Advertisement

Security Vulnerabilities and Issues of Traditional Wireless Sensors Networks in IoT

  • Bhanu chanderEmail author
  • Kumaravelan Gopalakrishnan
Chapter
Part of the Intelligent Systems Reference Library book series (ISRL, volume 174)

Abstract

From the past decade, Wireless sensor networks (WSNs) spread out significantly with the result of technological progress in hardware, software, and micro electro mechanical systems. With the enlargement of WSNs, great advances have been shaped in Internet-of-Things (IoT) by an ample variety of applications. IoT applications practiced in myriad phases include human life, ecological supervise, public wellbeing and medical behavior, smart shipping, traffic monitoring, smart cities, smart home applications, smart grid, and others. Mostly Internet of Things maintained with various sensing devices and technologies such as Sensors, GPS (Global positioning system), laser sensor, gas inductor, RFID (Radio-frequency identification devices), infrared sensor and many more, which collects large range features from the real world and send abstract feature objects which need to be monitored. Most of the devices are linked and interacted with more than one. The main idea behind IoT is to connect device-to-device, device-to-human, human-to-human. Development of IoT can make people live in a convenient way; however, it does not make sure the security of secret confidential information of its user. With a great collection of distribution, responsiveness and somewhat high processing capacity of IoT objects formed them as an optimal objective for cyber-attacks. So here some probabilities, secret confidential information may be a leak or stolen some point in time. Just once a sign of IoT device is captured or suspended it intention straightforwardly perturbs the security about whole information of IoT. Moreover, enormous IoT nodes accumulate a large amount of extensive prosperous, private information and process it, so its like lottery for cyber attackers to steal entire important data. Security obstacles like privacy, secure communication, access control, safe storage of data are becoming important tackles in the IoT domain. Hence, each solitary node that we positioned, each solitary device that we discover, each solitary byte that generated within the sphere of an IoT domain, at some point of time comes under inspection in the course of the investigation. An IoT not including proper premeditated solutions for security issues it will principally limit its improvement. So securities, in particular, the ability to detect malicious nodes with preserving support of malicious activities appear as a priority in the successful employment of IoT networks. IoT has three dissimilar layers, each layers security approaches along with defensive methods are briefly described. Blockchain technology will progress the integrity in the real world shared data sets. Primarily blockchain applied in support of recording fiscal transactions where connections encoded (pre-arranged) and kept back with participants, on one occasion transaction confirmed by blockchain it cannot be modeled or else wipe out; if any modification is applied it is easy to map out and recognize. Blockchain technology position in IoT security, challenges, and Research problems in brief discussed.

Keywords

Internet of Things WSN Security Black chain Integrity Key management Security measures 

