Abstract
Wireless sensor network (WSN) is among the latest technologies that promise an emerging future in diverse fields due to its unique capabilities which are to monitor and gather data from different environments by sensors deployed at remote locations. A secure network is a vital necessity of every application. Securing the sensor network that is wirelessly connected becomes an immensely demanding affair because of the limited resources it possesses. The functionality of such networks can be influenced by numerous security threats. In this review paper, a brief description about various security requirements and constraints in a WSN is discussed along with the types of attacks in different layers. Focus is also given on the strengths and limitations of some popular WSN security protocols to enable application designers to choose the appropriate protocol for their applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J.G. Ndia, A survey of security protocols for wireless sensor networks. Int. J. Appl. Comput. Sci. (IJACS) 1(II) (2017)
R.B. Agnihotri, A.V. Singh, S. Verma, Challenges in wireless sensor networks with different performance metrics in routing protocols, in 4th International Conference on Reliability, Infocom Technologies and optimization (ICRITO) (Trends and Future Directions) (IEEE, 2015), pp. 1–5
S. Misra, I. Woungang, S.C. Misra, Guide to Wireless Sensor Networks. (Springer, London Limited, 2009), p. 1
A. Nelli, S. Mangasuli, Wireless sensor networks: an overview on security issues and challenges. Department of CSE, AIET Mijar, India. https://dx.doi.org/10.24001/ijaems.3.3.10
A.S.K. Pathan, H.W. Lee, C.S. Hong, Security in wireless sensor networks: issues and challenges, in The 8th International Conference on Advanced Communication Technology (ICACT 2006), vol. 2 (IEEE, 2006), p. 6
D.G. Padmavathi, M. Shanmugapriya, A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)
Y. Wang, G. Attebury, B. Ramamurthy, A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006)
K. Sunitha, H. Chandrakanth, A survey on security attacks in wireless sensor network. Int. J. Eng. Res. Appl. (IJERA) 2(4), 1684–1691 (2012)
W. Jun, K. Ota, M. Dong, C. Li, A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE Access 4, 416–424 (2016)
L.E. Lighfoot, R. Jian, L. Tongtong, An energy efficient link-layer security protocol for wireless sensor networks, in IEEE EIT Proceedings (2009), pp. 233–238
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)
D.E. Culler, W. Hong, Wireless sensor networks. Commun. ACM 47(6) (2004)
P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in Proceedings of the SCS Communication Networks and Distributed System Modeling and Simulation Conference (CNDS 2002), SanAntonio, TX, USA (2002), pp. 27–31
S. Dai, X. Jing, L. Li, Research and analysis on routing protocols for wireless sensor networks, in Proceedings of International Conference on Communications, Circuits and Systems, vol. 1 (2005), pp. 407–411
A.S. Uluagac, C.P. Lee, R.A. Beyah, J.A. Copeland, Designing secure protocols for wireless sensor networks, in WASA (2008), pp. 503–514
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, D.E. Culler, SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
R. Sharma, Y. Chaba, Y. Singh, Analysis of security protocols in wireless sensor network. Int. J. Adv. Netw. Appl. 2(3), 707–713 (2010)
S. Zhu, S. Setia, S. Jajodia, LEAP+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Netw. (TOSN) 2(4), 500–528 (2006)
I. Krontiris, T. Dimitriou, H. Soroush, M. Salajegheh, WSN link-layer security frameworks. Athens Information Technology, Greece
C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks
A.S. Ahmed, An evaluation of security protocols on wireless sensor network, in TKK T-110.5190 Seminar on Internetworking (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Panwar, P., Verma, R., Rauthan, M.M.S., Barthwal, V. (2021). An Overview on Security Issues, Attacks, Challenges and Protocols in WSN. In: Singh Mer, K.K., Semwal, V.B., Bijalwan, V., Crespo, R.G. (eds) Proceedings of Integrated Intelligence Enable Networks and Computing. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-33-6307-6_27
Download citation
DOI: https://doi.org/10.1007/978-981-33-6307-6_27
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6306-9
Online ISBN: 978-981-33-6307-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)