Secure Opportunistic Watchdog Production in Wireless Sensor Networks: A Review

被引:0
|
作者
S. Rajasoundaran
A. V. Prabu
G. Sateesh Kumar
Prince Priya Malla
Sidheswar Routray
机构
[1] VIT Bhopal,School of Computing Science and Engineering
[2] Koneru Lakshmaiah Education Foundation,Department of Electronics and Communication Engineering
[3] JNTU,Department of Electronics and Communication Engineering
[4] AITAM,Department of Electronics and Communication Engineering
来源
Wireless Personal Communications | 2021年 / 120卷
关键词
Wireless sensor networks; Intrusion; Attackers; Secure routing; Watchdog and key management techniques;
D O I
暂无
中图分类号
学科分类号
摘要
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks (WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders are rising with various types of network harming activities. Due to the open shared medium of WSN, the services can be easily broken. Intrusion Detection System (IDS) helps to keep the network secure against the attackers. At the same time, it is not sufficient against numerous real time attackers. There are plenty of attacks are injected in wireless transmissions. So, taking a deep survey and finding the needs in security perspective are very important jobs. This survey article analyses the problems and solutions given on secure routing and successful watchdog production in WSN. Collectively, this survey helps to understand IDS techniques, WSN characteristics, secure routing, key management techniques and watchdog construction strategies in detail. Finally, this article states some notable problems and solutions for providing optimal watchdog productions. This keeps WSN free from attackers and intruders. As watchdog is a light weight agent, the techniques and protocols used for intrusion detection shall not create maximum overhead and any runtime issues. In this regard, this work analyses various proactive and reactive routing protocols, light weight cryptography techniques and attack types. From the analysis, this deep survey suggests the optimal usage of secure routing protocols and hardware efficient security algorithms. This survey extends its contribution to reveal the adaptability of efficient cryptography techniques, attacks detection algorithms and protocols with real-time watchdogs. This work significantly contributes for watchdog based intrusion detection in low powered WSN. The performance comparisons and the results given in this work deliver the overall technical benefits and limitations of various techniques.
引用
收藏
页码:1895 / 1919
页数:24
相关论文
共 50 条
  • [31] An Improved Opportunistic Packet Transmission Scheme for Wireless Sensor Networks
    Soy, Hakki
    Ozdemir, Ozgur
    Bayrak, Mehmet
    2010 9TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2010, : 257 - 260
  • [32] Performance Analysis of an Opportunistic Transmission Scheme for Wireless Sensor Networks
    Kim, Jeong Geun
    Van Phan, Ca
    Kim, Wonha
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2009, E92B (06) : 2259 - 2262
  • [33] Opportunistic transmission for wireless sensor networks under delay constraints
    Van Phan, Ca
    Baek, Kikyung
    Kim, Jeong Geun
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 858 - +
  • [34] QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks
    Cheng, Long
    Niu, Jianwei
    Cao, Jiannong
    Das, Sajal K.
    Gu, Yu
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (07) : 1864 - 1875
  • [35] Flooding in Secure Wireless Sensor Networks Student contribution
    Bondu, Jimmy
    Mishra, Anupal
    Laxmi, Vijay
    Gaur, Manoj Singh
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 151 - 156
  • [36] Secure Communication and Routing Architecture in Wireless Sensor Networks
    Khan, Fazlullah
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 647 - 650
  • [37] A SECURE MECHANISM FOR QOS ROUTING IN WIRELESS SENSOR NETWORKS
    Alwan, Hind
    Agarwal, Anjali
    2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE), 2012,
  • [38] Efficient and Secure Routing Protocol for Wireless Sensor Networks
    Subramanian, Ganesh
    Amutha, R.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 631 - 637
  • [39] Channel Coding and Interleaver for Secure Wireless Sensor Networks
    Liang, Qilian
    Wang, Lingming
    2006 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC 2006), VOLS 1-4, 2006, : 1972 - 1977
  • [40] Secure Quantized Target Tracking in Wireless Sensor Networks
    Mansouri, Majdi
    Khoukhi, Lyes
    2011 7TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2011, : 713 - 718