WSN Security

Part of the Signals and Communication Technology book series (SCT)


The ubiquitous nature of WSN applications and their access to confidential information, either sensed directly or gained from their environments, makes them attractive targets for unscrupulous individuals to subvert, in an attempt to gain access to the WSNs and/or disrupt the interactions of users with both the networks and subsequently with their environment. Consequently, providing effective security is crucial for the successful adoption and operation of WSNs. We cannot deploy such a critical technology without first addressing the security and privacy challenges to ensure that it does not compromise those whom it is meant to benefit. This chapter provides a general review and categorization of the fundamental security primitives required to establish secure WSNs. The ZigBee security service is introduced as an example. The chapter then discusses Denial of Service (DoS) attacks and defences, focusing on the threat of a DoS attack on a WSN. A framework for increasing the resistance of WSNs to remote DoS threats is introduced, implemented, and evaluated using a WSN based home automation as a case study.


Security Denial of service (DoS) attack 


  1. Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)CrossRefGoogle Scholar
  2. Chiba, T., Katoh, T., Bista, B.B., Takata, T.: DoS packet filter using DNS information. Proceedings of 20th International Conference on Advanced Information Networking and Applications, Vienna, Austria, April 2006, pp. 6–11Google Scholar
  3. Du, X., Chen, H.: Security in wireless sensor networks. IEEE Wirel. Commun. 15(4), 60–66 (2008)MathSciNetCrossRefGoogle Scholar
  4. Elahi, A., Gschwender, A.: ZigBee Wireless Sensor and Control Network. Prentice Hall, NJ (2009)Google Scholar
  5. Gill, K., Yang, S.H.: Secure Remote Access for Home Automation Systems’, Measurement + Control, vol. 41(10), pp. 305–309 (2008)Google Scholar
  6. Gill, K., Yang, S.H., Yao, F., Lu, X.: A Zigbee-based home automation system. IEEE Trans. Consum. Electron. 55(2), 422–430 (2009)CrossRefGoogle Scholar
  7. ITU-T.: Security architecture for open systems interconnection for CCITT applications—recommendation X.800. Available at (1991)
  8. Kwon, T., Hong, J.: Secure and efficient broadcast authentication in wireless sensor networks. IEEE Trans. Comput. 59(8), 1120–1133 (2010)MathSciNetCrossRefGoogle Scholar
  9. Mirkovic, J. Prier, G., Reiher, P.: Source-end DDoS defense. Proceedings of the Second IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA, April 2003, pp. 171–178Google Scholar
  10. Mirkovic, J.: D-WARD: Source-end defense against distributed denial-of-service attacks. PhD Thesis in University of California (2003)Google Scholar
  11. Ning, P., Liu, A., Du, W.L.: Mitigation DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Netw. 4(1), 1–35 (2008)CrossRefGoogle Scholar
  12. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)CrossRefGoogle Scholar
  13. Ratul, M., Steven, M.B., Sally, F., John, I., Vern, P., Shenker, S.: Controlling high bandwidth aggregates in the network. ACM SIGCOMM Comput. Commun. Rev. 32(3), 62–73 (2002)CrossRefGoogle Scholar
  14. Ricciato, F., Coluccia, A., D’Alconzo, A.: A review of DoS attack models for 3G cellular networks from a system-design perspective. Comput. Commun. 33(5), 551–558 (2010)CrossRefGoogle Scholar
  15. Schuba, C.L., Krsul, I.V., Kuhn, M.G., Spafford, E.H., Sundaram, A., Zamboni, D.: Analysis of a denial of service attack on TCP. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 208–303Google Scholar
  16. Thomer, M.G., Massimiliano, P.: MULTOPS: A data-structure for bandwidth attack detection. Proceedings of 10th Usenix Security Symposium, Washington, D.C., USA, August 2001, pp. 23–29Google Scholar
  17. Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Comput. 35(10), 54–62 (2002)Google Scholar
  18. ZigBee Alliance.: ZigBee specification. Available at Last Accessed June 2012

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of LoughboroughLoughboroughUK

Personalised recommendations