Abstract
Wireless sensor networks have become one of the widely deployed networking technologies in the recent times due to the capabilities and advantages of them. The applications of wireless sensor networks include many civilian and industrial applications to military applications. Due to the distributed nature of these networks, deployment in remote and open areas and many constraints in individual nodes, these networks are vulnerable to several security threats. Many security mechanisms and algorithms proposed for the implementation in the traditional networks cannot be implemented in wireless sensor networks due to the unique nature of these networks and nodes. Many active research programmes have been carried out throughout the world for making wireless sensor networks more secure and user friendly. This chapter takes an in-depth look at some of the prominent mechanisms, schemes, algorithms and protocols published in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mohamed, M.I., Wu, W.Y., Moniri, M.: Power harvesting for smart sensor networks in monitoring water distribution system. IEEE International Conference on Networking, Sensing and Control, pp. 393–398, Delft, The Netherlands (2011)
Zhang, Y., Gu, Y., Vlatkovic, V., et al.: Progress of smart sensor and smart sensor networks. 5th World Congress on Intelligent Control and Automation, pp. 3600–3606, Hangzhou, China (2004)
Lyle, A.C., Naish, M.D.: A software architecture for adaptive modular sensing systems. Sensors 10(8), 7514–7560 (2010)
Kizza, J.M.: Implementing security in wireless sensor networks. 4th Annual International Conference on Computing and ICT Research, pp. 296–311, Kampala, Uganda (2008)
Razzak, M.I., Elmogy, B.A., Khan, M.K., et al.: Efficient distributed face recognition in wireless sensor network. Int. J. Innovative Comput. Inf. Control 8(4), 2811–2822 (2012)
Sharma, K., Ghose, M.K., Kuldeep, : Complete security framework for wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 3(1), 1–7 (2009)
Boyle, D., Newe, T.: Securing wireless sensor networks security architectures. J. Netw. 3(1), 65–77 (2008)
Sen, J.: A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1(2), 55–78 (2009)
Hecker, M., Karol, A., Stanton, C., et al.: Smart sensor networks: communication, collaboration and business decision making in distributed complex environments. International Conference on Mobile Business, pp. 242–248, Sydney, Australia (2005)
Herrera-Quintero, L.F., Macia-Perez, F., Ramos-Morillo, H., et al.: Wireless smart sensors networks, systems, trends and its impact in environmental monitoring. IEEE Latin-American Conference on Communications, pp. 1–6, Medellin, Colombia (2009)
Fine, G.F., Cavanagh, L.M., Afonja, A., et al.: Metal oxide semi conductor gas sensors in environmental monitoring. Sensors 10(6), 5469–5502 (2010)
Hancke, G.P., Silva, B.C., Hancke, G.P.: The role of advanced sensing in smart cities. Sensors (Basel) 13(1), 393–425 (2013)
Fan, G., Wang, R., Huang, H., et al.: Coverage-guaranteed sensor node deployment strategies for wireless sensor networks. Sensors (Basel) 10(3), 2064–2087 (2010)
Singh, A., Sharma, T.P.: A survey on area coverage in wireless sensor networks. International Conference on Control, Instrumentation, Communication and Computational Technologies, pp. 900–907, Kumaracoil, Thuckalay, TN, India (2014)
Taniguchi, Y., Kitani, T., Leibnitz, K.: A uniform airdrop deployment method for large-scale wireless sensor networks. Int. J. Sens. Netw. 9, 182–191 (2011)
Filippou, A., Karras, D.A., Papademetriou, R.C.: Coverage problem for sensor networks: an overview of solution strategies. 17th Telecommunications Forum, pp. 134–136, Serbia, Belgrade (2009)
Sheikhpour, R., Jabbehdari, S., Khadem-Zadeh, A.: Comparison of Energy efficient clustering protocols in heterogeneous wireless sensor networks. Int. J. Adv. Sci. Technol. 36, 27–40 (2014)
Ranjan, R., Kar, S.: A novel approach for finding optimal number of cluster head in wireless sensor network. National Communications Conference, pp. 1–5, Bangalore, India (2011)
Ghosh, A., Das, K.S.: Coverage and connectivity issues in wireless sensor networks. In: Shorey, R., Ananda, A.L., Chan, M.C., et al. (eds.) Mobile, wireless and sensor networks: Technology, applications, and future directions. Wiley, New York (2006)
Li, J., Andrew, L.L.H., Foh, C.H., Zukerman, M., et al.: Connectivity, coverage and placement in wireless sensor networks. Sensors 9, 7664–7693 (2009)
Khelifa, B., Haffaf, H., Madjid, M., et al.: Monitoring connectivity in wireless sensor networks. Int. J. Future Gener. Commun. Networking 2(2), 1–10 (2009)
Zhang, H., Hou, J.C.: Maintaining sensing coverage and connectivity in large sensor networks. Ad Hoc Sens. Wireless Netw. 1, 89–124 (2005)
McDermott-Wells, P.: What is bluetooth? IEEE Potentials 23(5), 33–35 (2005)
Ting, K.S., Ee, G.K., Ng, C.K., et al.: The performance evaluation of IEEE 802.11 against IEEE 802.15.4 with low transmission power. 17th Asia-Pacific Conference on Communications, pp. 850–855, Kota Kinabalu, Sabah, Malaysia (2011)
Liu, T., Liu, J., Liu, B.: Design of intelligent warehouse measure and control system based on Zigbee WSN. International Conference on Mechatronics and Automation, pp. 888–893, Xi’an, China (2010)
Teng, Z., Kim, K.I.: A survey on real-time MAC protocols in wireless sensor networks. Commun. Netw. 2(2), 104–112 (2010)
