Abstract
Wireless Sensor Networks (WSNs) have become a prominent technology for many applications due to its various advantages and feasibility. It has been applied in government, military, transport, health care, education, business, and environment applications. WSN makes sensing, tracking, monitoring, and automation much simpler, effective, and efficient as compared to its predecessor technologies. Due to its vast implementations and immense potential, it has also attracted many threats and vulnerabilities along its path to advancement. This chapter reviews the existing literature and discusses the security issues related to WSN and the challenges in addressing them.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abouei, J., Brown, J. D., Plataniotis, K. N., & Pasupathy, S. (2011). Energy efficiency and reliability in wireless biomedical implant systems. IEEE Transactions on Information Technology in Biomedicine, 15, 456–466.
Almasri, M., Elleithy, K., Bushang, A., & Alshinina, R. (2013). Terp: A trusted and energy efficient routing protocol for wireless sensor networks (WSNs). In Proceedings of the 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications, 2013 (pp. 207–214). IEEE Computer Society.
Amini, F., Mišic, V. B., & Mišic, J. (2007). Intrusion detection in wireless sensor networks. Security in Distributed, Grid, Mobile, and Pervasive Computing, pp. 111
Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., & Lee, I. (2006). Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems
Anderson, R., Chan, H., & Perrig, A. (2004). Key infection: Smart trust for smart dust. In. ICNP 2004. Proceedings of the 12th IEEE International Conference on Network Protocols, 2004 (pp. 206–215). New York: IEEE.
Araujo, A., Blesa, J., Romero, E., & Villanueva, D. (2012). Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP Journal of Wireless Communications and Networking, 2012, 48.
Ashraf, N., Bohnet, I., & Piankov, N. (2006). Decomposing trust and trustworthiness. Experimental Economics, 9, 193–208.
Baig, W. A., Khan, F. I., Kim, K.-H., & Yoo, S.-W. (2012). Privacy assuring protocol using simple cryptographic operations for smart metering. International Journal of Multimedia and Ubiquitous Engineering, 7, 315–322.
Bao, F., Chen, I.-R., Chang, M., & Cho, J.-H. (2011a). Hierarchical trust management for wireless sensor networks and its application to trust-based routing. In Proceedings of the 2011 ACM Symposium on Applied Computing (pp. 1732–1738). ACM, New York.
Bao, F., Chen, R., Chang, M., & Cho, J.-H. (2011b). Trust-based intrusion detection in wireless sensor networks. In 2011 IEEE International Conference on Communications (ICC) (pp. 1–6). New York: IEEE.
Bao, F., Chen, R., Chang, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9, 169–183.
Becher, A., Benenson, Z., & Dornseif, M. (2006). Tampering with Motes: Real-world physical attacks on wireless sensor networks. In J. A. Clark, R. F. PAIGE, F. A. C. Polack, & P. J. Brooke (Eds.), Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18–21, 2006. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg.
Benenson, Z., Cholewinski, P. M., & Freiling, F. C. (2008). Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, pp. 22–43.
Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In IEEE Symposium on Security and Privacy (pp. 164–173). New York: IEEE.
Blilat, A., Bouayad, A., El Houda Chaoui, N., & Ghazi, M. (2012). Wireless sensor network: Security challenges. In 2012 National Days of Network Security and Systems (JNS2), 2012 (pp. 68–72). New York: IEEE.
Boukerch, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30, 2413–2427.
Boukerche, A., Oliveira, H., Nakamura, E. F., & Loureiro, A. A. (2008). Secure localization algorithms for wireless sensor networks. IEEE Communications Magazine, 46, 96–101.
Byers, J., & Nasser, G. (2000). Utility-based decision-making in wireless sensor networks. In 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing, 2000. MobiHOC (pp. 143–144). New York: IEEE.
Cardenas, A., Amin, S., & Sastry, S. (2008). Secure control towards survivable cyber-physical systems. In 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS ‘08. Beijing: IEEE.
Che, S., Feng, R., Liang, X., & Wang, X. (2015). A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Security and Communication Networks, 8, 168–175.
Chen, H., Gu, G., Wu, H., & Gao, C. (2007a). Reputation and trust mathematical approach for wireless sensor networks. International Journal of Multimedia and Ubiquitous Engineering, pp. 23–32.
Chen, H., Wu, H., Zhou, X., & Gao, C. (2007b). Reputation-based trust in wireless sensor networks. In International Conference on Multimedia and Ubiquitous Engineering, 2007. MUE’07 (pp. 603–607). New York: IEEE.
