Abstract
From the past decade, Wireless sensor networks (WSNs) spread out significantly with the result of technological progress in hardware, software, and micro electro mechanical systems. With the enlargement of WSNs, great advances have been shaped in Internet-of-Things (IoT) by an ample variety of applications. IoT applications practiced in myriad phases include human life, ecological supervise, public wellbeing and medical behavior, smart shipping, traffic monitoring, smart cities, smart home applications, smart grid, and others. Mostly Internet of Things maintained with various sensing devices and technologies such as Sensors, GPS (Global positioning system), laser sensor, gas inductor, RFID (Radio-frequency identification devices), infrared sensor and many more, which collects large range features from the real world and send abstract feature objects which need to be monitored. Most of the devices are linked and interacted with more than one. The main idea behind IoT is to connect device-to-device, device-to-human, human-to-human. Development of IoT can make people live in a convenient way; however, it does not make sure the security of secret confidential information of its user. With a great collection of distribution, responsiveness and somewhat high processing capacity of IoT objects formed them as an optimal objective for cyber-attacks. So here some probabilities, secret confidential information may be a leak or stolen some point in time. Just once a sign of IoT device is captured or suspended it intention straightforwardly perturbs the security about whole information of IoT. Moreover, enormous IoT nodes accumulate a large amount of extensive prosperous, private information and process it, so its like lottery for cyber attackers to steal entire important data. Security obstacles like privacy, secure communication, access control, safe storage of data are becoming important tackles in the IoT domain. Hence, each solitary node that we positioned, each solitary device that we discover, each solitary byte that generated within the sphere of an IoT domain, at some point of time comes under inspection in the course of the investigation. An IoT not including proper premeditated solutions for security issues it will principally limit its improvement. So securities, in particular, the ability to detect malicious nodes with preserving support of malicious activities appear as a priority in the successful employment of IoT networks. IoT has three dissimilar layers, each layers security approaches along with defensive methods are briefly described. Blockchain technology will progress the integrity in the real world shared data sets. Primarily blockchain applied in support of recording fiscal transactions where connections encoded (pre-arranged) and kept back with participants, on one occasion transaction confirmed by blockchain it cannot be modeled or else wipe out; if any modification is applied it is easy to map out and recognize. Blockchain technology position in IoT security, challenges, and Research problems in brief discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gen. Comput. Syst. 82, 395–411 (2015)
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Netw. 20, 2481–2501 (2014)
Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: a top-down survey. Comput. Netw. 1–24 (2018)
Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in Internet of Things. Digit. Commun. Netw. (2017). https://doi.org/10.1016/j.dcan.2017.04.003
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146 (2015)
Zhao, K., Ge, L.: A survey on the Internet of Things security. In: 2013 Ninth International Conference on Computational Intelligence and Security (2013)
Bhanu chander, Kumaravelan: Simple and secure authentication in wireless sensor network using digital certification. Int. J. Pure Appl. Math. 119(16), 137–143 (2018)
Bhanu chander, Kumaravelan: Introduction to WSN. Soft Computing in WSN. CRC Press/Taylor and Francis Publications (2018)
Sen, J.: Security in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1 & 2) (2014)
Alam, S., De, D.: Analysis of security threats in wireless sensor network. Int. J. Wireless Mob. Netw. (IJWMN) 6(2) (2014)
Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4(1 & 2) (2009)
Akyildiz, I.F., Su, W., Sanakarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Hamad, F., Smalov, L., James, A.: Energy-aware security in M-Commerce and the internet of things. IETE Tech. Rev. 26(5), 357–362 (2009)
Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Proceedings of Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 196–200 (2006)
Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of Mobile Communications, pp. 128–139 (2008)
Montenegro, G., Castelluccia, C.: Crypto-based identifiers (CBIDs): concepts and applications. ACM Trans. Inf. Syst. Secur. 7(1), 97–127 (2004)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. Secur. Pervas. Comput. 201–212 (2004)
Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 103–111 (2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, p. 82. MIT, Cambridge, MA (2003)
Lakafosis, V., Traille, A., Lee, H.: RFID-CoA: the RFID tags as certificates of authenticity. In: Proceedings of the IEEE International Conference on RFID, pp. 207–214 (2011)
Hu, F., Wang, F.: Study of recent development about privacy and security of the internet of things. In: Proceedings of the International Conference on Web Information Systems and Mining, pp. 91–95 (2010)
