Abstract
As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due to inherent resource and computing constraints, security in sensor networks poses different challenges than traditional network/computer security. There is currently enormous research potential in the field of wireless sensor network security. Thus, familiarity with the current research in this field will benefit researchers greatly. With this in mind, we survey the major topics in wireless sensor network security, present the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chong, C., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. Proc. IEEE 91(8), 1247–1256 (2003)
Nishimura, C.E., Conlon, D.M.: IUSS dual use: monitoring whales and earthquakes using SOSUS. Mar. Technol. Soc. J. 27(4), 13–21 (1994)
Proceedings of the Distributed Sensor Nets Workshop. Carnegie Mellon University, Pittsburgh, USA (1978)
Rashid, R., Robertson, G.: Accent: a communication oriented network operating system kernel. ACM SIGOPS Operating Systems Review, vol. 15, no. 5, December 1981
Lacoss, R.T.: Distributed mixed sensor aircraft tracking. In: Proceedings of the 6th American Control Conference, pp. 1827–1830, Minneapolis, USA, June 1987
Lesser, V.R., Corkill, D.D.: The distributed vehicle monitoring testbed: a tool for investigating distributed problem solving networks. Readings from the AI magazine, pp. 69–85, ISBN: 0-929280-01-6 (1989)
Chong, C.Y., Chang, K.C., Mori, S.: Distributed tracking in distributed sensor networks. In: Proceedings of the American Control Conference (1982)
DARPA. SensIT—Sensor Information Technology. http://www.sainc.com/sensit/goals.htm
Smart-Its Consortium. The Smart-Its Project. http://www.smart-its.org/
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Wilson, J.: Technology. Sensor, Handbook. Newnes, Elsevier, Burlington, MA (2005)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey sensor on I.E.E. networks. IEEE Commun. Mag., 40(8), pp. 102–114, (2002)
Karlof, C., Wagner, D.: Secure routing in sensor networks: attacks and countermeasures. Ad Hoc Netw. J. (Elsevier), Special Issue on Sensor Network (SNPA), pp. 293–315, September 2003
Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surv. Tut. 11(2), 52–73 (2009). Second Quarter
Saxena, M.: Security in Wireless Sensor Networks—A Layer Based Classification. Technical Report, Center for Education and Research in Information Assurance and Security-CERIAS, Purdue University. pages.cs.wisc.edu/~msaxena/papers/2007-04-cerias.pdf (2007)
Sen, J.: A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1(2), 59–82 (2009)
Mohanty, P., Panigrahi, S., Sarma, N., Satapathy, S.S.: Security issues in wireless data gathering protocols. J. Theor. Appl. Inf. Technol. 13(1), 14–27 (2010)
Wang, X., Gu, W., Schosek, K., Chellappan, S., Xuan, D.: Sensor Network Configuration Under Physical Attacks. Technical Report (OSU-CISRC-7/04-TR45), Department of Computer Science and Engineering, Ohio State University, July 2004
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Sharifnejad, M., Shari, M., Ghiasabadi, M., Beheshti, S.: A survey on wireless sensor networks security. SETIT (2007)
Wang, B.T., Schulzrinne, H.: An IP traceback mechanism for reflective DoS attacks. In: Canadian Conference on Electrical and Computer Engineering, vol. 2, pp. 901–904, 2–5 May 2004
Wood, A.D., Stankovic, J.: Denial of service in sensor network. IEEE Comput. Mag. 35(10), 54–62 (2002)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2003
Douceur, J.R.: The Sybil attack. In: First International Workshop on Peer-to-Peer Systems (IPTPS’02), LNCS, vol. 2429, pp. 251–260, March 2002
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04), Baltimore, MD, USA, pp. 162–175, November 2004
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Park, T., Shin, K.G.: LiSP: a lightweight security protocol for wireless sensor networks. ACM Trans. Embed. Comput. Syst. 3(3), 634–660 (2004)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. Computer 35(10), 54–62 (2002)
IEEE-TG15.4, PART 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), IEEE Standard for Information Technology (2003)
Koubaa, A., Alves, M., Tovar, E.: IEEE 802.15.4: a federating communication protocol for time-sensitive wireless sensor networks. In: Sensor Networks and Configurations: Fundamentals, Techniques, Platforms and Experiments, pp. 19–49. Springer, Berlin, Germany (2007)
Shaikh, R.A., Lee, S., Khan, M.A., Song, Y.C.: LSec: lightweight security protocol for distributed wireless sensor network. In: Personal Wireless Communications. Lecture Notes in Computer Science, vol. 4217, pp. 367–377 (2006)
Tripathy, S.: LISA: lightweight security algorithm for wireless sensor networks. In: Proceeding of Distributed Computing and Internet Technology, 4th International Conference, ICDCIT 2007, Bangalore, India, December 17–20. Lecture Notes in Computer Science, vol. 4882, pp. 129–134 (2007)
Luk, M., Mezzour, G., Perrig, A., Gligor, V.: MiniSec: a secure sensor network communication architecture. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks (IPSN '07), pp. 479–488, April 2007
ZigBee Alliance. Zigbee Specification. Technical Report Document, Version 1.0, ZigBee Alliance, 2005
Lighfoot, L.E., Ren, J., Li, T.: An energy efficient link-layer security protocol for wireless sensor networks. In: Proceedings of the IEEE International Conference on Electro/Information Technology (EIT '07), Chicago, IL, USA, pp. 233–238, May 2007
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)
Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surv. Tut. 7, 2–28 (2005)
Pathan, A.S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: Advanced Communication Technology (ICACT), 6p (2006)
European Organization for Nuclear Research (CERN). LHC—The Large Hadron Collider. http://lhc.web.cern.ch (2008)
Culler, D., Estrin, D., Srivastava, M.: Overview of sensor networks. IEEE Comput. 37(8), 41–49 (2004)
Wired and Wireless Intelligent Networked Systems (WINES)—Smart Infrastructure Project. http://www.winesinfrastructure.org/
Lopez, J., Montenegro, J.A., Roman, R.: Service-oriented security architecture for CII based on sensor networks. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), Lyon, France, pp. 1–6, June 2006
He, T., Krishnamurthy, S., Luo, L., Yan, T., Gu, L., Stoleru, R., Zhou, G., Cao, Q., Vicaire, P., Stankovic, J.A., Abdelzaher, T.F., Hui, J., Krogh, B.: VigilNet: an integrated sensor network system for energy-efficient surveillance. ACM Trans. Sens. Netw. 2(1), 1–38 (2006)
Sensor Nets/RFID. Intel Corporation. http://www.intel.com/research/exploratory/wireless_sensors.htm
Millman, G.J.: Accenture. Virtual Vineyard. http://www.accenture.com/Global/Research_and_Insights/Outlook/By_Alphabet/VirtualVineyard.htm
Ramanathan, N., Balzano, L., Estrin, D., Hansen, M., Harmon, T., Jay, J., Kaiser, W.J., Sukhatme, G.: Designing wireless sensor networks as a shared resource for sustainable development. In: Proceedings of the International Conference on Information and Communication Technologies and Development (ICTD 2006), Berkeley, USA, pp. 256–265, May 2006
Martinez, K., Padhy, P., Elsaify, A., Zou, G., Riddoch, A., Hart, J.K., Ong, H.L.R.: Deploying a sensor network in an extreme environment. In: Proceedings of Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2006), Taichung, Taiwan, pp. 186–193, June 2006
Lees, J.M., Johnson, J.B., Ruiz, M., Troncoso, L., Welsh, M.: Reventador Volcano 2005: eruptive activity inferred from seismo-acoustic observation. J. Volcanol. Geotherm. Res. 176(1), 179–190 (2008)
Szewczyk, R., Polastre, J., Mainwaring, A., Culler, D.: Lessons from a sensor network expedition. In: Proceedings of the 1st European Workshop on Wireless Sensor Networks (EWSN 2004), Berlin, Germany, pp. 307–322, January 2004
University of California, Berkeley. FIRE Project. http://fire.me.berkeley.edu/
Harvard University. The Code Blue Project. http://www.eecs.harvard.edu/~mdw/proj/codeblue
Wood, A., Virone, G., Doan, T., Cao, Q., Selavo, L., Wu, Y., Fang, L., He, Z., Lin, S., Stankovic, J.: ALARM-NET: Wireless Sensor Networks for Assisted-Living and Residential Monitoring. Technical Report CS-2006-11, Department of Computer Science, University of Virginia (2006)
Cadi Scientific Pte Ltd. CADI SmartSenseTM. http://www.cadi.com.sg
Nordic Collaboration Project. Biomedical Wireless Sensor Network Project. http://www.bwsn.net
Minder, D., Marr´on, P.J., Lachenmann, A., Rothermel, K.: Experimental construction of a meeting model for smart office environments. In: Proceedings of the First Workshop on Real-World Wireless Sensor Networks (REALWSN 2005), Stockholm, Sweden, June 2005
Krishnamurthy, A., Kamasi, B., McCoy, C., Mallela, K.: Project Laund-re-mote
Watts, W., Koplow, M., Redfern, A., Wright, P.: Application of Multizone HVAC Control Using Wireless Sensor Networks and Actuating Vent Registers. Texas University A&M Repository (2007)
Crossbow Technology, Inc. eKo Pro—Precision Agriculture. http://www.xbow.com/eko/ (2008)
Weiser, M.: The computer for the twenty-first century. Sci. Am. 265(3), 94–104 (1991)
Satyanarayanan, M.: Pervasive computing: vision and challenges. IEEE Pers. Commun. 8(4), 10–17 (2001)
Calabrese, F., Kloeckl, K., Ratti, C., Bilandzic, M., Foth, M., Button, A., Klaebe, H., Forlano, L., White, S., Morozov, P., Feiner, S., Girardin, F., Blat, J., Nova, N., Pieniazek, M.P., Tieben, R., van Boerdonk, K., Klooster, S., van den Hoven, E., Martın Serrano, J., Serrat, J., Michelis, D., Kabisch, E.: Urban computing and mobile devices. IEEE Pervasive Comput. 6(3), 52–57 (2007)
International Telecommunication Union. The Internet of Things. ITU Internet Reports (2005)
Akyildiz, I., Pompili, D., Melodia, T.: Underwater acoustic sensor networks: research challenges. Ad Hoc Netw. J. (Elsevier) 3(3), 257279 (2005)
Akyildiz, I.F., Stuntebeck, E.P.: Wireless underground sensor networks: research challenges. Ad Hoc Netw. J. 4(6), 669–686 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Anchugam, C.V., Thangadurai, K. (2017). Security in Wireless Sensor Networks (WSNs) and Their Applications. In: Alsmadi, I., Karabatis, G., Aleroud, A. (eds) Information Fusion for Cyber-Security Analytics. Studies in Computational Intelligence, vol 691. Springer, Cham. https://doi.org/10.1007/978-3-319-44257-0_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-44257-0_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44256-3
Online ISBN: 978-3-319-44257-0
eBook Packages: EngineeringEngineering (R0)