Skip to main content

An Overview on Security Issues, Attacks, Challenges and Protocols in WSN

  • Conference paper
  • First Online:
Proceedings of Integrated Intelligence Enable Networks and Computing

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

Wireless sensor network (WSN) is among the latest technologies that promise an emerging future in diverse fields due to its unique capabilities which are to monitor and gather data from different environments by sensors deployed at remote locations. A secure network is a vital necessity of every application. Securing the sensor network that is wirelessly connected becomes an immensely demanding affair because of the limited resources it possesses. The functionality of such networks can be influenced by numerous security threats. In this review paper, a brief description about various security requirements and constraints in a WSN is discussed along with the types of attacks in different layers. Focus is also given on the strengths and limitations of some popular WSN security protocols to enable application designers to choose the appropriate protocol for their applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J.G. Ndia, A survey of security protocols for wireless sensor networks. Int. J. Appl. Comput. Sci. (IJACS) 1(II) (2017)

    Google Scholar 

  2. R.B. Agnihotri, A.V. Singh, S. Verma, Challenges in wireless sensor networks with different performance metrics in routing protocols, in 4th International Conference on Reliability, Infocom Technologies and optimization (ICRITO) (Trends and Future Directions) (IEEE, 2015), pp. 1–5

    Google Scholar 

  3. S. Misra, I. Woungang, S.C. Misra, Guide to Wireless Sensor Networks. (Springer, London Limited, 2009), p. 1

    Google Scholar 

  4. A. Nelli, S. Mangasuli, Wireless sensor networks: an overview on security issues and challenges. Department of CSE, AIET Mijar, India. https://dx.doi.org/10.24001/ijaems.3.3.10

  5. A.S.K. Pathan, H.W. Lee, C.S. Hong, Security in wireless sensor networks: issues and challenges, in The 8th International Conference on Advanced Communication Technology (ICACT 2006), vol. 2 (IEEE, 2006), p. 6

    Google Scholar 

  6. D.G. Padmavathi, M. Shanmugapriya, A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)

  7. Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006)

    Google Scholar 

  8. K. Sunitha, H. Chandrakanth, A survey on security attacks in wireless sensor network. Int. J. Eng. Res. Appl. (IJERA) 2(4), 1684–1691 (2012)

    Google Scholar 

  9. W. Jun, K. Ota, M. Dong, C. Li, A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 416–424 (2016)

    Article  Google Scholar 

  10. L.E. Lighfoot, R. Jian, L. Tongtong, An energy efficient link-layer security protocol for wireless sensor networks, in IEEE EIT Proceedings (2009), pp. 233–238

    Google Scholar 

  11. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)

    Article  Google Scholar 

  12. D.E. Culler, W. Hong, Wireless sensor networks. Commun. ACM 47(6) (2004)

    Google Scholar 

  13. P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS 2002), SanAntonio, TX, USA (2002), pp. 27–31

    Google Scholar 

  14. S. Dai, X. Jing, L. Li, Research and analysis on routing protocols for wireless sensor networks, in Proceedings of International Conference on Communications, Circuits and Systems, vol. 1 (2005), pp. 407–411

    Google Scholar 

  15. A.S. Uluagac, C.P. Lee, R.A. Beyah, J.A. Copeland, Designing secure protocols for wireless sensor networks, in WASA (2008), pp. 503–514

    Google Scholar 

  16. A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)

    Article  Google Scholar 

  17. R. Sharma, Y. Chaba, Y. Singh, Analysis of security protocols in wireless sensor network. Int. J. Adv. Netw. Appl. 2(3), 707–713 (2010)

    Google Scholar 

  18. S. Zhu, S. Setia, S. Jajodia, LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500–528 (2006)

    Article  Google Scholar 

  19. I. Krontiris, T. Dimitriou, H. Soroush, M. Salajegheh, WSN link-layer security frameworks. Athens Information Technology, Greece

    Google Scholar 

  20. C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks

    Google Scholar 

  21. A.S. Ahmed, An evaluation of security protocols on wireless sensor network, in TKK T-110.5190 Seminar on Internetworking (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rohan Verma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Panwar, P., Verma, R., Rauthan, M.M.S., Barthwal, V. (2021). An Overview on Security Issues, Attacks, Challenges and Protocols in WSN. In: Singh Mer, K.K., Semwal, V.B., Bijalwan, V., Crespo, R.G. (eds) Proceedings of Integrated Intelligence Enable Networks and Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-6307-6_27

Download citation

Publish with us

Policies and ethics