Security perspective of wireless sensor networks

被引:1
作者
Gutierrez-Portela, Fernando [1 ]
Almenarez-Mendoza, Florina [2 ]
Calderon-Benavides, Liliana [3 ,4 ]
Romero-Riano, Efren
机构
[1] Univ Cooperat Colombia, Ingn Civil, Aqua, Medellin, Colombia
[2] Univ Carlos III Madrid, Dept Ingn Telemat, Aplicac & Serv Telemat, Madrid, Spain
[3] Univ Autonoma Bucaramanga, Unidad Acad, Tecnol Informac, Bucaramanga, Santander, Colombia
[4] Univ Autonoma Bucaramanga, Bucaramanga, Santander, Colombia
来源
UIS INGENIERIAS | 2021年 / 20卷 / 03期
关键词
wireless sensor networks; WSN attacks; security mechanisms; artificial intelligence; intrusion detection; computational resources; countermeasures; ZigBee protocol; machine learning; supervised techniques; unsupervised techniques; anomaly detection; clustering algorithms; VOSviewer; security prospective; EFFICIENT; PRIVACY; ATTACKS; SCHEME; AUTHENTICATION; ALGORITHM; PROTOCOL; SYSTEM;
D O I
10.18273/revuin.v20n3-2021014
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In Wireless Sensor Networks (WSN), nodes are vulnerable to security attacks because they are installed in a harsh environment with limited power and memory, low processing power, and medium broadcast transmission. Therefore, identifying threats, challenges, and solutions of security and privacy is a talking topic today. This article analyzes the research work that has been carried out on the security mechanisms for the protection of WSN against threats and attacks, as well as the trends that emerge in other countries combined with future research lines. From the methodological point of view, this analysis is shown through the visualization and study of works indexed in databases such as IEEE, ACM, Scopus, and Springer, with a range of 7 years as an observation window, from 2013 to 2019. A total of 4,728 publications were obtained, with a high rate of collaboration between China and India. The research raised developments, such as advances in security principles and defense mechanisms, which have led to the design of countermeasures in intrusion detection. Finally, the results show the interest of the scientific and business community in the use of artificial intelligence and machine learning (ML) to optimize performance measurements.
引用
收藏
页码:189 / 201
页数:13
相关论文
共 74 条
[1]   Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey [J].
Abu Alsheikh, Mohammad ;
Dinh Thai Hoang ;
Niyato, Dusit ;
Tan, Hwee-Pink ;
Lin, Shaowei .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1239-1267
[2]   An attack resistant key predistribution scheme for wireless sensor networks [J].
Ahlawat, Priyanka ;
Dave, Mayank .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (03) :268-280
[3]   A Hybrid Approach for Path Vulnerability Matrix on Random Key Predistribution for Wireless Sensor Networks [J].
Ahlawat, Priyanka ;
Dave, Mayank .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) :3327-3353
[4]   Cyber-physical systems and their security issues [J].
Alguliyev, Rasim ;
Imamverdiyev, Yadigar ;
Sukhostat, Lyudmila .
COMPUTERS IN INDUSTRY, 2018, 100 :212-223
[5]   Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) [J].
Alsaedi, Noor ;
Hashim, Fazirulhisyam ;
Sali, A. ;
Rokhani, Fakhrul Z. .
COMPUTER COMMUNICATIONS, 2017, 110 :75-82
[6]  
Alshinina R, 2018, WIREL TELECOMM SYMP
[7]   Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol [J].
Amish, Parmar ;
Vaghela, V. B. .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :700-707
[8]  
[Anonymous], 2002, IEEE Std 802.15.1-2002, P1, DOI [10.1109/IEEESTD.2002.93621, DOI 10.1109/IEEESTD.2002.93621]
[9]  
[Anonymous], 2016, IEEE Std 1849-2016, P1, DOI [DOI 10.1109/IEEESTD.2016.7740858, 10.1109/IEEESTD.2016.7740858]
[10]  
Aras E, 2017, IEEE INT C CYBERNET, P361, DOI 10.1109/cybconf.2017.7985777