Security Challenges in Wireless Sensor Network: Current Status and Future Trends

被引:2
作者
Ram, G. Mohan [1 ]
Ilavarasan, E. [1 ]
机构
[1] Puducherry Technol Univ, Dept Comp Sci & Engn, Pondicherry 605014, India
关键词
Security attack; Detection; Wireless sensor network; Cryptography; Intrusion detection; Secure group management; Security properties; KEY ESTABLISHMENT; ATTACK; COMMUNICATION; PREVENTION; HOLE;
D O I
10.1007/s11277-024-11660-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
WSNs have several applications in the military, the environment, and medicine. These applications often involve tracking sensor data, such as the actions of enemies on the battlefield or the position of people within a structure. As a result, Wireless sensor network (WSN) security is of prime concern. However, WSNs face many challenges, including low computing power, low memory, tight power supplies, vulnerability to physical detection, and unreliable wireless communication paths. These problems complicate the security of WSNs. This paper is an overview of the security of WSNs. This paper explains the number of security-related issues related to WSNs, including secure routing methods, various security attacks, etc. Then, the limitation of security in WSNs is examined and contrasted as challenging. Also, the pros and cons of multiple WSN security protocols are explained. For each open research question in each sub-area, conclusions are drawn regarding possible future study directions on safety in WSNs.
引用
收藏
页码:1173 / 1202
页数:30
相关论文
共 72 条
[1]   Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges [J].
Aalsalem, Mohammed Y. ;
Khan, Wazir Zada ;
Gharibi, Wajeb ;
Khan, Muhammad Khurram ;
Arshad, Quratulain .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 113 :87-97
[2]  
Abood M. S., 2021, IOP Conference Series: Materials Science and Engineering, V1076
[3]   An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks [J].
Adil, Muhammad ;
Almaiah, Mohammed Amin ;
Alsayed, Alhuseen Omar ;
Almomani, Omar .
SENSORS, 2020, 20 (08)
[4]   Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks [J].
Ahmad, Irfan ;
Rahman, Taj ;
Zeb, Asim ;
Khan, Inayat ;
Ullah, Inam ;
Hamam, Habib ;
Cheikhrouhou, Omar .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[5]   Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks [J].
Ahutu, Ohida Rufai ;
El-Ocla, Hosam .
IEEE ACCESS, 2020, 8 (08) :63270-63282
[6]   Security and energy efficient cyber-physical systems using predictive modeling approaches in wireless sensor network [J].
Alghamdi, Abdullah ;
Al Shahrani, Ali M. ;
AlYami, Sultan Sughair ;
Khan, Ihtiram Raza ;
Sri, P. S. G. Aruna ;
Dutta, Papiya ;
Rizwan, Ali ;
Venkatareddy, Prashanth .
WIRELESS NETWORKS, 2024, 30 (06) :5851-5866
[7]  
AlZoubi W., 2022, INT J DATA NETWORK S, V6, P1413, DOI [10.5267/j.ijdns.2022.5.010, DOI 10.5267/J.IJDNS.2022.5.010]
[8]   Secure Encryption by Combining Asymmetric and Symmetric Cryptographic Method for Data Collection WSN in smart Agriculture [J].
Ametepe, Adote Francois-Xavier ;
Ahouandjinou, Semevo Arnaud R. M. ;
Ezin, Eugene C. .
2019 5TH IEEE INTERNATIONAL SMART CITIES CONFERENCE (IEEE ISC2 2019), 2019, :93-99
[9]   Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol [J].
Amish, Parmar ;
Vaghela, V. B. .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :700-707
[10]   RETRACTED: Novel Sybil attack detection using RSSI and neighbour information to ensure secure communication in WSN (Retracted Article) [J].
Angappan, Arthanareeswaran ;
Saravanabava, T. P. ;
Sakthivel, P. ;
Vishvaksenan, K. S. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (06) :6567-6578