Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges

被引:86
|
作者
Pundir, Sumit [1 ]
Wazid, Mohammad [1 ]
Singh, Devesh Pratap [1 ]
Das, Ashok Kumar [2 ]
Rodrigues, Joel J. P. C. [3 ,4 ]
Park, Youngho [5 ]
机构
[1] Graph Era Deemed Be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India
[2] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[3] Fed Univ Piaui UFPI, PPGEE, BR-64049550 Teresina, Brazil
[4] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[5] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
基金
新加坡国家研究基金会;
关键词
Wireless sensor network (WSN); Internet of Things (IoT); intrusion detection; cloud computing; fog computing; edge computing; security; USER AUTHENTICATION SCHEME; KEY MANAGEMENT PROTOCOL; DETECTION SYSTEM; ESTABLISHMENT SCHEME; TIME SYNCHRONIZATION; SECURITY PROTOCOLS; IOT; DESIGN; ATTACKS; PERFORMANCE;
D O I
10.1109/ACCESS.2019.2962829
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As we all know that the technology is projected to be next to humans very soon because of its holistic growth. Now-a-days, we see a lot of applications that are making our lives comfortable such as smart cars, smart homes, smart traffic management, smart offices, smart medical consultation, smart cities, etc. All such facilities are in the reach of a common man because of the advancement in Information and Communications Technology (ICT). Because of this advancement, new computing and communication environment such as Internet of Things (IoT) came into picture. Lot of research work is in progress in IoT domain which helps for the overall development of the society and makes the lives easy and comfortable. But in the resource constrained environment of Wireless Sensor Network (WSN) and IoT, it is almost inconceivable to establish a fully secure system. As we are moving forward very fast, technology is becoming more and more vulnerable to the security threats. In future, the number of Internet connected people will be less than the smart objects so we need to prepare a robust system for keeping the above mentioned environments safe and standardized it for the smooth conduction of communication among IoT objects. In this survey paper, we provide the details of threat model applicable for the security of WSN and IoT based communications. We also discuss the security requirements and various attacks possible in WSN and IoT based communication environments. The emerging projects of WSNs integrated to IoT are also briefed. We then provide the details of different architectures of WSN and IoT based communication environments. Next, we discuss the current issues and challenges related to WSN and IoT. We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis. A taxonomy of security and privacy-preservation protocols in WSN and IoT is also highlighted. Finally, we discuss some research challenges which need to be addressed in the coming future.
引用
收藏
页码:3343 / 3363
页数:21
相关论文
共 50 条
  • [1] Deployment Strategy of Wireless Sensor Networks for Internet of Things
    Liu Qiang
    Huang Xiaohong
    Leng Supeng
    Li Longjiang
    Mao Yuming
    CHINA COMMUNICATIONS, 2011, 8 (08) : 111 - 120
  • [2] A Survey on Low Power Network Protocols for the Internet of Things and Wireless Sensor Networks
    Barker, Peter
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [3] An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks
    Krishnan, Rajkumar
    Krishnan, R. Santhana
    Robinson, Y. Harold
    Julie, E. Golden
    Hoang Viet Long
    Sangeetha, A.
    Subramanian, M.
    Kumar, Raghvendra
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (04) : 3461 - 3483
  • [4] An Intrusion Detection and Prevention Protocol for Internet of Things Based Wireless Sensor Networks
    Rajkumar Krishnan
    R. Santhana Krishnan
    Y. Harold Robinson
    E. Golden Julie
    Hoang Viet Long
    A. Sangeetha
    M. Subramanian
    Raghvendra Kumar
    Wireless Personal Communications, 2022, 124 : 3461 - 3483
  • [5] The Convergence between Wireless Sensor Networks and the Internet of Things; Challenges and Perspectives: a Survey
    Ruiz, M.
    Alvarez, E.
    Serrano, A.
    Garcia, E.
    IEEE LATIN AMERICA TRANSACTIONS, 2016, 14 (10) : 4249 - 4254
  • [6] An Integrated Exploration on Internet of Things and Wireless Sensor Networks
    Saurabh Sharma
    Vinod Kumar Verma
    Wireless Personal Communications, 2022, 124 : 2735 - 2770
  • [7] An Integrated Exploration on Internet of Things and Wireless Sensor Networks
    Sharma, Saurabh
    Verma, Vinod Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (03) : 2735 - 2770
  • [8] Underwater Wireless Sensor Networks: A Survey on Enabling Technologies, Localization Protocols, and Internet of Underwater Things
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Tembine, Hamidou
    Ben-Othman, Jalel
    IEEE ACCESS, 2019, 7 : 96879 - 96899
  • [9] Analysis of the Deployment Quality for Intrusion Detection in Wireless Sensor Networks
    Assad, Noureddine
    Elbhiri, Brahim
    Faqihi, Moulay Ahmed
    Ouadou, Mohamed
    Aboutajdine, Driss
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2015, 2015
  • [10] Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues
    Priyadarshi, Rahul
    Gupta, Bharat
    Anurag, Amulya
    JOURNAL OF SUPERCOMPUTING, 2020, 76 (09): : 7333 - 7373