Advertisement

Security and Privacy Issues in Wireless Sensor Networks

  • E. Golden Julie
  • Y. Harold RobinsonEmail author
Chapter
Part of the Studies in Big Data book series (SBD, volume 63)

Abstract

Today, in modern world, technology has improved a lot with wireless communication. Wireless sensor network is normally constructed without any fixed network infrastructure. It is very simple, cheap, self-organized and easy to deploy the nodes in wide range. WSN protocols are mainly designed to focus on energy efficiency and lifetime improvement. Apart from those, WSNs face so many challenges due to limited number of resources available such as memory, computing, space, and bandwidth. The main duty of sensor node is used to collect the information from the environment and transmit the data to the control unit. Due to large number of collection and transmission, they should need to protect from hacker. WSNs need to provide security in all aspects of their architecture reference model. In this chapter, the main contribution includes architecture, attacks and countermeasures.

Keywords

Wireless sensor network Self-organized Hacker and countermeasures 

References

  1. 1.
    Miller, V.S.: Use of elliptic curves in cryptography. In: Proceedings of the Advances in Cryptology- CRYPTO’85, Santa Barbara, California, USA, Springer LNCS, vol. 218, pp. 417–426 (1986)Google Scholar
  2. 2.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96–99 (1983)CrossRefGoogle Scholar
  3. 3.
    Saleh, M., Khatib, I.A.: Throughput analysis of WEP Security in Ad Hoc sensor networks. In: Proceeding of the Second International Conference on Innovations in Information Technology (IIT’05), 26–28 September, Dubai (2005)Google Scholar
  4. 4.
    Kim, C.H., Lee, S., Yang, W.I., Lee, H-W., Steganalysis on BPCS steganography. In: Pacific Rim Workshop on Digital Steganography (STEG’03), 3–4 July, Japan (2003)Google Scholar
  5. 5.
    Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(80), 102–114 (2002)CrossRefGoogle Scholar
  6. 6.
    Hussain, M., Hussain, M.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol. 54 (2013)Google Scholar
  7. 7.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)CrossRefGoogle Scholar
  8. 8.
    Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A low-energy key management protocol for wireless sensor networks. In: Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), vol. 1, pp. 335–340 (2003)Google Scholar
  9. 9.
    Rabaey, J.M., Ammer, J., Karalar, T., Li, S., Otis, B., Sheets, M., Tuan, T.: PicoRadios for wireless sensor networks: the next challenge in ultra-low power design. In: 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), vol. 1, pp. 200–201, 3–7 Feb 2002Google Scholar
  10. 10.
    Hollar, S.: COTS Dust. Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley (2000)Google Scholar
  11. 11.
    Kurak, C., McHugh, J.: A cautionary note on image downgrading in computer security applications. In: Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, pp. 153–159 (1992)Google Scholar
  12. 12.
    Mokowitz, I.S., Longdon, G.E., Chang, L.: A New paradigm hidden in steganography. In: Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, County Cork, Ireland, pp. 41–50 (2001)Google Scholar
  13. 13.
    Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, Oct 2004Google Scholar
  14. 14.
    Kobiltz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Ye, F., Lou, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: Proceedings of the IEEE INFO COM, Mar 2004Google Scholar
  16. 16.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In: Proceedings of the IEEE Symposium Security and Privacy (2004)Google Scholar
  17. 17.
    Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proceedings of the Advances in Cryptology (Crypto ’92), pp. 471–486, Apr 1992Google Scholar
  18. 18.
    Zhang, W., Subramanian, N., Wang, G.: Lightweight and compromise-resilient message authentication in sensor networks. In: Proceedings of the IEEE INFOCOM, Apr 2008Google Scholar
  19. 19.
    Perrig, R., Tygar, C. J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium Security and Privacy, May 2000Google Scholar
  20. 20.
    Albrecht, M., Gentry, C., Halevi, S., Katz, J.: Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials, Report 2009/098 (2009). http://eprint.iacr.org/
  21. 21.
    Chung, T., Roedig, U.: Efficient Key Establishment for Wireless Sensor Networks Using Elliptic Curve Diffie-Hellman (2007)Google Scholar
  22. 22.
    Wacker, A., Knoll, M., Heiber, T., Rothermel, K.: A New Approach for Establishing Pairwise Keys for Securing Wireless Sensor Networks (2005)Google Scholar
  23. 23.
    Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)Google Scholar
  24. 24.
    Strulo, B., Farr, J., Smith, A.: Securing mobile Ad hoc networks—a motivational approach. BT Technol. J. 21(3), 81–89 (2003)CrossRefGoogle Scholar
  25. 25.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile Ad Hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)CrossRefGoogle Scholar
  26. 26.
