Hybrid Radio Frequency/Free-Space Optics (RF/FSO) Wireless Sensor Network: Security Concerns and Protective Measures

  • Koushik Banerjee
  • Hemant Sharma
  • Anasuya Sengupta
Conference paper
Part of the Springer Proceedings in Physics book series (SPPHY, volume 166)


Wireless sensor networks (WSNs) are ad hoc wireless networks that are written off as spread out structure and ad hoc deployment. Sensor networks have all the rudimentary features of ad hoc networks but to altered points—for instance, considerably lesser movement and far more energy necessities. Commonly used technology for communication is radio frequency (RF) communications. Free-space optics (FSO) is relatively new technology which has the prospective to deliver remarkable increases in network lifetime of WSN. Hybrid RF/FSO communications has been suggested to decrease power consumption by a single sensor node. It is observed that security plays a very important role for either RF WSN or hybrid RF/FSO WSN as those are vulnerable to numerous threats. In this paper, various possible attacks in RF/FSO WSN are discussed and aimed to propose some way out from those attacks.


Sensor Network Sensor Node WSNWireless Sensor Network Malicious Node Route Request 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Akkaya K, Younis M (2005) A survey on routing protocols for wireless sensor networks. Ad Hoc Netw 3:325–349Google Scholar
  2. 2.
    Ahmad Salehi S et al (2013) Security in wireless sensor networks: issues and challenges. In: Proceedings of the IEEE international conference on space science and communication, pp 356–360Google Scholar
  3. 3.
    Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the 1st IEEE international workshop on sensor network protocols and application, pp 113–127Google Scholar
  4. 4.
    Shi E, Perrig A (2004) Designing secure sensor networks. Wirel Commun Mag 11(6):38–43CrossRefGoogle Scholar
  5. 5.
    Wang N et al (2006) Wireless sensors in agriculture and food industry—recent development and future perspective. Comput Electron Agric 50(1):1–14CrossRefGoogle Scholar
  6. 6.
    Shashikala, Kavitha C Dr (2012) A survey on secured routing protocols for wireless sensor network. In: Proceedings of IEEE ICCCNTGoogle Scholar
  7. 7.
    Wood AD, Stankovic JA (2002) Denial of service in sensor networks. Computer 35(10):54–60CrossRefGoogle Scholar
  8. 8.
    Dohler M (2008) Wireless sensor networks: the biggest cross-community design exercise to-date. Recent Pat Comput Sci 1(1):9–25CrossRefGoogle Scholar
  9. 9.
    Bao F, Chen R et al (2012) Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans Netw Serv Manage 9(2):169–183Google Scholar
  10. 10.
    Yin J, Madria SK (2003) A hierarchical secure routing protocol against black hole attacks in sensor networks. In: Proceedings of IEEE CCT, pp 1282–1286Google Scholar
  11. 11.
    Zhang Y, Li X et al (2011) A hierarchy-based dynamic key management for clustered wireless sensor network. Energy Procedia 13:967–7974CrossRefGoogle Scholar
  12. 12.
    Banerjee K, Sharma H, Chaurasia BK (2014) Secure communication for cluster based wireless sensor network. In: Proceedings of IEEE CICN, pp 867–871Google Scholar
  13. 13.
    Sivathasan S et al (2008) RF/FSO wireless sensor networks: a performance study. In: Proceedings of IEEE GLOBECOM, pp 1–5Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Koushik Banerjee
    • 1
  • Hemant Sharma
    • 1
  • Anasuya Sengupta
    • 1
  1. 1.ITM University (Gwalior)GwaliorIndia

Personalised recommendations