Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review

被引:0
|
作者
S. Rajasoundaran
A. V. Prabu
G. Sateesh Kumar
Prince Priya Malla
Sidheswar Routray
机构
[1] VIT Bhopal,School of Computing Science and Engineering
[2] Koneru Lakshmaiah Education Foundation,Department of Electronics and Communication Engineering
[3] JNTU,Department of Electronics and Communication Engineering
[4] AITAM,Department of Electronics and Communication Engineering
来源
Wireless Personal Communications | 2021年 / 120卷
关键词
Wireless sensor networks; Intrusion; Attackers; Secure routing; Watchdog and key management techniques;
D O I
暂无
中图分类号
学科分类号
摘要
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks (WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders are rising with various types of network harming activities. Due to the open shared medium of WSN, the services can be easily broken. Intrusion Detection System (IDS) helps to keep the network secure against the attackers. At the same time, it is not sufficient against numerous real time attackers. There are plenty of attacks are injected in wireless transmissions. So, taking a deep survey and finding the needs in security perspective are very important jobs. This survey article analyses the problems and solutions given on secure routing and successful watchdog production in WSN. Collectively, this survey helps to understand IDS techniques, WSN characteristics, secure routing, key management techniques and watchdog construction strategies in detail. Finally, this article states some notable problems and solutions for providing optimal watchdog productions. This keeps WSN free from attackers and intruders. As watchdog is a light weight agent, the techniques and protocols used for intrusion detection shall not create maximum overhead and any runtime issues. In this regard, this work analyses various proactive and reactive routing protocols, light weight cryptography techniques and attack types. From the analysis, this deep survey suggests the optimal usage of secure routing protocols and hardware efficient security algorithms. This survey extends its contribution to reveal the adaptability of efficient cryptography techniques, attacks detection algorithms and protocols with real-time watchdogs. This work significantly contributes for watchdog based intrusion detection in low powered WSN. The performance comparisons and the results given in this work deliver the overall technical benefits and limitations of various techniques.
引用
收藏
页码:1895 / 1919
页数:24
相关论文
共 50 条
  • [11] A probabilistic and opportunistic flooding algorithm in wireless sensor networks
    Chang, Dukhyun
    Cho, Kideok
    Choi, Nakjung
    Kwon, Ted 'Taekyoung'
    Choi, Yanghee
    COMPUTER COMMUNICATIONS, 2012, 35 (04) : 500 - 506
  • [12] On Security of Opportunistic Routing Protocol in Wireless Sensor Networks
    Sharma, Archana
    Singh, Yashwant
    PROCEEDINGS OF RECENT INNOVATIONS IN COMPUTING, ICRIC 2019, 2020, 597 : 407 - 419
  • [13] A Secure Multicast Scheme for Wireless Sensor Networks
    Yu, Qian
    Zhang, Chang N.
    2012 THIRD FTRA INTERNATIONAL CONFERENCE ON MOBILE, UBIQUITOUS, AND INTELLIGENT COMPUTING (MUSIC), 2012, : 158 - 163
  • [14] Opportunistic Concurrency: A MAC Protocol for Wireless Sensor Networks
    Ma, Qiang
    Liu, Kebin
    Cao, Zhichao
    Zhu, Tong
    Miao, Xin
    Liu, Yunhao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (07) : 1999 - 2008
  • [15] QUANTUM SECURE COMMUNICATION FOR WIRELESS SENSOR NETWORKS
    Wu, Minghu
    Zhu, Xiuchang
    Chen, Siguang
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 119 - 123
  • [16] Designing Secure Protocols for Wireless Sensor Networks
    Uluagac, A. Selcuk
    Lee, Christopher P.
    Beyah, Raheem A.
    Copeland, John A.
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 503 - +
  • [17] Secure Data Aggregation in Wireless Sensor Networks
    Ben Othman, Soufiene
    Trad, Abdelbasset
    Youssef, Habib
    Alzaid, Hani
    2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 55 - 58
  • [18] A lightweight secure protocol for wireless sensor networks
    Sun, Bo
    Li, Chung-Chih
    Wu, Kui
    Xiao, Yang
    COMPUTER COMMUNICATIONS, 2006, 29 (13-14) : 2556 - 2568
  • [19] Coordination middleware for secure wireless sensor networks
    Nakamura, Yuichi
    Louvel, Maxime
    Nishi, Hiroaki
    PROCEEDINGS OF THE IECON 2016 - 42ND ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2016, : 6931 - 6936
  • [20] A Secure Routing Protocol for Wireless Sensor Networks
    Sen, Jaydip
    Ukil, Arijit
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 3, PROCEEDINGS, 2010, 6018 : 277 - 290