Security Issues in Wireless Sensor Network - A Review

被引:0
作者
Grover, Jitender [1 ]
Sharma, Shikha [2 ]
机构
[1] MM Univ, Dept Comp Sci & Engn, Ambala, India
[2] IEEE Delhi Sect, Delhi, India
来源
2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) | 2016年
关键词
WSN; Security; Threats; Security Protocols;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper studies the various security issues and security threats in WSNs. Also, gives brief description of some of the protocols used to achieve security in the network. This paper also compares the proposed methodologies analytically and demonstrates the findings in a table. These findings can be used further by other researchers or Network implementers for making the WSN secure by choosing the best security mechanism.
引用
收藏
页码:397 / 404
页数:8
相关论文
共 46 条
[41]   Hierarchical and Dynamic Elliptic Curve Cryptosystem Based Self-Certified Public Key Scheme for Medical Data Protection [J].
Tseng, Chinyang Henry ;
Wang, Shiau-Huey ;
Tsaur, Woei-Jiunn .
IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (03) :1078-1085
[42]   A Hierarchical Security Framework for Defending Against Sophisticated Attacks on Wireless Sensor Networks in Smart Cities [J].
Wu, Jun ;
Ota, Kaoru ;
Dong, Mianxiong ;
Li, Chunxiao .
IEEE ACCESS, 2016, 4 :416-424
[43]   Privacy Protection for Wireless Medical Sensor Data [J].
Yi, Xun ;
Bouguettaya, Athman ;
Georgakopoulos, Dimitrios ;
Song, Andy ;
Willemson, Jan .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) :369-380
[44]   Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs [J].
Zhou, Peng ;
Jiang, Siwei ;
Irissappane, Athirai ;
Zhang, Jie ;
Zhou, Jianying ;
Teo, Joseph Chee Ming .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :613-625
[45]  
Zhu Sencun, 2010, 10 ACM C COMP COMM S, P62
[46]   Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack [J].
Zou, Yulong ;
Wang, Gongpu .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2016, 12 (02) :780-787