Secure and Reliable WSN for Internet of Things: Challenges and Enabling Technologies

被引:33
作者
Lata, Sonam [1 ]
Mehfuz, Shabana [1 ]
Urooj, Shabana [2 ,3 ]
机构
[1] Jamia Millia Islamia, Dept Elect Engn, New Delhi 110025, India
[2] Princess Nourah Bint Abdulrahman Univ, Dept Elect Engn, Coll Engn, Riyadh 84428, Saudi Arabia
[3] Gautam Buddha Univ, Sch Engn, Dept Elect Engn, Greater Noida 201312, Uttar Pradesh, India
关键词
Wireless sensor networks; Internet of Things; Security; Sensors; Wireless communication; Protocols; Medical services; Attacks; Internet of Things (IoT); security; wireless sensor networks (WSN); WIRELESS SENSOR NETWORKS; DISTRIBUTED DETECTION; ENERGY-EFFICIENT; SINKHOLE ATTACK; CLONE ATTACKS; SEMANTIC WEB; HEALTH-CARE; SERVICE; SYSTEM; PROTOCOL;
D O I
10.1109/ACCESS.2021.3131367
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Sensor Network (WSN) is an innovative technology with a broad range of applications and highly attractive benefits, such as low cost of implementation and data transmission, unmonitored access to the network, autonomous and long-term operation. With extensive demand for the advancement of related technologies (cloud computing, near-field communications and cellular mobile networks), the Internet of Things (IoT) is becoming a very exciting paradigm. By using communication technologies in sensors and sensing features in web devices, WSNs have begun interaction with the Iot devices. IoT provides access to a large amount of information gathered by WSNs. However, the security of WSN and IoT comes at a cost, mainly due to privacy management issues. Therefore, this paper offers a comprehensive analysis of security threats against WSN and IoT, along with the strategies for preventing, detecting and mitigating those threats. The related defense mechanisms can help in building a safe IoT expansion and widespread understanding by getting familiar with the details of these attacks. The aim of this paper is to address and demonstrate the impact of the security problems on WSNs from the viewpoint of the IoT and its applications. In the analysis carried out for this work, a classification of available attacks and threats against these requirements has also been included.
引用
收藏
页码:161103 / 161128
页数:26
相关论文
共 159 条
[1]  
Accettura N, 2014, PROC IEEE INT SYMP, P1469, DOI 10.1109/ISIE.2014.6864831
[2]  
Agah A., 2007, International Journal of Network Security, V5, P145
[3]   Edge computing technologies for Internet of Things: a primer [J].
Ai, Yuan ;
Peng, Mugen ;
Zhang, Kecheng .
DIGITAL COMMUNICATIONS AND NETWORKS, 2018, 4 (02) :77-86
[4]  
Al Zaid H., 2011, INT J ENG SCI TECHNO, V5, P93
[5]  
Alajmi N. M., 2015, Int. J. Comput. Appl, V111, P27, DOI DOI 10.5120/19607-1472
[6]  
Alam S., 2010, Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications (GreenCom) and Int'l Conference on Cyber, Physical and Social Computing (CPSCom), P488, DOI 10.1109/GreenCom-CPSCom.2010.116
[7]  
Amouri A, 2015, IEEE LATAMER CONF
[8]  
[Anonymous], 2000, P INT WORKSHOP SECUR, DOI DOI 10.1007/3-540-44810-122
[9]  
[Anonymous], 1964, Plastics
[10]  
[Anonymous], 2006, WIR MED ACC CONTR MA