Skip to main content

Security Implementations in Smart Sensor Networks

  • Chapter
  • First Online:
Trends in Ambient Intelligent Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 633))

  • 517 Accesses

Abstract

Wireless sensor networks have become one of the widely deployed networking technologies in the recent times due to the capabilities and advantages of them. The applications of wireless sensor networks include many civilian and industrial applications to military applications. Due to the distributed nature of these networks, deployment in remote and open areas and many constraints in individual nodes, these networks are vulnerable to several security threats. Many security mechanisms and algorithms proposed for the implementation in the traditional networks cannot be implemented in wireless sensor networks due to the unique nature of these networks and nodes. Many active research programmes have been carried out throughout the world for making wireless sensor networks more secure and user friendly. This chapter takes an in-depth look at some of the prominent mechanisms, schemes, algorithms and protocols published in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohamed, M.I., Wu, W.Y., Moniri, M.: Power harvesting for smart sensor networks in monitoring water distribution system. IEEE International Conference on Networking, Sensing and Control, pp. 393–398, Delft, The Netherlands (2011)

    Google Scholar 

  2. Zhang, Y., Gu, Y., Vlatkovic, V., et al.: Progress of smart sensor and smart sensor networks. 5th World Congress on Intelligent Control and Automation, pp. 3600–3606, Hangzhou, China (2004)

    Google Scholar 

  3. Lyle, A.C., Naish, M.D.: A software architecture for adaptive modular sensing systems. Sensors 10(8), 7514–7560 (2010)

    Article  Google Scholar 

  4. Kizza, J.M.: Implementing security in wireless sensor networks. 4th Annual International Conference on Computing and ICT Research, pp. 296–311, Kampala, Uganda (2008)

    Google Scholar 

  5. Razzak, M.I., Elmogy, B.A., Khan, M.K., et al.: Efficient distributed face recognition in wireless sensor network. Int. J. Innovative Comput. Inf. Control 8(4), 2811–2822 (2012)

    Google Scholar 

  6. Sharma, K., Ghose, M.K., Kuldeep, : Complete security framework for wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 3(1), 1–7 (2009)

    Google Scholar 

  7. Boyle, D., Newe, T.: Securing wireless sensor networks security architectures. J. Netw. 3(1), 65–77 (2008)

    Google Scholar 

  8. Sen, J.: A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1(2), 55–78 (2009)

    Google Scholar 

  9. Hecker, M., Karol, A., Stanton, C., et al.: Smart sensor networks: communication, collaboration and business decision making in distributed complex environments. International Conference on Mobile Business, pp. 242–248, Sydney, Australia (2005)

    Google Scholar 

  10. Herrera-Quintero, L.F., Macia-Perez, F., Ramos-Morillo, H., et al.: Wireless smart sensors networks, systems, trends and its impact in environmental monitoring. IEEE Latin-American Conference on Communications, pp. 1–6, Medellin, Colombia (2009)

    Google Scholar 

  11. Fine, G.F., Cavanagh, L.M., Afonja, A., et al.: Metal oxide semi conductor gas sensors in environmental monitoring. Sensors 10(6), 5469–5502 (2010)

    Article  Google Scholar 

  12. Hancke, G.P., Silva, B.C., Hancke, G.P.: The role of advanced sensing in smart cities. Sensors (Basel) 13(1), 393–425 (2013)

    Article  Google Scholar 

  13. Fan, G., Wang, R., Huang, H., et al.: Coverage-guaranteed sensor node deployment strategies for wireless sensor networks. Sensors (Basel) 10(3), 2064–2087 (2010)

    Article  Google Scholar 

  14. Singh, A., Sharma, T.P.: A survey on area coverage in wireless sensor networks. International Conference on Control, Instrumentation, Communication and Computational Technologies, pp. 900–907, Kumaracoil, Thuckalay, TN, India (2014)

    Google Scholar 

  15. Taniguchi, Y., Kitani, T., Leibnitz, K.: A uniform airdrop deployment method for large-scale wireless sensor networks. Int. J. Sens. Netw. 9, 182–191 (2011)

    Article  Google Scholar 

  16. Filippou, A., Karras, D.A., Papademetriou, R.C.: Coverage problem for sensor networks: an overview of solution strategies. 17th Telecommunications Forum, pp. 134–136, Serbia, Belgrade (2009)