References

  1. 1.
    Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Future Gen. Comput. Syst. 82, 395–411 (2015)CrossRefGoogle Scholar
  2. 2.
    Jing, Q., Vasilakos, A.V., Wan, J., Lu, J., Qiu, D.: Security of the Internet of Things: perspectives and challenges. Wireless Netw. 20, 2481–2501 (2014)Google Scholar
  3. 3.
    Kouicem, D.E., Bouabdallah, A., Lakhlef, H.: Internet of things security: a top-down survey. Comput. Netw. 1–24 (2018)Google Scholar
  4. 4.
    Sfar, A.R., Natalizio, E., Challal, Y., Chtourou, Z.: A roadmap for security challenges in Internet of Things. Digit. Commun. Netw. (2017).  https://doi.org/10.1016/j.dcan.2017.04.003CrossRefGoogle Scholar
  5. 5.
    Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146 (2015)Google Scholar
  6. 6.
    Zhao, K., Ge, L.: A survey on the Internet of Things security. In: 2013 Ninth International Conference on Computational Intelligence and Security (2013)Google Scholar
  7. 7.
    Bhanu chander, Kumaravelan: Simple and secure authentication in wireless sensor network using digital certification. Int. J. Pure Appl. Math. 119(16), 137–143 (2018)Google Scholar
  8. 8.
    Bhanu chander, Kumaravelan: Introduction to WSN. Soft Computing in WSN. CRC Press/Taylor and Francis Publications (2018)Google Scholar
  9. 9.
    Sen, J.: Security in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1 & 2) (2014)Google Scholar
  10. 10.
    Alam, S., De, D.: Analysis of security threats in wireless sensor network. Int. J. Wireless Mob. Netw. (IJWMN) 6(2) (2014)Google Scholar
  11. 11.
    Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4(1 & 2) (2009)Google Scholar
  12. 12.
    Akyildiz, I.F., Su, W., Sanakarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)CrossRefGoogle Scholar
  13. 13.
    Hamad, F., Smalov, L., James, A.: Energy-aware security in M-Commerce and the internet of things. IETE Tech. Rev. 26(5), 357–362 (2009)Google Scholar
  14. 14.
    Tsudik, G.: YA-TRAP: yet another trivial RFID authentication protocol. In: Proceedings of Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 196–200 (2006)Google Scholar
  15. 15.
    Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of Mobile Communications, pp. 128–139 (2008)Google Scholar
  16. 16.
    Montenegro, G., Castelluccia, C.: Crypto-based identifiers (CBIDs): concepts and applications. ACM Trans. Inf. Syst. Secur. 7(1), 97–127 (2004)CrossRefGoogle Scholar
  17. 17.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. Secur. Pervas. Comput. 201–212 (2004)Google Scholar
  18. 18.
    Juels, A., Rivest, R.L., Szydlo, M.: The blocker tag: selective blocking of RFID tags for consumer privacy. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 103–111 (2003)Google Scholar
  19. 19.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic approach to privacy-friendly tags. In: RFID Privacy Workshop, p. 82. MIT, Cambridge, MA (2003)Google Scholar
  20. 20.
    Lakafosis, V., Traille, A., Lee, H.: RFID-CoA: the RFID tags as certificates of authenticity. In: Proceedings of the IEEE International Conference on RFID, pp. 207–214 (2011)Google Scholar
  21. 21.
    Hu, F., Wang, F.: Study of recent development about privacy and security of the internet of things. In: Proceedings of the International Conference on Web Information Systems and Mining, pp. 91–95 (2010)Google Scholar
  22. 22.
    Lv, B.Y., Pan, J.X., Ma, Q., Xiao, Z.H.: Research progress and application of RFID anti-collision algorithm. In: Proceedings of the International Conference on Telecommunication Engineering, vol. 48, no. 7, pp. 124–128 (2008)Google Scholar
  23. 23.
    Finkenzeller, K.: RFID Handbook Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd edn. Wiley, West Sussex (2003)Google Scholar
  24. 24.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, pp. 162–175 (2004)Google Scholar
  25. 25.
    Chen, M., Lai, C., Wang, H.: Mobile multimedia sensor networks: architecture and routing. EURASIP J. Wireless Commun. Netw. 1–9 (2011)Google Scholar
  26. 26.
    Han, K., Luo, J., Liu, Y., Vasilakos, V.: Algorithm design for data communications in duty-cycled wireless sensor networks: a survey. IEEE Commun. Mag. 51(7), 107–113 (2013)CrossRefGoogle Scholar
  27. 27.
    Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the IEEE International Conference on Sensor and Ad Hoc Communications and Networks SECON04, pp. 71–80 (2004)Google Scholar
  28. 28.
    Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Netw. 1(1), 175–192 (2003)CrossRefGoogle Scholar
  29. 29.
    Huang, C.H., Du, D.Z.: New constructions on broadcast encryption and key pre-distribution schemes. In: IEEE INFOCOM, pp. 515–523 (2005)Google Scholar
  30. 30.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 197–213 (2003)Google Scholar
  31. 31.
    Ren, F.Y., Huang, H.N., Lin, C.: Wireless sensor networks. J. Softw. 1282–1290 (2003)Google Scholar
  32. 32.
    Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)CrossRefGoogle Scholar
  33. 33.
    Cao, Z., Hu, J.B., Chen, Z., Xu, M.X., Zhou, X.: Feedback: towards dynamic behavior and secure routing in wireless sensor networks. In: Proceedings of the IEEE Workshop on Pervasive Computing and Ad-hoc Communication (PCAC’06), vol. 2, pp. 160–164 (2006)Google Scholar
  34. 34.
    Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)CrossRefGoogle Scholar
  35. 35.
    Douceur, J.R.: The Sybil attack. In: Proceeding of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’02), pp. 251–260 (2002)Google Scholar
  36. 36.
    KSW Microtec AG: KSW—TempSens (2013). http://www.ksw-microtec.de/www/doc/overviewtempsens1124436343en.pdf. Accessed 12 Oct
  37. 37.
    Wang, K., Bao, J., Wu, M., Lu, W.: Research on security management for internet of things. In: Proceeding of the IEEE International Conference on Computer Application and System Modeling (ICCASM), vol. 15, pp. 133–137 (2010)Google Scholar
  38. 38.
    Zhang, L., Wang, Z.: Integration of RFID into wireless sensor networks: architectures, opportunities and challenging problems. In: Proceeding of the IEEE Fifth International Conference on Grid and Cooperative Computing Workshops GCCW ‘06 (58), pp. 463–469 (2006)Google Scholar
  39. 39.
    Li, C., Chen, C.L.: A multi-stage control method application in the fight against phishing attacks. In: Proceeding of the 26th Computer Security Academic Communication Across the Country, pp. 145–153 (2011)Google Scholar
  40. 40.
    Liu, Z.Y., Yang, Z.C.: Ad hoc network and security analysis. Comput. Technol. Dev. 16(1) (2006)Google Scholar
  41. 41.
    Avudainayagam, A., Lou, W., Fang, Y.: DEAR: a device and energy aware routing protocol for heterogeneous ad hoc networks. Parallel Distrib. Comput. 63(2), 228–236 (2003)CrossRefGoogle Scholar
  42. 42.
    Yang, Z.W.: Look the internet of things from the internet and 3G. Radio frequency (rf) in the world, (01) (2010)Google Scholar
  43. 43.
    Zhang, B., Zou, Z., Liu, M.: Evaluation on security system of internet of things based on fuzzy-AHP method. In: Proceeding of the IEEE International Conference on E-Business and E-Government (ICEE), pp. 1–5 (2011)Google Scholar
  44. 44.
    Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 557–570 (2002)Google Scholar
  45. 45.
    de Saint-Exupery, A.: Internet of things [EB/OL]. http://www.sintef.no/upload/IKT/9022/CERP-IoT%20SRA_IoT_vll_pdf.pf. Accessed 12 Oct 2013
  46. 46.
    Zhang, D., Zhou, J., Guo, M., Cao, J., Li, T.: TASA: tag-free activity sensing using RFID tag arrays. IEEE Trans. Parallel Distrib. Syst. 22(4), 558–570 (2011)CrossRefGoogle Scholar
  47. 47.
    Zai, L., Liu, S.D., Hu, X.B.: ZigBee Technology and Application. Beijing University of Aeronautics and Astronautics Press, Beijing (2007)Google Scholar
  48. 48.
    Shao, P.F., Wang, Z., Zhang, B.R.: Smart home system research for the mobile internet. Comput. Meas. Control 20(2), 474–476 (2012)Google Scholar
  49. 49.
    Da Costa Júnior, E.P.: An Architecture for Self-adaptive Distributed FirewallGoogle Scholar
  50. 50.
    Li, B., Lu, R., Wang, W., Choo, K.-K.R.: Distributed host-based collaborative detection for false data injection attacks in smart grid cyberphysical system. J. Parallel Distrib. Comput. 103, 32–41 (2017)CrossRefGoogle Scholar
  51. 51.
    Almotiri, S.H., Khan, M.A., Alghamdi, M.A.: Mobile health (m-Health) system in the context of IoT. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, pp. 39–42 (2016)Google Scholar
