Investigating the Prevalent Security Techniques in Wireless Sensor Network Protocols

被引:0
作者
O'Mahony, George D. [1 ]
Harris, Philip J. [2 ]
Murphy, Colin C. [1 ]
机构
[1] Univ Coll Cork, Dept Elect & Elect Engn, Cork, Ireland
[2] United Technol Res Ctr Ireland UTRC I, Cork, Ireland
来源
2019 30TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC) | 2019年
关键词
Interference; Intrusion; IoT; MAC; Packet; PHY; Protocol; Security; & WSN; ATTACKS;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The radio architectures of and protocols used by wireless sensor networks (WSNs) are, typically, very similar and are based on IEEE 802.15.4. By concentrating on this standard and the associated employed security techniques, the possibility of designing a transferable safety and privacy enhancement across protocols and services, becomes a reality. WSN applications have expanded significantly over the past decade or so and adopt commercial off-the-shelf (COTS) devices and publicly available standards, which inherently creates intruder incentives and security challenges. Securing WSNs is a critical requirement due to the challenging burden of protecting the transmitted sensitive information across various applications, while operating under unique security vulnerabilities and a fluctuating radio frequency (RF) spectrum and physical environment. Couple this aspect with establishing a level of trust among network nodes, while providing resilience to interference, it becomes clear that maintaining security is challenging. This paper identifies unique vulnerabilities in WSNs, which have a direct impact on privacy and safety. The prevalent security techniques used in the common PHY and MAC layers of various WSN protocols are discussed in terms of providing the essential security requirements. An experimental visualization of the coexistence issues in the industrial, scientific and medical (ISM) RF band, which is integral for IoT operations, is provided as an introduction to a new perspective on attacking WSNs. Fundamental attack styles and spectrum sharing/coexistence based intrusions are presented. Typical methods, which use COTS devices and open source software to exploit WSN security holes, are also discussed.
引用
收藏
页数:6
相关论文
共 16 条
[1]   DDoS attacks in WSNs: detection and countermeasures [J].
Abidoye, Ademola P. ;
Obagbuwa, Ibidun C. .
IET WIRELESS SENSOR SYSTEMS, 2018, 8 (02) :52-59
[2]  
Addaim Adnane, 2014, International Journal of Computer and Communication Engineering, V3, P310, DOI 10.7763/IJCCE.2014.V3.341
[3]  
Dragana C, 2017, INT C CONTROL DECISI, P359, DOI 10.1109/CoDIT.2017.8102618
[4]  
Farahani S., 2008, ZIGBEE WIRELESS NETW
[5]  
Forster A., 2016, Introduction to Wireless Sensor Networks
[6]  
IEEE, 2015, IEEE STAND LOW RAT W
[7]  
O'Mahony GD, 2018, 2018 INT CARNAHAN C, P1
[8]   Wireless Network Design for Control Systems: A Survey [J].
Park, Pangun ;
Ergen, Sinem Coleri ;
Fischione, Carlo ;
Lu, Chenyang ;
Johansson, Karl Henrik .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (02) :978-1013
[9]  
Ramson SRJ, 2017, 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN ELECTRICAL, ELECTRONICS, INSTRUMENTATION AND MEDIA TECHNOLOGY (ICIEEIMT), P325, DOI 10.1109/ICIEEIMT.2017.8116858
[10]   Denial-of-service in wireless sencsor networks: Attacks and defenses [J].
Raymond, David R. ;
Midkiff, Scott F. .
IEEE PERVASIVE COMPUTING, 2008, 7 (01) :74-81