    Google Scholar 

  17. Sheikhpour, R., Jabbehdari, S., Khadem-Zadeh, A.: Comparison of Energy efficient clustering protocols in heterogeneous wireless sensor networks. Int. J. Adv. Sci. Technol. 36, 27–40 (2014)

    Google Scholar 

  18. Ranjan, R., Kar, S.: A novel approach for finding optimal number of cluster head in wireless sensor network. National Communications Conference, pp. 1–5, Bangalore, India (2011)

    Google Scholar 

  19. Ghosh, A., Das, K.S.: Coverage and connectivity issues in wireless sensor networks. In: Shorey, R., Ananda, A.L., Chan, M.C., et al. (eds.) Mobile, wireless and sensor networks: Technology, applications, and future directions. Wiley, New York (2006)

    Google Scholar 

  20. Li, J., Andrew, L.L.H., Foh, C.H., Zukerman, M., et al.: Connectivity, coverage and placement in wireless sensor networks. Sensors 9, 7664–7693 (2009)

    Article  Google Scholar 

  21. Khelifa, B., Haffaf, H., Madjid, M., et al.: Monitoring connectivity in wireless sensor networks. Int. J. Future Gener. Commun. Networking 2(2), 1–10 (2009)

    Google Scholar 

  22. Zhang, H., Hou, J.C.: Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens. Wireless Netw. 1, 89–124 (2005)

    Google Scholar 

  23. McDermott-Wells, P.: What is bluetooth? IEEE Potentials 23(5), 33–35 (2005)

    Article  Google Scholar 

  24. Ting, K.S., Ee, G.K., Ng, C.K., et al.: The performance evaluation of IEEE 802.11 against IEEE 802.15.4 with low transmission power. 17th Asia-Pacific Conference on Communications, pp. 850–855, Kota Kinabalu, Sabah, Malaysia (2011)

    Google Scholar 

  25. Liu, T., Liu, J., Liu, B.: Design of intelligent warehouse measure and control system based on Zigbee WSN. International Conference on Mechatronics and Automation, pp. 888–893, Xi’an, China (2010)

    Google Scholar 

  26. Teng, Z., Kim, K.I.: A survey on real-time MAC protocols in wireless sensor networks. Commun. Netw. 2(2), 104–112 (2010)

    Article  Google Scholar 

  27. Carman, D.W., Krus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. Technical Report 00-010, Network Associates Inc., Glenwood, MD, USA (2000)

    Google Scholar 

  28. Hill, J., Szewezyk, R., Woo, A., et al.: System architecture directions for networked sensors. 9th International Conference on Architectural Support for Programming Languages and Operating systems, pp. 93–104, Cambridge, MA, USA (2000)

    Google Scholar 

  29. Tsiftes, N., Dunkels, A., He, Z., et al.: Enabling large-scale storage in sensor networks with the coffee file system. International Conference on Information Processing in Sensor Networks, pp. 349–360, San Francisco, CA, USA (2009)

    Google Scholar 

  30. Marigowda, C.K., Shingadi, M.: security vulnerability issues in wireless sensor networks: A short survey. Int. J. Adv. Res. Comput. Commun. Eng. 2, 2765–2770 (2013)

    Google Scholar 

  31. Kumar, Y., Munjal, R., Kumar, K.: Wireless sensor networks and security challenges. Int. J. Comput. Appl. RTMC 9, 17–21 (2012)

    Google Scholar 

  32. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  33. Raman, B., Chebrolu, K.: Censor networks: A critique of sensor networks from a systems perspective. ACM SIGCOMM Comput. Commun. Rev. 38(3), 75–78 (2008)

    Article  Google Scholar 

  34. Zia, T.A., Zomaya, A.Y.: A lightweight security framework for wireless sensor networks. J. Wireless Mobile Netw., Ubiquitous Comput. Dependable Appl. 2(3), 53–73 (2011)

    Google Scholar 

  35. Tsitsigkos, A., Entezami, F., Ramrekha, T.A., et al.: A case study of internet of things based on wireless sensor networks and smart phones. 28th Wireless World Research Forum Meeting, pp. 1–10, Athens, Greece (2012)

    Google Scholar 

  36. Baburajan, J., Prajapati, J.: A review paper on watchdog mechanism in wireless sensor network to eliminate false malicious node detection. Int. J. Res. Eng. Technol. 3(1), 381–384 (2014)