Carman, D.W., Krus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. Technical Report 00-010, Network Associates Inc., Glenwood, MD, USA (2000)
Hill, J., Szewezyk, R., Woo, A., et al.: System architecture directions for networked sensors. 9th International Conference on Architectural Support for Programming Languages and Operating systems, pp. 93–104, Cambridge, MA, USA (2000)
Tsiftes, N., Dunkels, A., He, Z., et al.: Enabling large-scale storage in sensor networks with the coffee file system. International Conference on Information Processing in Sensor Networks, pp. 349–360, San Francisco, CA, USA (2009)
Marigowda, C.K., Shingadi, M.: security vulnerability issues in wireless sensor networks: A short survey. Int. J. Adv. Res. Comput. Commun. Eng. 2, 2765–2770 (2013)
Kumar, Y., Munjal, R., Kumar, K.: Wireless sensor networks and security challenges. Int. J. Comput. Appl. RTMC 9, 17–21 (2012)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Raman, B., Chebrolu, K.: Censor networks: A critique of sensor networks from a systems perspective. ACM SIGCOMM Comput. Commun. Rev. 38(3), 75–78 (2008)
Zia, T.A., Zomaya, A.Y.: A lightweight security framework for wireless sensor networks. J. Wireless Mobile Netw., Ubiquitous Comput. Dependable Appl. 2(3), 53–73 (2011)
Tsitsigkos, A., Entezami, F., Ramrekha, T.A., et al.: A case study of internet of things based on wireless sensor networks and smart phones. 28th Wireless World Research Forum Meeting, pp. 1–10, Athens, Greece (2012)
Baburajan, J., Prajapati, J.: A review paper on watchdog mechanism in wireless sensor network to eliminate false malicious node detection. Int. J. Res. Eng. Technol. 3(1), 381–384 (2014)
Nakul, P.: A survey on malicious node detection in wireless sensor networks. Int. J. Sci. Res. 2(1), 691–694 (2013)
Li, W.T., Feng, T.H., Hwang, M.S.: Distributed detecting node replication attacks in wireless sensor networks: a survey. Int. J. Netw. Secur. 16(5), 323–330 (2014)
Virmani, D., Hemrajani, M., Chandel, S.: Exponential trust based mechanism to detect black hole attack in wireless sensor network. Int. J. Soft Comput. Eng. 4(1), 14–16 (2014)
Lim, S.Y., Choi, Y.H.: Malicious node detection using dual threshold in wireless sensor networks. J. Sens. Actuator Netw. 2, 70–84 (2013)
Atakli, I.M., Hu, H., Chen, Y., et al.: Malicious node detection in wireless sensor networks using weighted trust evaluation. Symposium on Simulation of System Security, pp. 836–843, Ottawa, Canada (2008)
Junior, W.R.P., Figueiredo, T.H.P., Wong, H.C., et al.: Malicious node detection in wireless sensor networks. 18th International Parallel and Distributed Processing Symposium, Santa Fe, NM, USA (2004)
Perrig, A., Szewczyk, R., Tygar, J.D., et al.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. 2nd International Conference on Embedded Networked Sensor Systems, pp. 162–175, Baltimore MD, USA (2004)
Heo, J., Hong, C.S.: Efficient and authenticated key agreement mechanism in low rate WPAN environment. International Symposium on Wireless Pervasive Computing, pp. 1–5, Phuket, Thailand (2006)
Soroush, H., Salajegheh, M., Dimitriou, T.: Providing transparent security services to sensor networks. IEEE International Conference on Communication, pp. 3431–3436, Glasgow, Scotland (2007)
Garcia-Morchon, O., Baldus, H.: The ANGEL WSN Security Architecture. Third International Conference on Sensor Technologies and Applications, pp. 430–435, Athens, Greece (2009)
Cionca, V., Newe, T., Dadarlat, V.: MArSSeNs: a modular architecture for the security of sensor networks. IEEE Sensors, pp. 1209–1212, Limerick, Ireland (2011)
Duan, J., Yang, D., Zhu, H., et al.: TSRF: a trust aware secure routing framework in wireless sensor networks. Int. J. Distrib. Sens. Netw. 1–14 (2014)
Xiangyu, J., Chao, W.: The security routing research for WSN in the application of intelligent transport system. IEEE International Conference on Mechatronics and Automation, pp. 2318–2323, Luoyang, Henan, China (2006)
Zahariadis, T., Leligou, H.C., Voliotis, S., et al.: Energy-aware secure routing for large wireless sensor networks. WSEAS Trans. on Commun. 9(8), 981–991 (2009)
Deng, J., Han, R., Mishra, S.: INSENS: intrusion-tolerant routing in wireless sensor networks. Technical report CU-CS-939-02, Department of Computer Science, University of Colorado, Boulder, CO, USA (2002)
Tanachaiwiwat, S., Dave, P., Bhindwale, R.: Routing on trust and isolating compromised sensors in location-aware sensor networks. 1st International Conference on Embedded Networked Sensor Systems, pp. 324–325, Los Angeles, CA, USA (2003)
Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, pp. 1–13, San Antonio, TX, USA (2002)
Arolkar, H.A., Sheth, S.P., Tamhane, V.P.: Ant colony based approach for intrusion detection on cluster heads in wireless sensor networks. International Conference on Communication, Computing and Security, pp. 523–526, Rourkela, Odisha, India (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Firdhous, M.F.M. (2016). Security Implementations in Smart Sensor Networks. In: Ravulakollu, K., Khan, M., Abraham, A. (eds) Trends in Ambient Intelligent Systems. Studies in Computational Intelligence, vol 633. Springer, Cham. https://doi.org/10.1007/978-3-319-30184-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-30184-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30182-2
Online ISBN: 978-3-319-30184-6
eBook Packages: EngineeringEngineering (R0)