Choi, J.-H., Choi, C., Ko, B.-K., & Kim, P.-K. (2012). Detection of cross site scripting attack in wireless networks using n-Gram and SVM. Mobile Information Systems, 8, 275–286.
Cinque, M., Cotroneo, D., De Caro, G., & Pelella, M. (2006). Reliability requirements of wireless sensor networks for dynamic structural monitoring. In International Workshop on Applied Software Reliability (WASR 2006) (pp. 8–13).
Cowan, C., Wagle, P., Pu, C., Beattie, S., & Walpole, J. (2000). Buffer overflows: Attacks and defenses for the vulnerability of the decade. In Proceedings of DARPA Information Survivability Conference and Exposition, 2000. DISCEX’00 (pp. 119–129). New York: IEEE.
Crosby, G. V., Hester, L., & Pissinou, N. (2011). Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. IJ Network Security, 12, 107–117.
Crosby, G. V., & Pissinou, N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Consumer Communications and Networking Conference
Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70, 189–205.
Du, X., Xiao, Y., Chen, H. H., & Wu, Q. (2006). Secure cell relay routing protocol for sensor networks. Wireless Communications and Mobile Computing, 6, 375–391.
Egan, D. (2005). The Emergence of ZigBee in building automation and industrial controls. Computing and Control Engineering, 16, 14–19.
Estrin, D., Govindan, R., Heidemann, J., & Kumar, S. (1999). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 263–270). New York: ACM.
Fatema, N., & Brad, R. (2014). Attacks and counterattacks on wireless sensor networks. arXiv preprint arXiv:1401.4443.
Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007 (pp. 25–30). New York: IEEE.
Fraley, C. (1998). Algorithms for model-based Gaussian hierarchical clustering. SIAM Journal on Scientific Computing, 20, 270–281.
Franzèn, J. (2008). Bayesian cluster analysis. Ph.D. Doctrate, Stockholm.
Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4, 15.
Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14, 279–298.
Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 80, 602–617.
Hardin, R. (2002). Trust and trustworthiness. Russell Sage Foundation.
Hsu, M.-T., Lin, F. Y.-S., Chang, Y.-S., & Juang, T.-Y. (2007). The reliability of detection in wireless sensor networks: Modeling and analyzing. In Embedded and ubiquitous computing. Berlin: Springer.
Huang, S.-I., Shieh, S., & Tygar, J. (2010). Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16, 915–927.
Jadidoleslamy, H. (2014). A comprehensive comparison of attacks in wireless sensor networks. International Journal of Computer Communications and Networks (IJCCN), 4.
Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings. 24th International Conference on Distributed Computing Systems Workshops, 2004 (pp. 588–593). New York: IEEE.
Jsang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference (pp. 41–55).
Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The Eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web, 2003 (pp. 640–651). New York: ACM.
Karthik, N., & Karthik, J. (2014). Trust worthy framework for wireless sensor networks. International Journal of Computer Science & Engineering Technology (IJCSET), 5, 478–480.
Kaur, D., & Singh, P. (2014). Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack. International Journal on Network Security, 5(1), 6.
Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6, 669–688.
Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. World Academy of Science, Engineering and Technology, 42, 63–66.
Kinney, P. (2003). Zigbee technology: Wireless control that simply works. In Communications Design Conference (pp. 1–7).
Kumar, V., Jain, A., & Barwal, P. (2014). Wireless sensor networks: Security issues, challenges and solutions. International Journal of Information & Computation Technology, pp. 0974–2239.
Lee, K. (2000). IEEE 1451: A standard in support of smart transducer networking. In Instrumentation and Measurement Technology Conference, 2000. IMTC 2000. Proceedings of the 17th IEEE, 2000 (pp. 525–528). New York: IEEE.
Lewis, F. L. (2004). Wireless sensor networks, smart environments: Technologies, protocols, and applications (pp. 11–46).
Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, pp. 924–935.
Li, Z., & Gong, G. (2008). Survey on security in wireless sensor. Special English Edition of Journal of KIISC, 18, 233–248.
Liu, A. X., Kovacs, J. M., Huang, C.-T., & Gouda, M. G. A secure cookie protocol. In Proceedings of 14th International Conference on Computer Communications and Networks, 2005, San Diego, California, USA (pp. 333–338). New York: IEEE.
Liu, Z., Joy, A. W., & Thompson, R. A. (2004). A dynamic trust model for mobile ad hoc networks. In Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004 (pp. 80–85). New York: IEEE.
Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33, 1086–1093.
Lopez, J., Roman, R., & Alcaraz, C. (2009). Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of security analysis and design V. Berlin: Springer.
López, J., & Zhou, J. (2008). Wireless sensor network security. Amsterdam: IOS Press.
Lynch, C. (1999). Canonicalization: A fundamental tool to facilitate preservation and management of digital information. D-Lib Magazine, 5, 17–25.
Mahmood, M. A., Seah, W. K., & Welch, I. (2015). Reliability in wireless sensor networks: A survey and challenges ahead. Computer Networks, 79, 166–187.
Mármol, F. G., & Pérez, G. M. (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In IEEE International Conference on Communications, 2009 (pp. 1–5). ICC’09. New York: IEEE.
Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32, 185–196.
Miao, C.-Y., Dai, G.-Y., & Chen, Q.-Z. (2015). Cooperative localization and location verification in WSN. In Human centered computing. Berlin: Springer.
Mohammadi, S., & Jadidoleslamy, H. (2011a). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.
Mohammadi, S., & Jadidoleslamy, H. (2011b). A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks, 2, 24–42.
Momani, M., Aboura, K., & Challa, S. (2007a). RBATMWSN: Recursive Bayesian approach to trust management in wireless sensor networks.
Momani, M., & Challa, S. (2008). GTRSSN: Gaussian trust and reputation system for sensor networks. In Advances in computer and information sciences and engineering. Berlin: Springer.
Momani, M., & Challa, S. (2010). Survey of trust models in different network domains. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 1, 1–19.
Momani, M., Challa, S., & Aboura, K. (2007b). Modelling trust in wireless sensor networks from the sensor reliability prospective. In Innovative algorithms and techniques in automation, industrial electronics and telecommunications. Berlin: Springer
Momani, M., Challa, S., & Alhmouz, R. (2008). Can we trust trusted nodes in wireless sensor networks? In International Conference on Computer and Communication Engineering, 2008. ICCCE 2008 (pp. 1227–1232). New York: IEEE.
Naseer, A. (2012). Reputation system based trust-enabled routing for wireless sensor networks. INTECH Open Access Publisher.
Ngai, E.-H., & Lyu, M. R. (2004). Trust-and clustering-based authentication services in mobile ad hoc networks. In Proceedings of 24th International Conference on Distributed Computing Systems Workshops, 2004 (pp. 582–587). New York: IEEE.
Patil, V. S., Bamnote, G. R., & Nair, S. S. (2011). Cross site scripting: An overview. In IJCA Proceedings on International Symposium on Devices MEMS, Intelligent Systems and Communication, (pp. 19–22), Sikkim, India.
Pereira, P. R., Grilo, A., Rocha, F., Nunes, M. S., Casaca, A., Chaudet, C., et al. (2007). End-to-end reliability in wireless sensor networks: Survey and research challenges. In EuroFGI Workshop on IP QoS and Traffic Control (pp. 67–74).
Pirzada, A. A., & Mcdonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Conference on Computer science-Volume 26, 2004 (pp. 47–54). Australian Computer Society, Inc.
Probst, M. J., & Kasera, S. K. (2007). Statistical trust establishment in wireless sensor networks. In 2007 International Conference on Parallel and Distributed Systems (pp. 1–8). New York: IEEE.
Reddy, Y., & Selmic, R. (2011). Agent-based trust calculation in wireless sensor networks. In SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications (pp. 334–339).
Rehana, J. (2009). Security of wireless sensor network. Helsinki University of Technology, Technical report.
Reshmi, V., & Sajitha, M. (2014). A survey on trust management in wireless sensor networks. International Journal of Computer Science & Engineering Technology, 5, 104–109.
Sabeel, U., Maqbool, S., & Chandra, N. (2013). Categorized security threats in the wireless sensor networks: Countermeasures and security management schemes. International Journal of Computer Applications, 64, 19–28.
Sarma, H. K. D., & Kar, A. (2006) Security threats in wireless sensor networks. In Proceedings 2006 40th Annual IEEE International, Carnahan Conferences Security Technology (pp. 243–251). New York: IEEE.
Sarma, H. K. D., & Kar, A. (2008). Security threats in wireless sensor networks. IEEE Aerospace and Electronic Systems Magazine, 23, 39–45.
Sastry, A. S., Sulthana, S., & Vagdevi, S. (2013). Security threats in wireless sensor networks in each layer. International Journal of Advanced Networking and Applications, 4, 1657.
Shaikh, R. A., Jameel, H., D’Auriol, B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20, 1698–1712.
Shannon, C. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27, 379–423 & 623–656.
Silberman, P., & Johnson, R. (2004). A comparison of buffer overflow prevention implementations and weaknesses. In IDEFENSE, August.
Singh, H., Agrawal, M., Gour, N., & Hemrajani, N. (2014). A study on security threats and their countermeasures in sensor network routing. Prevention, 3.
Singh, M., Sardar, A. R., Sahoo, R. R., Majumder, K., Ray, S., & Sarkar, S. K. (2015). Lightweight trust model for clustered WSN. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 765–773). Berlin: Springer.
Sorniotti, A., Gomez, L., Wrona, K., & Odorico, L. (2007). Secure and trusted in-network data processing in wireless sensor networks: A survey. Journal of Information Assurance and Security, 2, 189–199.
Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed reputation-based beacon trust system. In 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006 (pp. 277–283). New York: IEEE.
Srinivasan, A., Teitelbaum, J., Wu, J., Cardei, M., & Liang, H. (2009). Reputation-and-trust-based systems for ad hoc networks. In Algorithms and protocols for wireless and mobile ad hoc networks, pp. 375.
Srivastava, S., & Johri, K. (2012). A survey on reputation and trust management in wireless sensor network. International Journal of Scientific Research Engineering & Technology, 1, 139–149.
Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks, 9, 1103–1113.
Undercoffer, J., Avancha, S., Joshi, A., & Pinkston, J. (2002). Security for sensor networks. In CADIP Research Symposium. Citeseer (pp. 25–26).
Virmani, D., Soni, A., Chandel, S., & Hemrajani, M. (2014). Routing attacks in wireless sensor networks: A survey. arXiv preprint arXiv:1407.3987.
Wang, C., Sohraby, K., Li, B., Daneshmand, M., & Hu, Y. (2006a). A survey of transport protocols for wireless sensor networks. IEEE Network, 20, 34–40.
Wang, C., Sohraby, K., Li, B., & Tang, W. (2005). Issues of transport control protocols for wireless sensor networks. In Proceedings of International Conference on Communications, Circuits and Systems (ICCCAS) (pp. 422–426).
Wang, N., Gao, L., & Wu, C. (2014). A light-weighted data trust model in WSN. International Journal of Grid & Distributed Computing, 7.
Wang, Y., Attebury, G., & Ramamurthy, B. (2006b). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.
Willig, A., & Karl, H. (2005). Data transport reliability in wireless sensor networks. A survey of issues and solutions. Praxis der Informationsverarbeitung und Kommunikation, 28, 86–92.
Wright, S. (2010). Trust and trustworthiness. Philosophia, 38, 615–627.
Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: A survey. In Network security. Berlin: Springer
Yang, S.-H. (2014). Wireless sensor networks, principles, design and applications. London: Springer.
Yang, S.-H., & Cao, Y. (2008). Networked control systems and wireless sensor networks: Theories and applications.
Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292–2330.
Yin, J., & Madria, S. K. (2006). SecRout: A secure routing protocol for sensor networks. In 20th International Conference on Advanced Information Networking and Applications, 2006. AINA 2006 (pp. 6). New York: IEEE.
Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98, 1755–1772.
Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks attack analysis and countermeasures. Journal of Network and Computer Application, 35, 867–880.
Zhan, G., Shi, W., & Deng, J. (2009). SensorTrust: A resilient trust model for WSNs. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, 2009 (pp. 411–412). New York: ACM.
Zhang, W., Das, S. K., & Liu, Y. (2006a). A trust based framework for secure data aggregation in wireless sensor networks. In 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006. SECON’06 (pp. 60–69). New York: IEEE.
Zhang, Y., Liu, W., Fang, Y., & Wu, D. (2006b). Secure localization and authentication in ultra-wideband sensor networks. IEEE Journal on Selected Areas in Communications, 24, 829–835.
Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. In International Conference on Systems and Networks Communications, 2006. ICSNC’06 (pp. 40–40). New York: IEEE.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K. (2018). Wireless Sensor Network Security for Cyber-Physical Systems. In: Cyber Security for Cyber Physical Systems. Studies in Computational Intelligence, vol 768. Springer, Cham. https://doi.org/10.1007/978-3-319-75880-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-75880-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75879-4
Online ISBN: 978-3-319-75880-0
eBook Packages: EngineeringEngineering (R0)