Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 316))

Abstract

The secured link between the sink and the sensing nodes in the WSN is a vital factor in many applicable fields. There are many applications of this network concern the human life or the national security of the countries. In this chapter, the different threats of WSN are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Roy DB, Chaki R, Chaki N (2009) A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. Int J Netw Secur Appl (IJNSA) 1(1): 44–52

    Google Scholar 

  2. Shanti N, Ganesan L, Ramar K (2009) Study of different attacks on multicast mobile ad-hoc network. J Theor Appl Inform Technol 45–51

    Google Scholar 

  3. Wei C, Xiang L, Yuebin B, Xiaopeng G (2007) A new solution for resisting gray hole attack in mobile ad-hoc networks. In: Second international conference on communications and networking in China, pp 366–370

    Google Scholar 

  4. Parsons M, Ebinger P. Performance evaluation of the impact of attacks on mobile ad-hoc networks. https://www.cse.buffalo.edu/duvms2009_submission_parsons.pdf

  5. Bloom JA, Cox IJ, Kalker T, Linnartz JPMG, Miller ML, Traw CBS (1999) Copy protection for DVD video. Proc IEEE 87:1267–1276

    Article  Google Scholar 

  6. Chen M, He Y, Lagendijk RL (2005) A fragile watermark error detection scheme for wireless video communications. IEEE Trans Multimed 7:315–329

    Google Scholar 

  7. Luis P-F, Pedro C, Juan RT-P, Fernando P-F (2006) Watermarking security: a survey. LNCS Trans Data Hiding Multimed Secur 1:41–72

    Google Scholar 

  8. Chuhong F, Kundur D, Kwong RH (2006) Analysis and design of secure watermark-based authentication systems. IEEE Trans Inf Forensics Secur 1:43–55

    Article  Google Scholar 

  9. Jani PV (2002) Security within ad-hoc networks. Position paper, PAMPAS workshop, 16/17 Sept 2002

    Google Scholar 

  10. Pathan ASK, Hyung L, Hong CS (2006) Security in wireless sensor networks: issues and challenges. In: Proceedings of 8th IEEE international conference on advanced communication technology, Phoenix Park, vol 2, pp 1043–1048

    Google Scholar 

  11. Perrig A, Przydatek B, Song D (2007) SIA: Secure Information Aggregation in sensor networks. J Comput Secur 15:69–102

    Google Scholar 

  12. Chen M, He Y, Lagendijk RL (2001) Error detection by fragile watermarking. In: Proceedings of the 22nd of the picture coding symposium, Seoul, pp 287–290

    Google Scholar 

  13. Ren X, Yu H (2006) Security mechanisms for wireless sensor networks. Int J Comput Sci Netw Secur 6:151–161

    Google Scholar 

  14. Dargie W, Poellabauer C (2010) Fundamental of wireless sensor networks theory and practice. Wiley, Series on Wireless Communications and Mobile Computing

    Google Scholar 

  15. Sastry N, Wagner D (2004) Security considerations for IEEE 802.15.4 networks. In: Proceedings of the 3rd ACM workshop on wireless security, Philadelphia

    Google Scholar 

  16. Durresi A, Paruchuri V, Kannan R, Lyengar SS (2005) Data integrity protocol for sensor networks. Int J Distrib Sens Netw 1:205–214

    Article  Google Scholar 

  17. Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F, Sichitiu M (2003) Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. In: Proceedings of international conference on compilers, architectures and synthesis for embedded systems, San Jose, pp 188–197. Sensors 2011, 11:4135

    Google Scholar 

  18. Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87:1079–1107

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Japan

About this chapter

Cite this chapter

El-Bendary, M.A.M. (2015). WSN Security Needs. In: Developing Security Tools of WSN and WBAN Networks Applications. Lecture Notes in Electrical Engineering, vol 316. Springer, Tokyo. https://doi.org/10.1007/978-4-431-55069-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-4-431-55069-3_5

  • Published:

  • Publisher Name: Springer, Tokyo

  • Print ISBN: 978-4-431-55068-6

  • Online ISBN: 978-4-431-55069-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics