Security Challenges in Wireless Sensor Network: Current Status and Future Trends

被引:3
作者
Ram, G. Mohan [1 ]
Ilavarasan, E. [1 ]
机构
[1] Puducherry Technol Univ, Dept Comp Sci & Engn, Pondicherry 605014, India
关键词
Security attack; Detection; Wireless sensor network; Cryptography; Intrusion detection; Secure group management; Security properties; KEY ESTABLISHMENT; ATTACK; COMMUNICATION; PREVENTION; HOLE;
D O I
10.1007/s11277-024-11660-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
WSNs have several applications in the military, the environment, and medicine. These applications often involve tracking sensor data, such as the actions of enemies on the battlefield or the position of people within a structure. As a result, Wireless sensor network (WSN) security is of prime concern. However, WSNs face many challenges, including low computing power, low memory, tight power supplies, vulnerability to physical detection, and unreliable wireless communication paths. These problems complicate the security of WSNs. This paper is an overview of the security of WSNs. This paper explains the number of security-related issues related to WSNs, including secure routing methods, various security attacks, etc. Then, the limitation of security in WSNs is examined and contrasted as challenging. Also, the pros and cons of multiple WSN security protocols are explained. For each open research question in each sub-area, conclusions are drawn regarding possible future study directions on safety in WSNs.
引用
收藏
页码:1173 / 1202
页数:30
相关论文
共 72 条
[61]   Stochastic Gradient Descent Intrusions Detection for Wireless Sensor Network Attack Detection System Using Machine Learning [J].
Saleh, Hadeel M. ;
Marouane, Hend ;
Fakhfakh, Ahmed .
IEEE ACCESS, 2024, 12 :3825-3836
[62]   Performance evaluation of deep learning techniques for DoS attacks detection in wireless sensor network [J].
Salmi, Salim ;
Oughdir, Lahcen .
JOURNAL OF BIG DATA, 2023, 10 (01)
[63]   Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information [J].
Sarigiannidis, Panagiotis ;
Karapistoli, Eirini ;
Economides, Anastasios A. .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) :7560-7572
[64]   Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks [J].
She, Wei ;
Liu, Qi ;
Tian, Zhao ;
Chen, Jian-Sen ;
Wang, Bo ;
Liu, Wei .
IEEE ACCESS, 2019, 7 :38947-38956
[65]   A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks [J].
Shim, Kyung-Ah .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01) :577-601
[66]  
Soni Gaurav, 2021, 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN), P124, DOI 10.1109/SPIN52536.2021.9566066
[67]   A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map [J].
Wang, Feifei ;
Xu, Guoai ;
Xu, Guosheng .
IEEE ACCESS, 2019, 7 :101596-101608
[68]   A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Networks [J].
Wazid, Mohammad ;
Das, Ashok Kumar .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (03) :1165-1191
[69]   An Improved Identity-Based Encryption Scheme without Bilinear Map [J].
Zheng, Minghui ;
Zhou, Huihua ;
Cui, Guohua .
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, :374-377
[70]   A Traffic Analysis and Node Categorization- Aware Machine Learning-Integrated Framework for Cybersecurity Intrusion Detection and Prevention of WSNs in Smart Grids [J].
Zhukabayeva, Tamara ;
Pervez, Aisha ;
Mardenov, Yerik ;
Othman, Mohamed ;
Karabayev, Nurdaulet ;
Ahmad, Zulfiqar .
IEEE ACCESS, 2024, 12 :91715-91733