  52. 52.
    Papastergiou, S., Polemi, N., Karantjias, A.: CYSM: an innovative physical/cyber security management system for ports. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 219–230 (2015)Google Scholar
  53. 53.
    Wang, X., Zha, X., Ni, W.: Survey on block chain for Internet of Things. Comput. Commun. (2019).  https://doi.org/10.1016/j.comcom.2019.01.006CrossRefGoogle Scholar
  54. 54.
    Ejaz, W., Anpalagan, A.: Internet of Things for Smart Cities. Springer Briefs in Electrical and Computer Engineering (2017).  https://doi.org/10.1007/978-3-319-95037-2_5
  55. 55.
    Efanov, D., Roschin, P.: The all-pervasiveness of Blockchain Technology. In: 8th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2017. Procedia Computer Science, pp. 116–121 (2018)Google Scholar
  56. 56.
    Gordon, W.J., Catalini, C.: Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)CrossRefGoogle Scholar
  57. 57.
    Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future for internet of things security: a position paper. Digit. Commun. Netw. 149–160 (2018)Google Scholar
  58. 58.
    Rennock, M.J.W., Cohn, A., Butcher, J.R.: Blockchain Technology and Regulatory Investigation, February/March 2018 | Practical Law© 2018 Thomson Reuters (2018)Google Scholar
  59. 59.
    Nuce, M.: Blockchain and Data Sharing. CSCMP Hot Topics, April 6 (2018)Google Scholar
  60. 60.
    Banerjee, M., Lee, J., Choo, K.-K.R.: A blockchain future to Internet of Things security: a position paper. Digit. Commun. Netw. (2017).  https://doi.org/10.1016/j.dcan.2017.10.006CrossRefGoogle Scholar
  61. 61.
    Zhang, P., White, J., Schmidt, D.C., Lenz, G., Trent Rosenbloom, S.: FHIRChain: applying blockchain to securely and scalably share clinical data. Comput. Struct. Biotechnol. J. 16, 267–278 (2018)CrossRefGoogle Scholar
  62. 62.
    Greenspan, G.: Blockchains vs centralized databases (2018). Available at https://www.multichain.com/blog/2016/03/blockchains-vs-centralized-databases. Accessed 16 Jul 2018
  63. 63.
    Dubovitskaya, A., Xu, Z., Ryu, S., Schumacher, M., Wang, F.: Secure and trustable electronic medical records sharing using blockchain. arXiv preprint arXiv:1709.06528 (2017)
  64. 64.
    Guo, Y., Liang, C.: Blockchain application and outlook in the banking industry. Financ. Innov. 2(1), 24 (2016)Google Scholar
  65. 65.
    Zhang, Y., Wen, J.: The IoT electric business model: using blockchain technology for the internet of things. Peer-to-Peer Netw. Appl. 1–12 (2016)Google Scholar
  66. 66.
    Jin, Y., Tomoishi, M., Matsuura, S.: Enhancement of VPN authentication using GPS information with geo-privacy protection. In: 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp. 1–6 (2016)Google Scholar
  67. 67.
    Keshri, A., Singh, S., Agarwal, M., Nandiy, S.K.: DoS attacks prevention using IDS and data mining. In: 2016 International Conference on Accessibility to Digital World (ICADW), Guwahati, pp. 87–92 (2016)Google Scholar
  68. 68.
    Filipek, J., Hudec, L.: Securing mobile ad hoc networks using distributed firewall with PKI. In: 2016 IEEE 14th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herlany, pp. 321–325 (2016)Google Scholar
  69. 69.
    Dewanjee, R.: Intrusion Filtration System (IFS)-mapping network security in new way. In: 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 527–531 (2016)Google Scholar
  70. 70.
    Kalnoor, G., Agarkhed, J.: Pattern matching intrusion detection technique for Wireless Sensor Networks. In: 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-informatics (AEEICB), Chennai, pp. 724–728 (2016)Google Scholar
  71. 71.
    Yacchirena, A., Alulema, D., Aguilar, D., Morocho, D., Encalada, F., Granizo, E.: Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. In: 2016 IEEE International Conference on Automatica (ICA-ACCA), Curico, pp. 1–7 (2016)Google Scholar
  72. 72.
    Jokar, P., Leung, V.: Intrusion detection and prevention for ZigBee-based home area networks in smart grids. In: IEEE Transactions on Smart Grid (2017)Google Scholar
  73. 73.
