A Full Review of Attacks and Countermeasures in Wireless Sensor Networks

被引:1
作者
Niksaz, Pejman [1 ]
Kargar, Mohammad Javad [2 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Yazd, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Maybod Branch, Maybod, Iran
关键词
Attack; Challenge; Security; Sensor; Statistical Data; Wireless Sensor Networks (WSNs);
D O I
10.4018/jisp.2012100101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs into such a constrained environment. Thus, familiarity with the security aspects of WSNs is essential before designing WSN systems. In order to provide effective integrity, confidentiality, and authentication during communication, the need for additional security measures in WSNs emerges. In this paper, the authors review the security requirements for WSNs, the different kinds of possible attacks, and security mechanisms used to overcome these attacks. The authors also present some statistical data for such attacks in WSN and some tables that indicate a comparison between different security mechanisms.
引用
收藏
页码:1 / 39
页数:39
相关论文
共 135 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
Albers P., 2002, P 1 INT WORKSH WIR I
[3]  
Anderson R., 1996, P 2 C USENIX WORKSH, V2
[4]  
Anderson R.J., 1998, LNCS, P125
[5]  
[Anonymous], 2004, WIRELESS SENSOR NETW, V47
[6]  
[Anonymous], P S APPL INT WORKSH
[7]  
Bala Krishna M., 2011, P INT C COMP INT COM
[8]  
Bandyopadhyay S., 2003, P C CONV TECHN AS PA
[9]  
Becher A, 2006, LECT NOTES COMPUT SC, V3934, P104
[10]  
Biming T., 2010, P IEEE IFIP 8 INT C