    Pathan, A-S.K., Alam, M., Monowar, M., Rabbi, F.: An efficient routing protocol for mobile Ad Hoc networks with neighbor awareness and multicasting. In: Proceedings of the IEEE E-Tech, Karachi, pp. 97–100, 31 July 2004Google Scholar
  27. 27.
    Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., Jokerst, R.M.: Analyzing interaction between distributed denial of service attacks and mitigation technologies. In: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pp. 26–36, 22–24 April 2003Google Scholar
  28. 28.
    Wang, B.-T., Schulzrinne, H.: An IP traceback mechanism for reflective DoS attacks. Can. Con. Electric. Comput. Eng. 2(2–5), 901–904 (2004)Google Scholar
  29. 29.
    Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 3rd edn., Prentice Hall (2003)Google Scholar
  30. 30.
    Harold Robinson, Y., Rajaram, M.: “Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”. Sci. World J. 1–9. (2015). https://doi.org/10.1155/2015/284276
  31. 31.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks. ACM, pp. 259–268 (2004)Google Scholar
  32. 32.
    Julie, E.G., Tamilselvi, S., Robinson, Y. H.: Performance analysis of energy efficient virtual back bone path based cluster routing protocol for WSN. Wireless Pers. Commun. 91(3), 1171–1189 Springer (2016)Google Scholar
  33. 33.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, pp. 293–315, September 2003Google Scholar
  34. 34.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, vol. 3, pp. 1976–1986, 30 March–3 April 2003Google Scholar
  35. 35.
    Robinson, Y.H., Julie, E.G., Balaji, S., Ayyasamy, A.: Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Pers. Commun. 95(2), 703–721 Springer (2017)Google Scholar
  36. 36.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 42–51 (2003)Google Scholar
  37. 37.
    Oniz, C.C, Tasci, S.E, Savas, E., Ercetin, O., Levi, A.: SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks, from http://people.sabanciuniv.edu/~levi/SeFER_EWSN.pdf
  38. 38.
    Robinson, Y.H., Julie, E.G., Saravanan, K., Kumar, R.: FD-AOMDV: Fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J. Ambient Intell. Humanized Comput. 1–18. Springer (2017) https://doi.org/10.1007/s12652-018-1126-3
  39. 39.
    Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava,M.B.: On communication security in wireless ad-hoc sensor networks. In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139–144, 10–12 June 2002Google Scholar
  40. 40.
    Balaji, S., Julie, E.G., Robinson, Y.H.: Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks. Mobile Network. Appl. 24(2), 394–406 (2019)Google Scholar
  41. 41.
    Yuan, L., Qu, G.: Design space exploration for energy-efficient secure sensor network. In: Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 88–97, 17–19 July 2002Google Scholar
  42. 42.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, pp. 162–175 (2004)Google Scholar
  43. 43.
    Younis, M., Youssef, M., Arisha, K.: Energy-aware routing in cluster-based sensor networks. In: Proceedings 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, pp. 129–136, 1–16 Oct 2002Google Scholar
  44. 44.
    Y. Harold Robinson & E. Golden Julie, MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks, pp. 1–22, Wireless Personal Communications, Springer (2019). https://doi.org/10.1007/s11277-019-06588-4
  45. 45.
    Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, RTSS 2003, pp. 286–297 (2003)Google Scholar
  46. 46.
    Krishnan, R.S., Julie, E.G., Robinson, Y.H., Kumar, R., Abdel-Basset, M., Thong, P.H.: A new algorithm for high power node multicasting in wireless sensor networks. IEEE Acc. 7, 38584–38592 (2019)Google Scholar
  47. 47.
    Hamid, M.A., Rashid, M-O., Hong, C.S.: Routing security in sensor network: hello flood attack and defense. In: To Appear in IEEE ICNEWS 2006, Dhaka, 2–4 JanuaryGoogle Scholar
  48. 48.
    Robinson, Y.H., Krishnan, R.S., Julie, E.G., Kumar, R., Thong, P.H. Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in Mobile Ad-hoc Networks. Ad Hoc Network. 93, 101896. Elseiver (2019). https://doi.org/10.1016/j.adhoc.2019.101896
  49. 49.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS’02, pp. 41–47, 18–22 Nov 2002Google Scholar
  50. 50.
    Robinson, Y.H., Julie, E.G., Kumar, R.: Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Network. Appl. 1–15 (2019). https://doi.org/10.1007/s12083-019-00758-8
  51. 51.
    Robinson, Y.H., Julie, E.G.: SMR: a Synchronized Multipath Re-broadcasting mechanism for improving the quality of conversational video service. Wireless Pers. Commun. 104(3), 1149–1173 (2019)Google Scholar
  52. 52.
    Harold Robinson, Y., Golden Julie, E., Ayyasamy, A, Archana, M.: Cluster based routing in sensor network using soft computing techniques: a survey. Asian J. Res. Soc. Sci. Humanit. 7(3), 341–360Google Scholar
  53. 53.
    Thanga Aruna, M., Golden Julie, E., Harold Robinson, Y.: A survey on techniques for selection of forwarding node in wireless sensor networks. Int. J. Adv. Comput. Electron. Eng. 2(4), 24–29 (2017)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringAnna University Regional CampusTirunelveliIndia
  2. 2.Department of Computer Science and EngineeringSCAD College of Engineering and TechnologyTirunelveliIndia

Personalised recommendations