    Saracino, A., Sgandurra, D., Dini, G., Martinelli, F.: MADAM: effective and efficient behavior-based android malware detection and prevention. In: IEEE Transactions on Dependable and Secure Computing, vol. 9, pp. 1–12 (2017)Google Scholar
  74. 74.
    Osop, H., Sahama, T.: Quality evidence, quality decisions: ways to improve security and privacy of EHR systems. In: 2016 IEEE 18th International Conference on eHealth Networking, Applications and Services (Healthcom), Munich, pp. 1–6 (2016)Google Scholar
  75. 75.
    Sharma, A., Bhuriya, D., Singh, U.: Secure data transmission on MANET by hybrid cryptography technique. In: 2015 International Conference on Computer, Communication and Control (IC4), Indore, pp. 1–6 (2015)Google Scholar
  76. 76.
    Indumathi, G., Sakthivel, S.: Securely detecting an intruders in MANETs system. In: International Conference on Information Communication and Embedded Systems (ICICES2014), Chennai, pp. 1–5 (2014)Google Scholar
  77. 77.
    Hiran, R., Carlsson, N., Shahmehri, N.: PrefiSec: a distributed alliance framework for collaborative BGP monitoring and prefix-based security. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security (WISCS ‘14). ACM, New York, NY, USA, pp. 3–12 (2014)Google Scholar
  78. 78.
    Wagner, C.: MISP: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM (2016)Google Scholar
  79. 79.
    Bouchami, A., Goettelmann, E., Perrin, O., Godart, C.: Enhancing access-control with risk-metrics for collaboration on social cloud-platforms. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, pp. 864–871 (2015)Google Scholar
  80. 80.
    Bennaceur, A., Bandara, A.K., Jackson, M., Liu, W., Montrieux, L., Tun, T.T., Yu, Y., Nuseibeh, B.: Requirements-driven mediation for collaborative security. In: Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-managing Systems (SEAMS 2014), pp. 37–42. ACM, New York, NY, USA (2014)Google Scholar
  81. 81.
    Arya, N., Singh, U., Singh, S.: Detecting and avoiding of wormhole attack and collaborative blackhole attack on MANET using trusted AODV routing algorithm. In: 2015 International Conference on Computer, Communication and Control (IC4), Indore, pp. 1–5 (2015)Google Scholar
  82. 82.
    Pan, X., Yegneswaran, V., Chen, Y., Porras, P., Shin, S.: HogMap: using SDNs to incentivize collaborative security monitoring. In: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFV Security ‘16), pp. 7–13. ACM, New York, NY, USA (2016)Google Scholar
  83. 83.
    Gaurav, K., Goyal, P., Agrawal, V., Rao, S.L.: IoT transaction security. In: 5th International Conference on the Internet of Things (IoT), Seoul, South Korea (2015)Google Scholar
  84. 84.
    Hashemi, S.H., Faghri, F., Rausch, P., Campbell, R.H.: World of empowered IoT users. In: 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI), pp. 13–24. IEEE (2016).  https://doi.org/10.1109/iotdi.2015.39
  85. 85.
    Atzori, M.: Blockchain-based architectures for the internet of things: a survey (2017). Available at SSRN: https://ssrn.com/abstract=2846810
  86. 86.
    Kokoris-Kogias, L., Gasser, L., Khoffi, I., Jovanovic, P., Gailly, N., Ford, B.: Managing identities using blockchains and CoSi. In: 9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016), EPFL-TALK-220210 (2016)Google Scholar
  87. 87.
    Yue, X., Wang, H., Jin, D., Li, M., Jiang, W.: Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. J. Med. Syst. 40(10), 218 (2016).  https://doi.org/10.1007/s10916-016-0574-6CrossRefGoogle Scholar
  88. 88.
    Conoscenti, M., Vetrò, A., De Martin, J.C.: Block Chain for the Internet of Things: A Systematic Literature Review, pp. 1–6 (2016)Google Scholar
  89. 89.
    Biswas, K., Muthukkumarasamy, V.: Securing smart cities using blockchain technology. In: 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1392–1393. IEEE (2016).  https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0198
  90. 90.
    Hardjono, T., Smith, N.: Cloud-based commissioning of constrained devices using permissioned blockchains. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, pp. 29–36. ACM (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Computer Science and Engineering, Pondicherry UniversityPondicherryIndia

Personalised recommendations