Skip to main content

Data Security in Wireless Sensor Networks: Attacks and Countermeasures

  • Conference paper
  • First Online:
Mobile Radio Communications and 5G Networks

Abstract

Secure routing of information is one of the major concerns of specialist working in the field of wireless sensor networks (WSNs) as sensor nodes gather information from the physical world and transmit to base stations for authorized users to access via the internet. In a WSN, sensor nodes are deployed most of the times in unattended locations where there is the possibility of authorized or unauthorized access. This and others have brought the need to secure transmitted information from intruders. Though there are many ways to provide security to a network, cryptography has been identified as the best way for these main three security requirements which include: data confidentiality, authentication, and integrity (CIA). In this paper, we present an overview of the present challenges in a WSN and outline a number of countermeasures to solve these challenges. To tackle the challenge of security encountered in existing WSN systems, we propose an efficient and robust encryption and decryption algorithms for secure communication. The major key feature of this algorithm is that it combines both substitution and transposition cipher techniques in order to achieve the encrypted text. The algorithm is the outcome of the inspection of various existing algorithms in this field.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alotaibi M (2019) Security to wireless sensor networks against malicious attacks using Hamming residue method. EURASIP J Wirel Commun Netw, 1–7. https://doi.org/10.1186/s13638-018-1337-5

  2. Li P, Sun L, Fu X, Ning L (2013) Security in wireless sensor networks. In: Wireless network security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_8

  3. Liwandouw V, Wowor A (2017) The existence of cryptography: a study on instant messaging. Procedia Comput Sci 124:721–727

    Google Scholar 

  4. Chelli K (2015) Security issues in wireless sensor networks: attacks and countermeasures. In: Proceedings of the world congress on engineering. London, U.K.

    Google Scholar 

  5. Sanchez J, Correa R, Buena H, Arias S, Gomez H (2016) Encryption techniques: a theoretical overview and future proposals. In: Third international conference on eDemocracy & eGovernment, pp 60–64

    Google Scholar 

  6. Biswas S, Adhikari S (2015) A survey of security attacks, defenses and security mechanisms in wireless sensor network. Int J Comput Appl 131(17):28–35. https://doi.org/10.5120/ijca2015907654

    Article  Google Scholar 

  7. Kuppuswamy P, Al-Khalidi SQY (2012) Implementation of security through simple symmetric key algorithm based on modulo. Int J Comput Technol 3:335–338

    Google Scholar 

  8. Joshi A, Wazid M, Goudar RH (2015) An efficient cryptographic scheme for text message protection against brute force & cryptanalytic attacks. Procedia Comput Sci 48:360–366

    Google Scholar 

  9. Ismail ES, Baharudin S (2012) Secure hybrid mode-based cryptosystem. Am J Appl Sci 9(3):289–292

    Google Scholar 

  10. Abd Elminaam DS, Abdual Kader HM, Hadhoud MM (2010) Evaluating the performance of symmetric encryption algorithms. Int J Netw Secur 10(3):213–219

    Google Scholar 

  11. Singh G, Singla AK, Sandha KS (2011) Throughput analysis of various encryption algorithms. Int J Comput Sci Technol 2(3):527–529

    Google Scholar 

  12. Adamu AA, Wang D, Salau AO, Ajayi O (2020) An integrated IoT system pathway for smart cities. Int J Emerg Technol 11(1):1–9

    Google Scholar 

  13. Shinghe SR, Patil R (2014) An encryption algorithm based on ASCII value. Int J Comput Sci Inf Technol 5(6):7232–7234

    Google Scholar 

  14. Saraswat CK, Sudhakar PT, Biswas P (2016) An extended hybridization of Vigenere and Caeser cipher techniques for secure communication. Procedia Comput Sci 92:355–360

    Google Scholar 

  15. Sukhraliya V, Chaudhary S, Solanki S (2013) Encryption and decryption algorithm using ASCII values with the substitution array approach. Int J Adv Res Comput Commun Eng 2(8):3094–3097

    Google Scholar 

  16. Singh U, Garg U (2013) An ASCII value based text data encryption system. Int J Sci Res Publ 3:1–5

    Google Scholar 

  17. Chatterjee J, Nath SD, Nath A (2011) A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm. In: International conference on communication systems and network technologies, pp 89–94. https://doi.org/10.1109/CSNT.2011.25

  18. Bisht N (2015) A comparative study of some symmetric and asymmetric key cryptography algorithms. Int J Innov Res Sci Eng Technol 4(3):552–565

    Google Scholar 

  19. Rani N (2015) Suspicious email detection system via triple des algorithm: cryptography approach. IJCSMC 4(5)

    Google Scholar 

  20. Messai M (2014) Classification of attacks in wireless sensor networks. International congress on telecommunication and application, Bejaia, Algeria. Available online https://arxiv.org/ftp/arxiv/papers/1406/1406.4516.pdf

  21. Mathur A (2012) An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. Int J Comput Sci Eng (IJCSE) 4(9):1650–1657

    Google Scholar 

  22. Addagarla SK, Babji Y (2013) A comparative security study review on symmetric key cryptosystem based algorithms. Int J Comput Sci Mob Comput 2(7):146–151

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ayodeji Olalekan Salau .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Salau, A.O., Marriwala, N., Athaee, M. (2021). Data Security in Wireless Sensor Networks: Attacks and Countermeasures. In: Marriwala, N., Tripathi, C.C., Kumar, D., Jain, S. (eds) Mobile Radio Communications and 5G Networks. Lecture Notes in Networks and Systems, vol 140. Springer, Singapore. https://doi.org/10.1007/978-981-15-7130-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7130-5_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7129-9

  • Online ISBN: 978-981-15-7130-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics