Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review

被引:0
|
作者
S. Rajasoundaran
A. V. Prabu
G. Sateesh Kumar
Prince Priya Malla
Sidheswar Routray
机构
[1] VIT Bhopal,School of Computing Science and Engineering
[2] Koneru Lakshmaiah Education Foundation,Department of Electronics and Communication Engineering
[3] JNTU,Department of Electronics and Communication Engineering
[4] AITAM,Department of Electronics and Communication Engineering
来源
Wireless Personal Communications | 2021年 / 120卷
关键词
Wireless sensor networks; Intrusion; Attackers; Secure routing; Watchdog and key management techniques;
D O I
暂无
中图分类号
学科分类号
摘要
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks (WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders are rising with various types of network harming activities. Due to the open shared medium of WSN, the services can be easily broken. Intrusion Detection System (IDS) helps to keep the network secure against the attackers. At the same time, it is not sufficient against numerous real time attackers. There are plenty of attacks are injected in wireless transmissions. So, taking a deep survey and finding the needs in security perspective are very important jobs. This survey article analyses the problems and solutions given on secure routing and successful watchdog production in WSN. Collectively, this survey helps to understand IDS techniques, WSN characteristics, secure routing, key management techniques and watchdog construction strategies in detail. Finally, this article states some notable problems and solutions for providing optimal watchdog productions. This keeps WSN free from attackers and intruders. As watchdog is a light weight agent, the techniques and protocols used for intrusion detection shall not create maximum overhead and any runtime issues. In this regard, this work analyses various proactive and reactive routing protocols, light weight cryptography techniques and attack types. From the analysis, this deep survey suggests the optimal usage of secure routing protocols and hardware efficient security algorithms. This survey extends its contribution to reveal the adaptability of efficient cryptography techniques, attacks detection algorithms and protocols with real-time watchdogs. This work significantly contributes for watchdog based intrusion detection in low powered WSN. The performance comparisons and the results given in this work deliver the overall technical benefits and limitations of various techniques.
引用
收藏
页码:1895 / 1919
页数:24
相关论文
共 50 条
  • [1] Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review
    Rajasoundaran, S.
    Prabu, A. V.
    Kumar, G. Sateesh
    Malla, Prince Priya
    Routray, Sidheswar
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 120 (02) : 1895 - 1919
  • [2] Opportunistic Routing in Wireless Sensor Networks: A Review
    Patel, Tejas
    Kamboj, Pariza
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 983 - 987
  • [3] Secure and concealed watchdog selection scheme using masked distributed selection approach in wireless sensor networks
    Soundararajan, Rajasoundaran
    Palanisamy, Narayanasamy
    Patan, Rizwan
    Nagasubramanian, Gayathri
    Khan, Mohammed S.
    IET COMMUNICATIONS, 2020, 14 (06) : 948 - 955
  • [4] A Survey of Secure Routing in Wireless Sensor Networks
    LI ZhiyuanWANG RuchuanCollege of ComputerNanjing University of Posts and TelecommunicationsNanjing ChinaState Key Laboratory for Novel Software TechnologyNanjing UniversityNanjing China
    南京邮电大学学报(自然科学版), 2010, 30 (01) : 77 - 87
  • [5] Secure Broadcast in Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    2009 3RD INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM 2009), 2009, : 424 - 429
  • [6] Opportunistic Function Computation for Wireless Sensor Networks
    Jeon, Sang-Woon
    Jung, Bang Chul
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (06) : 4045 - 4059
  • [7] Secure Communication Protocol for Mobile Wireless Sensor Networks
    Sarma, Hiren Kumar Deva
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 779 - 784
  • [8] Opportunistic Sensor Networks: A Survey on Privacy and Secure Routing
    Arafath, Mohammed Salman
    Khan, Khaleel Ur Rahman
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 41 - 46
  • [9] Secure and Trust-Aware Routing in Wireless Sensor Networks
    Konstantopoulos, Charalampos
    Mamalis, Basilis
    Pantziou, Grammati
    22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018), 2018, : 312 - 317
  • [10] Opportunistic In-Network Computation for Wireless Sensor Networks
    Jeon, Sang-Woon
    Jung, Bang Chul
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1856 - 1860