Skip to main content

Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks

  • Conference paper
Communications Infrastructure. Systems and Applications in Europe (EuropeComm 2009)

Abstract

Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security threats is overlooked as researchers’ work appear limited in classification of security threats and, 2) security threats are not associated with security frameworks. In this paper, we perform classification of security threats comprehensively whereas, associating these threats to a security framework; we lead in this direction. We find that specifically to assess the impact of these threats.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zia, T., Zomaya, A.: A security Framework for Wireless Sensor Networks. In: SAS 2006 – IEEE Sensors Application Symposium, Houston, Texas, USA, February 7-9 (2006)

    Google Scholar 

  2. Zou, K.C.Y.: Uncertainty-aware and Coverage-oriented Deployment for Sensor Networks. Journal of Parallel and Distributed Computing 64(7), 788–798 (2004)

    Article  Google Scholar 

  3. Ashraf, A., Hashmani, M., Mussadiq, M., Chowdhry, B.S., et al.: A Pretty Safe Strategy for Analyzing Discrete Security Assessment Framework in Wireless Sensor Networks, Communications in Computer and Information Science, November 14, 2008. Book of Wireless Networks, Information Processing and Systems, vol. 20, pp. 445–448. Springer, Heidelberg (2008)

    Google Scholar 

  4. Ashraf, A., Hashmani, M., Mussadiq, M., Chowdhry, B.S.: Design and Analysis of the Security Assessment Framework for Achieving Discrete Security Values in Wireless Sensor Networks, Electrical and Computer Engineering, 2008. In: CCECE 2008. Canadian Conference on Electrical and Computer Engineering, May 4-7, pp. 855–860 (2008)

    Google Scholar 

  5. Ilyas, M., Mahgoub, I.: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems (2004) ISBN 0-8493-1968-4, TK7872.D48.H36

    Google Scholar 

  6. Muraleedharan, R., Osadciw, L.A.: Jamming Attack Detection and Countermeasures. In: Wireless Sensor Network Using Ant System, Department of Electrical Engineering and Computer Science, pp. 13244–11240. Syracuse University, Syracuse

    Google Scholar 

  7. Crespo, R.G.: Slides on Mobile Systems Security, WSN Security Threats’, Copyright Departmento de Engenharia, Electrotecnica, e de Computadores (Fall 2006)

    Google Scholar 

  8. Akojwar, S.G., Patrikar, R.M.: Classification Techniques with Cooperative Routing for Industrial Wireless Sensor Networks. In: Advances in Computer and Information Sciences and Engineering, pp. 503–508. Springer, Netherlands (2008)

    Chapter  Google Scholar 

  9. Kaplantzis, S., Mani, N.: A Study on Classification Techniques for Network Intrusion Detection. In: Proceedings of the IASTED International Conference on Networks and Communication Systems, year of publication (2006)

    Google Scholar 

  10. Kim, Y., Jeong, S., Kim, D.: A GMM-Based Target Classification Scheme for a Node in Wireless Sensor Networks. IEICE Transactions on Communications E91-B(11), 3544–3551 (2008); doi:10.1093/ietcom/e91-b.11.3544, The Institute of Electronics, Information and Communication Engineers

    Google Scholar 

  11. Kim, D.S., Shazzad, K.M., Park, J.S.: A Framework of Survivability Model for Wireless Sensor Network. In: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 515–522 (2006) ISBN:0-7695-2567-9

    Google Scholar 

  12. Kaplantzis, S., Mani, N.: Security Models of Wireless Sensor Networks, final review report for PhD (2007), http://users.monash.edu.au/~skap3/

  13. Barnum, S., Gegick, M.: Defense in Depth, pp. 2005–2009. Cigital, Inc., on 2005-09-13, Copyright (2005)

    Google Scholar 

  14. The Living Dictionary, Series of Longman Dictionary of Contemporary English, Copyright Pearsons Education (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ashraf, A., Rajput, A., Mussadiq, M., Chowdhry, B.S., Hashmani, M. (2009). Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks. In: Mehmood, R., Cerqueira, E., Piesiewicz, R., Chlamtac, I. (eds) Communications Infrastructure. Systems and Applications in Europe. EuropeComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 16. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11284-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11284-3_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11283-6

  • Online ISBN: 978-3-642-11284-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics