Abstract
The security in wireless sensor networks (WSNs) is a critical issue due to the inherent limitations of computational capacity and power usage. While a variety of security techniques are being developed and a lot of research is going on in security field at a brisk pace but the fields lacks a common integrated platform which provides a comprehensive comparison of the seemingly unconnected but linked issues. In this paper, we have tried to analyze some attacks and their possible countermeasures in OSI layered manner.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public key cryptography for wireless sensor networks. In: Third IEEE Conference on Pervasive Computing and Communications (PERCOM 2005), pp. 324–328. IEEE Computer Society Press, Los Alamitos (2005)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile ad hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1), 38–47 (2004)
Carman, D., Matt, B., Balenson, D., Kruus, P.: A communications security architecture and cryptographic mechanisms for distributed sensor networks. In: DARPA SensIT Workshop. NAI Labs, The Security Research Division Network Associates, Inc. (1999)
Xiao, Y. (ed.): Security in Distributed, Grid and Pervasive Computing. Auerbach Publications, CRC Press (2006)
Ganesan, D., Cerpa, A., Yu, Y., Estrin, D.: Networking issues in wireless sensor networks. Journal of Parallel and Distributed Computing (JPDC), Special issue on Frontiers in Distributed Sensor Networks
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and Countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 293–315 (May 2003)
Sharma, K., Ghose, M.K., Kuldeep: Complete Security Framework for Wireless Networks. International Journal of Computer Science and Information Security 3(1) (2009)
Ganeriwal, S., Srivastava, M.B.: Reputation Based Framework for?High Integrity Sensor Networks. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and sensor networks, pp. 66–77. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saha, S., Bhattacharyya, D., Kim, Th. (2010). OSI Layer Wise Security Analysis of Wireless Sensor Network. In: Kim, Th., Pal, S.K., Grosky, W.I., Pissinou, N., Shih, T.K., Ślęzak, D. (eds) Signal Processing and Multimedia. MulGraB SIP 2010 2010. Communications in Computer and Information Science, vol 123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17641-8_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-17641-8_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17640-1
Online ISBN: 978-3-642-17641-8
eBook Packages: Computer ScienceComputer Science (R0)