. 29–30 (2012)Google Scholar
  15. 15.
    Udhayamoorthi, M., Senthilkumar, C., Karthik, S., Kalaikumaran, T.: An analysis of various attacks in manet. Int. J. Comput. Sci. Mob. Comput. 7, 883–887 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • T. Shanmugapriya
    • 1
    Email author
  • K. Kousalya
    • 2
  • J. Rajeshkumar
    • 1
  • M. Nandhini
    • 1
  1. 1.SNS College of TechnologyCoimbatoreIndia
  2. 2.Kongu Engineering CollegeErodeIndia

Personalised recommendations