Wireless Sensor Security Issues on Data Link Layer: A Survey

被引:4
作者
Hasan, Muhammad Zulkifl [1 ]
Hanapi, Zurina Mohd [1 ]
Hussain, Muhammad Zunnurain [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Dept Commun Technol & Network, Serdang 43400, Selangor, Malaysia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 75卷 / 02期
关键词
Wireless sensor networks (WSN); internet of things (IoT); industrial revolution 4; 0 (IR4; 0); computer networks; network security; PROTOCOL; NETWORKS; IOT;
D O I
10.32604/cmc.2023.036444
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical assault detection, intrusion detection, and environmental monitoring. The proposed literature review presents a wide range of information on Wireless Social Networks (WSNs) and Internet of Things (IoT) frameworks. The aim is first to be aware of the existing issues (issues with traditional methods) and network attacks on WSN and IoT systems and how to defend them. The second is to review the novel work in the domain and find its limitations. The goal is to identify the area's primary gray field or current research divide to enable others to address the range. Finally, we concluded that configuration. Message Rapid Spanning Tree Protocol (RSTP) messages have higher efficiency in network performance degradation than alternative Bridge Data Unit Protocol (BPDU) forms. The research divides our future research into solutions and newly developed techniques that can assist in completing the lacking component. In this research, we have selected articles from 2015 to 2021 to provide users with a comprehensive literature overview.
引用
收藏
页码:4065 / 4084
页数:20
相关论文
共 55 条
[1]   A Survey of Physical Layer Techniques for Secure Wireless Communications in Industry [J].
Angueira, Pablo ;
Val, Inaki ;
Montalban, Jon ;
Seijo, Oscar ;
Iradier, Eneko ;
Fontaneda, Pablo Sanz ;
Fanari, Lorenzo ;
Arriola, Aitor .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (02) :810-838
[2]  
[Anonymous], About Us
[3]  
[Anonymous], 2001, 8021X2001 IEEE
[4]  
[Anonymous], 2008, P INT MULT ENG COMP
[5]  
[Anonymous], 2012, J CYBER SECUR MOBIL
[6]   Evolution of Wireless Sensor Network for Air Quality Measurements [J].
Arroyo, Patricia ;
Lozano, Jesus ;
Ignacio Suarez, Jose .
ELECTRONICS, 2018, 7 (12)
[7]   Cyber physical systems security: Analysis, challenges and solutions [J].
Ashibani, Yosef ;
Mahmoud, Qusay H. .
COMPUTERS & SECURITY, 2017, 68 :81-97
[8]  
Aura Tuomas., 2000, SECURITY PROTOCOLS W, P170, DOI [DOI 10.1007/3-540-44810-1_22, DOI 10.1007/3-540-44810-122]
[9]  
Chaudhari H.C., 2011, International Journal of Networking, Volume, V1, P04
[10]  
Christopher L., SANS I UNDERSTANDING