Lv, B.Y., Pan, J.X., Ma, Q., Xiao, Z.H.: Research progress and application of RFID anti-collision algorithm. In: Proceedings of the International Conference on Telecommunication Engineering, vol. 48, no. 7, pp. 124–128 (2008)
Finkenzeller, K.: RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd edn. Wiley, West Sussex (2003)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, pp. 162–175 (2004)
Chen, M., Lai, C., Wang, H.: Mobile multimedia sensor networks: architecture and routing. EURASIP J. Wireless Commun. Netw. 1–9 (2011)
Han, K., Luo, J., Liu, Y., Vasilakos, V.: Algorithm design for data communications in duty-cycled wireless sensor networks: a survey. IEEE Commun. Mag. 51(7), 107–113 (2013)
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks SECON04, pp. 71–80 (2004)
Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Netw. 1(1), 175–192 (2003)
Huang, C.H., Du, D.Z.: New constructions on broadcast encryption and key pre-distribution schemes. In: IEEE INFOCOM, pp. 515–523 (2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 197–213 (2003)
Ren, F.Y., Huang, H.N., Lin, C.: Wireless sensor networks. J. Softw. 1282–1290 (2003)
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)
Cao, Z., Hu, J.B., Chen, Z., Xu, M.X., Zhou, X.: Feedback: towards dynamic behavior and secure routing in wireless sensor networks. In: Proceedings of the IEEE Workshop on Pervasive Computing and Ad-hoc Communication (PCAC’06), vol. 2, pp. 160–164 (2006)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)
Douceur, J.R.: The Sybil attack. In: Proceeding of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), pp. 251–260 (2002)
KSW Microtec AG: KSW—TempSens (2013). http://www.ksw-microtec.de/www/doc/overviewtempsens1124436343en.pdf. Accessed 12 Oct
Wang, K., Bao, J., Wu, M., Lu, W.: Research on security management for internet of things. In: Proceeding of the IEEE International Conference on Computer Application and System Modeling (ICCASM), vol. 15, pp. 133–137 (2010)
Zhang, L., Wang, Z.: Integration of RFID into wireless sensor networks: architectures, opportunities and challenging problems. In: Proceeding of the IEEE Fifth International Conference on Grid and Cooperative Computing Workshops GCCW ‘06 (58), pp. 463–469 (2006)
Li, C., Chen, C.L.: A multi-stage control method application in the fight against phishing attacks. In: Proceeding of the 26th Computer Security Academic Communication Across the Country, pp. 145–153 (2011)
Liu, Z.Y., Yang, Z.C.: Ad hoc network and security analysis. Comput. Technol. Dev. 16(1) (2006)
Avudainayagam, A., Lou, W., Fang, Y.: DEAR: a device and energy aware routing protocol for heterogeneous ad hoc networks. Parallel Distrib. Comput. 63(2), 228–236 (2003)
Yang, Z.W.: Look the internet of things from the internet and 3G. Radio frequency (rf) in the world, (01) (2010)
Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on fuzzy-AHP method. In: Proceeding of the IEEE International Conference on E-Business and E-Government (ICEE), pp. 1–5 (2011)
Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 557–570 (2002)
de Saint-Exupery, A.: Internet of things [EB/OL]. http://www.sintef.no/upload/IKT/9022/CERP-IoT%20SRA_IoT_vll_pdf.pf. Accessed 12 Oct 2013
Zhang, D., Zhou, J., Guo, M., Cao, J., Li, T.: TASA: tag-free activity sensing using RFID tag arrays. IEEE Trans. Parallel Distrib. Syst. 22(4), 558–570 (2011)
Zai, L., Liu, S.D., Hu, X.B.: ZigBee Technology and Application. Beijing University of Aeronautics and Astronautics Press, Beijing (2007)
Shao, P.F., Wang, Z., Zhang, B.R.: Smart home system research for the mobile internet. Comput. Meas. Control 20(2), 474–476 (2012)
Da Costa Júnior, E.P.: An Architecture for Self-adaptive Distributed Firewall
Li, B., Lu, R., Wang, W., Choo, K.-K.R.: Distributed host-based collaborative detection for false data injection attacks in smart grid cyberphysical system. J. Parallel Distrib. Comput. 103, 32–41 (2017)
Almotiri, S.H., Khan, M.A., Alghamdi, M.A.: Mobile health (m-Health) system in the context of IoT. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, pp. 39–42 (2016)
Papastergiou, S., Polemi, N., Karantjias, A.: CYSM: an innovative physical/cyber security management system for ports. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 219–230 (2015)
Wang, X., Zha, X., Ni, W.: Survey on block chain for Internet of Things. Comput. Commun. (2019). https://doi.org/10.1016/j.comcom.2019.01.006
Ejaz, W., Anpalagan, A.: Internet of Things for Smart Cities. Springer Briefs in Electrical and Computer Engineering (2017). https://doi.org/10.1007/978-3-319-95037-2_5
Efanov, D., Roschin, P.: The all-pervasiveness of Blockchain Technology. In: 8th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2017. Procedia Computer Science, pp. 116–121 (2018)
Gordon, W.J., Catalini, C.: Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)
Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for internet of things security: a position paper. Digit. Commun. Netw. 149–160 (2018)
Rennock, M.J.W., Cohn, A., Butcher, J.R.: Blockchain Technology and Regulatory Investigation, February/March 2018 | Practical Law© 2018 Thomson Reuters (2018)
Nuce, M.: Blockchain and Data Sharing. CSCMP Hot Topics, April 6 (2018)
Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future to Internet of Things security: a position paper. Digit. Commun. Netw. (2017). https://doi.org/10.1016/j.dcan.2017.10.006
Zhang, P., White, J., Schmidt, D.C., Lenz, G., Trent Rosenbloom, S.: FHIRChain: applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16, 267–278 (2018)
Greenspan, G.: Blockchains vs centralized databases (2018). Available at https://www.multichain.com/blog/2016/03/blockchains-vs-centralized-databases. Accessed 16 Jul 2018
Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., Wang, F.: Secure and trustable electronic medical records sharing using blockchain. arXiv preprint arXiv:1709.06528 (2017)
Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2(1), 24 (2016)
Zhang, Y., Wen, J.: The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 1–12 (2016)
Jin, Y., Tomoishi, M., Matsuura, S.: Enhancement of VPN authentication using GPS information with geo-privacy protection. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2016)
Keshri, A., Singh, S., Agarwal, M., Nandiy, S.K.: DoS attacks prevention using IDS and data mining. In: 2016 International Conference on Accessibility to Digital World (ICADW), Guwahati, pp. 87–92 (2016)
Filipek, J., Hudec, L.: Securing mobile ad hoc networks using distributed firewall with PKI. In: 2016 IEEE 14th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herlany, pp. 321–325 (2016)
Dewanjee, R.: Intrusion Filtration System (IFS)-mapping network security in new way. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 527–531 (2016)
Kalnoor, G., Agarkhed, J.: Pattern matching intrusion detection technique for Wireless Sensor Networks. In: 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-informatics (AEEICB), Chennai, pp. 724–728 (2016)
Yacchirena, A., Alulema, D., Aguilar, D., Morocho, D., Encalada, F., Granizo, E.: Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. In: 2016 IEEE International Conference on Automatica (ICA-ACCA), Curico, pp. 1–7 (2016)
Jokar, P., Leung, V.: Intrusion detection and prevention for ZigBee-based home area networks in smart grids. In: IEEE Transactions on Smart Grid (2017)
Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: MADAM: effective and efficient behavior-based android malware detection and prevention. In: IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 1–12 (2017)
Osop, H., Sahama, T.: Quality evidence, quality decisions: ways to improve security and privacy of EHR systems. In: 2016 IEEE 18th International Conference on eHealth Networking, Applications and Services (Healthcom), Munich, pp. 1–6 (2016)
Sharma, A., Bhuriya, D., Singh, U.: Secure data transmission on MANET by hybrid cryptography technique. In: 2015 International Conference on Computer, Communication and Control (IC4), Indore, pp. 1–6 (2015)
Indumathi, G., Sakthivel, S.: Securely detecting an intruders in MANETs system. In: International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–5 (2014)
Hiran, R., Carlsson, N., Shahmehri, N.: PrefiSec: a distributed alliance framework for collaborative BGP monitoring and prefix-based security. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS ‘14). ACM, New York, NY, USA, pp. 3–12 (2014)
Wagner, C.: MISP: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM (2016)
Bouchami, A., Goettelmann, E., Perrin, O., Godart, C.: Enhancing access-control with risk-metrics for collaboration on social cloud-platforms. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, pp. 864–871 (2015)
Bennaceur, A., Bandara, A.K., Jackson, M., Liu, W., Montrieux, L., Tun, T.T., Yu, Y., Nuseibeh, B.: Requirements-driven mediation for collaborative security. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems (SEAMS 2014), pp. 37–42. ACM, New York, NY, USA (2014)
Arya, N., Singh, U., Singh, S.: Detecting and avoiding of wormhole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm. In: 2015 International Conference on Computer, Communication and Control (IC4), Indore, pp. 1–5 (2015)
Pan, X., Yegneswaran, V., Chen, Y., Porras, P., Shin, S.: HogMap: using SDNs to incentivize collaborative security monitoring. In: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security ‘16), pp. 7–13. ACM, New York, NY, USA (2016)
Gaurav, K., Goyal, P., Agrawal, V., Rao, S.L.: IoT transaction security. In: 5th International Conference on the Internet of Things (IoT), Seoul, South Korea (2015)
Hashemi, S.H., Faghri, F., Rausch, P., Campbell, R.H.: World of empowered IoT users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 13–24. IEEE (2016). https://doi.org/10.1109/iotdi.2015.39
Atzori, M.: Blockchain-based architectures for the internet of things: a survey (2017). Available at SSRN: https://ssrn.com/abstract=2846810
Kokoris-Kogias, L., Gasser, L., Khoffi, I., Jovanovic, P., Gailly, N., Ford, B.: Managing identities using blockchains and CoSi. In: 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), EPFL-TALK-220210 (2016)
Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016). https://doi.org/10.1007/s10916-016-0574-6
Conoscenti, M., Vetrò, A., De Martin, J.C.: Block Chain for the Internet of Things: A Systematic Literature Review, pp. 1–6 (2016)
Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392–1393. IEEE (2016). https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198
Hardjono, T., Smith, N.: Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 29–36. ACM (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bhanu chander, Kumaravelan Gopalakrishnan (2020). Security Vulnerabilities and Issues of Traditional Wireless Sensors Networks in IoT. In: Peng, SL., Pal, S., Huang, L. (eds) Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. Intelligent Systems Reference Library, vol 174. Springer, Cham. https://doi.org/10.1007/978-3-030-33596-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-030-33596-0_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33595-3
Online ISBN: 978-3-030-33596-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)