    Article  Google Scholar 

  37. Nakul, P.: A survey on malicious node detection in wireless sensor networks. Int. J. Sci. Res. 2(1), 691–694 (2013)

    Google Scholar 

  38. Li, W.T., Feng, T.H., Hwang, M.S.: Distributed detecting node replication attacks in wireless sensor networks: a survey. Int. J. Netw. Secur. 16(5), 323–330 (2014)

    Google Scholar 

  39. Virmani, D., Hemrajani, M., Chandel, S.: Exponential trust based mechanism to detect black hole attack in wireless sensor network. Int. J. Soft Comput. Eng. 4(1), 14–16 (2014)

    Google Scholar 

  40. Lim, S.Y., Choi, Y.H.: Malicious node detection using dual threshold in wireless sensor networks. J. Sens. Actuator Netw. 2, 70–84 (2013)

    Article  Google Scholar 

  41. Atakli, I.M., Hu, H., Chen, Y., et al.: Malicious node detection in wireless sensor networks using weighted trust evaluation. Symposium on Simulation of System Security, pp. 836–843, Ottawa, Canada (2008)

    Google Scholar 

  42. Junior, W.R.P., Figueiredo, T.H.P., Wong, H.C., et al.: Malicious node detection in wireless sensor networks. 18th International Parallel and Distributed Processing Symposium, Santa Fe, NM, USA (2004)

    Google Scholar 

  43. Perrig, A., Szewczyk, R., Tygar, J.D., et al.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  44. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. 2nd International Conference on Embedded Networked Sensor Systems, pp. 162–175, Baltimore MD, USA (2004)

    Google Scholar 

  45. Heo, J., Hong, C.S.: Efficient and authenticated key agreement mechanism in low rate WPAN environment. International Symposium on Wireless Pervasive Computing, pp. 1–5, Phuket, Thailand (2006)

    Google Scholar 

  46. Soroush, H., Salajegheh, M., Dimitriou, T.: Providing transparent security services to sensor networks. IEEE International Conference on Communication, pp. 3431–3436, Glasgow, Scotland (2007)

    Google Scholar 

  47. Garcia-Morchon, O., Baldus, H.: The ANGEL WSN Security Architecture. Third International Conference on Sensor Technologies and Applications, pp. 430–435, Athens, Greece (2009)

    Google Scholar 

  48. Cionca, V., Newe, T., Dadarlat, V.: MArSSeNs: a modular architecture for the security of sensor networks. IEEE Sensors, pp. 1209–1212, Limerick, Ireland (2011)

    Google Scholar 

  49. Duan, J., Yang, D., Zhu, H., et al.: TSRF: a trust aware secure routing framework in wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–14 (2014)

    Google Scholar 

  50. Xiangyu, J., Chao, W.: The security routing research for WSN in the application of intelligent transport system. IEEE International Conference on Mechatronics and Automation, pp. 2318–2323, Luoyang, Henan, China (2006)

    Google Scholar 

  51. Zahariadis, T., Leligou, H.C., Voliotis, S., et al.: Energy-aware secure routing for large wireless sensor networks. WSEAS Trans. on Commun. 9(8), 981–991 (2009)

    Google Scholar 

  52. Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical report CU-CS-939-02, Department of Computer Science, University of Colorado, Boulder, CO, USA (2002)

    Google Scholar 

  53. Tanachaiwiwat, S., Dave, P., Bhindwale, R.: Routing on trust and isolating compromised sensors in location-aware sensor networks. 1st International Conference on Embedded Networked Sensor Systems, pp. 324–325, Los Angeles, CA, USA (2003)

    Google Scholar 

  54. Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 1–13, San Antonio, TX, USA (2002)

    Google Scholar 

  55. Arolkar, H.A., Sheth, S.P., Tamhane, V.P.: Ant colony based approach for intrusion detection on cluster heads in wireless sensor networks. International Conference on Communication, Computing and Security, pp. 523–526, Rourkela, Odisha, India (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Fazil Mohamed Firdhous .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Firdhous, M.F.M. (2016). Security Implementations in Smart Sensor Networks. In: Ravulakollu, K., Khan, M., Abraham, A. (eds) Trends in Ambient Intelligent Systems. Studies in Computational Intelligence, vol 633. Springer, Cham. https://doi.org/10.1007/978-3-319-30184-6_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30184-6_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30182-2

  • Online ISBN: 978-3-319-30184-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics