Skip to main content

Security in Wireless Sensor Networks (WSNs) and Their Applications

  • Chapter
  • First Online:
Information Fusion for Cyber-Security Analytics

Part of the book series: Studies in Computational Intelligence ((SCI,volume 691))

Abstract

As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. There is currently enormous research potential in the field of wireless sensor network security. Thus, familiarity with the current research in this field will benefit researchers greatly. With this in mind, we survey the major topics in wireless sensor network security, present the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chong, C., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91(8), 1247–1256 (2003)

    Article  Google Scholar 

  2. Nishimura, C.E., Conlon, D.M.: IUSS dual use: monitoring whales and earthquakes using SOSUS. Mar. Technol. Soc. J. 27(4), 13–21 (1994)

    Google Scholar 

  3. Proceedings of the Distributed Sensor Nets Workshop. Carnegie Mellon University, Pittsburgh, USA (1978)

    Google Scholar 

  4. Rashid, R., Robertson, G.: Accent: a communication oriented network operating system kernel. ACM SIGOPS Operating Systems Review, vol. 15, no. 5, December 1981

    Google Scholar 

  5. Lacoss, R.T.: Distributed mixed sensor aircraft tracking. In: Proceedings of the 6th American Control Conference, pp. 1827–1830, Minneapolis, USA, June 1987

    Google Scholar 

  6. Lesser, V.R., Corkill, D.D.: The distributed vehicle monitoring testbed: a tool for investigating distributed problem solving networks. Readings from the AI magazine, pp. 69–85, ISBN: 0-929280-01-6 (1989)

    Google Scholar 

  7. Chong, C.Y., Chang, K.C., Mori, S.: Distributed tracking in distributed sensor networks. In: Proceedings of the American Control Conference (1982)

    Google Scholar 

  8. DARPA. SensIT—Sensor Information Technology. http://www.sainc.com/sensit/goals.htm

  9. Smart-Its Consortium. The Smart-Its Project. http://www.smart-its.org/

  10. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  11. Wilson, J.: Technology. Sensor, Handbook. Newnes, Elsevier, Burlington, MA (2005)

    Google Scholar 

  12. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey sensor on I.E.E. networks. IEEE Commun. Mag., 40(8), pp. 102–114, (2002)

    Google Scholar 

  13. Karlof, C., Wagner, D.: Secure routing in sensor networks: attacks and countermeasures. Ad Hoc Netw. J. (Elsevier), Special Issue on Sensor Network (SNPA), pp. 293–315, September 2003

    Google Scholar 

  14. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tut. 11(2), 52–73 (2009). Second Quarter

    Article  Google Scholar 

  15. Saxena, M.: Security in Wireless Sensor Networks—A Layer Based Classification. Technical Report, Center for Education and Research in Information Assurance and Security-CERIAS, Purdue University. pages.cs.wisc.edu/~msaxena/papers/2007-04-cerias.pdf (2007)

    Google Scholar 

  16. Sen, J.: A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1(2), 59–82 (2009)

    Google Scholar 

  17. Mohanty, P., Panigrahi, S., Sarma, N., Satapathy, S.S.: Security issues in wireless data gathering protocols. J. Theor. Appl. Inf. Technol. 13(1), 14–27 (2010)

    Google Scholar 

  18. Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D.: Sensor Network Configuration Under Physical Attacks. Technical Report (OSU-CISRC-7/04-TR45), Department of Computer Science and Engineering, Ohio State University, July 2004

    Google Scholar 

  19. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  20. Sharifnejad, M., Shari, M., Ghiasabadi, M., Beheshti, S.: A survey on wireless sensor networks security. SETIT (2007)

    Google Scholar 

  21. Wang, B.T., Schulzrinne, H.: An IP traceback mechanism for reflective DoS attacks. In: Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 901–904, 2–5 May 2004

    Google Scholar 

  22. Wood, A.D., Stankovic, J.: Denial of service in sensor network. IEEE Comput. Mag. 35(10), 54–62 (2002)

    Article  Google Scholar 

  23. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003

    Google Scholar 

  24. Douceur, J.R.: The Sybil attack. In: First International Workshop on Peer-to-Peer Systems (IPTPS’02), LNCS, vol. 2429, pp. 251–260, March 2002

    Google Scholar 

  25. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), Baltimore, MD, USA, pp. 162–175, November 2004

    Google Scholar 

  26. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  27. Park, T., Shin, K.G.: LiSP: a lightweight security protocol for wireless sensor networks. ACM Trans. Embed. Comput. Syst. 3(3), 634–660 (2004)

    Article  Google Scholar 

  28. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)

    Article  Google Scholar 

  29. IEEE-TG15.4, PART 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard for Information Technology (2003)

    Google Scholar 

  30. Koubaa, A., Alves, M., Tovar, E.: IEEE 802.15.4: a federating communication protocol for time-sensitive wireless sensor networks. In: Sensor Networks and Configurations: Fundamentals, Techniques, Platforms and Experiments, pp. 19–49. Springer, Berlin, Germany (2007)

    Google Scholar 

  31. Shaikh, R.A., Lee, S., Khan, M.A., Song, Y.C.: LSec: lightweight security protocol for distributed wireless sensor network. In: Personal Wireless Communications. Lecture Notes in Computer Science, vol. 4217, pp. 367–377 (2006)

    Google Scholar 

  32. Tripathy, S.: LISA: lightweight security algorithm for wireless sensor networks. In: Proceeding of Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17–20. Lecture Notes in Computer Science, vol. 4882, pp. 129–134 (2007)

    Google Scholar 

  33. Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN '07), pp. 479–488, April 2007

    Google Scholar 

  34. ZigBee Alliance. Zigbee Specification. Technical Report Document, Version 1.0, ZigBee Alliance, 2005

    Google Scholar 

  35. Lighfoot, L.E., Ren, J., Li, T.: An energy efficient link-layer security protocol for wireless sensor networks. In: Proceedings of the IEEE International Conference on Electro/Information Technology (EIT '07), Chicago, IL, USA, pp. 233–238, May 2007

    Google Scholar 

  36. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Google Scholar 

  37. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tut. 7, 2–28 (2005)

    Article  Google Scholar 

  38. Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: Advanced Communication Technology (ICACT), 6p (2006)

    Google Scholar 

  39. European Organization for Nuclear Research (CERN). LHC—The Large Hadron Collider. http://lhc.web.cern.ch (2008)

  40. Culler, D., Estrin, D., Srivastava, M.: Overview of sensor networks. IEEE Comput. 37(8), 41–49 (2004)

    Article  Google Scholar 

  41. Wired and Wireless Intelligent Networked Systems (WINES)—Smart Infrastructure Project. http://www.winesinfrastructure.org/

  42. Lopez, J., Montenegro, J.A., Roman, R.: Service-oriented security architecture for CII based on sensor networks. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), Lyon, France, pp. 1–6, June 2006

    Google Scholar 

  43. He, T., Krishnamurthy, S., Luo, L., Yan, T., Gu, L., Stoleru, R., Zhou, G., Cao, Q., Vicaire, P., Stankovic, J.A., Abdelzaher, T.F., Hui, J., Krogh, B.: VigilNet: an integrated sensor network system for energy-efficient surveillance. ACM Trans. Sens. Netw. 2(1), 1–38 (2006)

    Article  Google Scholar 

  44. Sensor Nets/RFID. Intel Corporation. http://www.intel.com/research/exploratory/wireless_sensors.htm

  45. Millman, G.J.: Accenture. Virtual Vineyard. http://www.accenture.com/Global/Research_and_Insights/Outlook/By_Alphabet/VirtualVineyard.htm

  46. Ramanathan, N., Balzano, L., Estrin, D., Hansen, M., Harmon, T., Jay, J., Kaiser, W.J., Sukhatme, G.: Designing wireless sensor networks as a shared resource for sustainable development. In: Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2006), Berkeley, USA, pp. 256–265, May 2006

    Google Scholar 

  47. Martinez, K., Padhy, P., Elsaify, A., Zou, G., Riddoch, A., Hart, J.K., Ong, H.L.R.: Deploying a sensor network in an extreme environment. In: Proceedings of Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2006), Taichung, Taiwan, pp. 186–193, June 2006

    Google Scholar 

  48. Lees, J.M., Johnson, J.B., Ruiz, M., Troncoso, L., Welsh, M.: Reventador Volcano 2005: eruptive activity inferred from seismo-acoustic observation. J. Volcanol. Geotherm. Res. 176(1), 179–190 (2008)

    Article  Google Scholar 

  49. Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: Proceedings of the 1st European Workshop on Wireless Sensor Networks (EWSN 2004), Berlin, Germany, pp. 307–322, January 2004

    Google Scholar 

  50. University of California, Berkeley. FIRE Project. http://fire.me.berkeley.edu/

  51. Harvard University. The Code Blue Project. http://www.eecs.harvard.edu/~mdw/proj/codeblue

  52. Wood, A., Virone, G., Doan, T., Cao, Q., Selavo, L., Wu, Y., Fang, L., He, Z., Lin, S., Stankovic, J.: ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring. Technical Report CS-2006-11, Department of Computer Science, University of Virginia (2006)

    Google Scholar 

  53. Cadi Scientific Pte Ltd. CADI SmartSenseTM. http://www.cadi.com.sg

  54. Nordic Collaboration Project. Biomedical Wireless Sensor Network Project. http://www.bwsn.net

  55. Minder, D., Marr´on, P.J., Lachenmann, A., Rothermel, K.: Experimental construction of a meeting model for smart office environments. In: Proceedings of the First Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden, June 2005

    Google Scholar 

  56. Krishnamurthy, A., Kamasi, B., McCoy, C., Mallela, K.: Project Laund-re-mote

    Google Scholar 

  57. Watts, W., Koplow, M., Redfern, A., Wright, P.: Application of Multizone HVAC Control Using Wireless Sensor Networks and Actuating Vent Registers. Texas University A&M Repository (2007)

    Google Scholar 

  58. Crossbow Technology, Inc. eKo Pro—Precision Agriculture. http://www.xbow.com/eko/ (2008)

  59. Weiser, M.: The computer for the twenty-first century. Sci. Am. 265(3), 94–104 (1991)

    Article  Google Scholar 

  60. Satyanarayanan, M.: Pervasive computing: vision and challenges. IEEE Pers. Commun. 8(4), 10–17 (2001)

    Article  Google Scholar 

  61. Calabrese, F., Kloeckl, K., Ratti, C., Bilandzic, M., Foth, M., Button, A., Klaebe, H., Forlano, L., White, S., Morozov, P., Feiner, S., Girardin, F., Blat, J., Nova, N., Pieniazek, M.P., Tieben, R., van Boerdonk, K., Klooster, S., van den Hoven, E., Martın Serrano, J., Serrat, J., Michelis, D., Kabisch, E.: Urban computing and mobile devices. IEEE Pervasive Comput. 6(3), 52–57 (2007)

    Article  Google Scholar 

  62. International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)

    Google Scholar 

  63. Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Netw. J. (Elsevier) 3(3), 257279 (2005)

    Google Scholar 

  64. Akyildiz, I.F., Stuntebeck, E.P.: Wireless underground sensor networks: research challenges. Ad Hoc Netw. J. 4(6), 669–686 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. V. Anchugam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Anchugam, C.V., Thangadurai, K. (2017). Security in Wireless Sensor Networks (WSNs) and Their Applications. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44257-0_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44256-3

  • Online ISBN: 978-3-319-44257-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics