Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review

被引:0
|
作者
S. Rajasoundaran
A. V. Prabu
G. Sateesh Kumar
Prince Priya Malla
Sidheswar Routray
机构
[1] VIT Bhopal,School of Computing Science and Engineering
[2] Koneru Lakshmaiah Education Foundation,Department of Electronics and Communication Engineering
[3] JNTU,Department of Electronics and Communication Engineering
[4] AITAM,Department of Electronics and Communication Engineering
来源
Wireless Personal Communications | 2021年 / 120卷
关键词
Wireless sensor networks; Intrusion; Attackers; Secure routing; Watchdog and key management techniques;
D O I
暂无
中图分类号
学科分类号
摘要
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks (WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders are rising with various types of network harming activities. Due to the open shared medium of WSN, the services can be easily broken. Intrusion Detection System (IDS) helps to keep the network secure against the attackers. At the same time, it is not sufficient against numerous real time attackers. There are plenty of attacks are injected in wireless transmissions. So, taking a deep survey and finding the needs in security perspective are very important jobs. This survey article analyses the problems and solutions given on secure routing and successful watchdog production in WSN. Collectively, this survey helps to understand IDS techniques, WSN characteristics, secure routing, key management techniques and watchdog construction strategies in detail. Finally, this article states some notable problems and solutions for providing optimal watchdog productions. This keeps WSN free from attackers and intruders. As watchdog is a light weight agent, the techniques and protocols used for intrusion detection shall not create maximum overhead and any runtime issues. In this regard, this work analyses various proactive and reactive routing protocols, light weight cryptography techniques and attack types. From the analysis, this deep survey suggests the optimal usage of secure routing protocols and hardware efficient security algorithms. This survey extends its contribution to reveal the adaptability of efficient cryptography techniques, attacks detection algorithms and protocols with real-time watchdogs. This work significantly contributes for watchdog based intrusion detection in low powered WSN. The performance comparisons and the results given in this work deliver the overall technical benefits and limitations of various techniques.
引用
收藏
页码:1895 / 1919
页数:24
相关论文
共 50 条
  • [21] Towards survivable and secure wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 442 - +
  • [22] Secure Key Distribution in Wireless Sensor Networks
    Umadevi, K. S.
    Ghosh, Arijit
    Menon, Anurag
    Nanaware, Mandar
    ADVANCED SCIENCE LETTERS, 2018, 24 (08) : 6013 - 6016
  • [23] Setting Up Secure Wireless Sensor Networks
    Cionca, Victor
    Newe, Thomas
    Dadarlat, Vasile
    2009 IEEE 5TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2009, : 335 - +
  • [24] A Review of Recent Developments about Secure Data Aggregation in Wireless Sensor Networks
    Hou, Kequn
    Wang, Baofeng
    Wang, Zumin
    Zhu, Chunsheng
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (07): : 1511 - 1519
  • [25] Watermarking schemes for secure data aggregation in wireless sensor networks: A review paper
    Dhiman, Vandana
    Khandnor, Padmavati
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3087 - 3091
  • [26] Opportunistic Power Allocation and Sensor Selection Schemes for Wireless Sensor Networks
    Matamoros, Javier
    Anton-Haro, Carles
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (02) : 534 - 539
  • [27] Trust-aware secure routing protocol for wireless sensor networks
    Hu, Huangshui
    Han, Youjia
    Wang, Hongzhi
    Yao, Meiqin
    Wang, Chuhang
    ETRI JOURNAL, 2021, 43 (04) : 674 - 683
  • [28] An Opportunistic Routing Algorithm with Implicit ARQ for Wireless Sensor Networks
    Hong, Xiao
    Hui, Liu
    Jie, Chen
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING, 2014, 113 : 245 - 249
  • [29] Performance analysis of an opportunistic transmission scheme for wireless sensor networks
    Van Phan, Ca
    Nguyen, Thuy-Dan
    Kim, Eui Jik
    Choi, Hyo Hyun
    Kim, Jeong Geun
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 2317 - +
  • [30] Opportunistic occupancy estimation in museums through wireless sensor networks
    Viani, Federico
    MICROWAVE AND OPTICAL TECHNOLOGY LETTERS, 2015, 57 (08) : 1975 - 1977