Security of Wireless Sensor Networks

Wireless sensor networks have been researched extensively over the past few years. They were first used by the military for surveillance purposes and have since expanded into industrial and civilian uses such as weather, pollution, traffic control, and healthcare. One aspect of wireless sensor networks on which research has been conducted is the security of wireless sensor networks. These networks are vulnerable to hackers who might go into the network with the intent of rendering it useless. An example of this would be an enemy commandeering a drone and getting it to attack friendly forces. In this paper, we review the security of wireless sensor networks. Areas that are covered include: architectures and routing protocols, security issues that include context and design as well as confidentiality, integrity, and authenticity, algorithms, and performance issues for wireless sensor network design. Performance of the Self-Originating Wireless Sensor Network (SOWSN), Practical Algorithm for Data Security (PADS), and mechanisms for in-network processing were investigated in further detail with SOWSN having the best performance as a result of it being based on realistic scenarios.

[1]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[2]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[3]  Jordi Casademont,et al.  Improving security applications using indoor location systems on wireless sensor networks , 2009, ICAC3 '09.

[4]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[5]  Levente Buttyán,et al.  Modelling adversaries and security objectives for routing protocols in wireless sensor networks , 2006, SASN '06.

[6]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[7]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[8]  Shivakant Mishra,et al.  Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.

[9]  Sanjay Kumar Madria,et al.  Sensor networks: an overview , 2003 .

[10]  Dennis Pfisterer,et al.  Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.

[11]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[12]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[13]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[14]  Samir Chatterjee,et al.  A Secure Key Management Scheme for Sensor Networks , 2004, AMCIS.

[15]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[16]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[17]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[18]  Sanjay Kumar Madria,et al.  Practical algorithm for data security (PADS) in wireless sensor networks , 2007, MobiDE '07.

[19]  Mohammad S. Obaidat,et al.  A new scheme for mobility, sensing, and security management in wireless ad hoc sensor networks , 2006, 39th Annual Simulation Symposium (ANSS'06).

[20]  Arno Wacker,et al.  A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.

[21]  Chris Christensen Review of Cryptography and Network Security: Principles and Practice, Fifth Edition , 2011, Cryptologia.

[22]  Markus G. Kuhn,et al.  An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.