An optimized algorithm for a secured Wireless Sensor Networks integration into Enterprise Information System

Due to it wide range of applications, Wireless Sensor Networks (WSN) represent a rapidly growing technology promising to resolve problems that were impossible in the near past. At the level of enterprises, the integration of WSN technology to their information system is an issue which stills under research, and many challenges face such merging. In this paper, we focus on the security aspect of WSN integration to Enterprises Information System (EIS) through the discussion of the different components of security that should be covered in order to consider a system as secured. From another level, our aim in this paper is to suggest an optimized algorithm that can lead to a secure use of WSN inside enterprises. To attain this purpose, we diagnose the main threats that face WSN security in those enterprise and compare the different WSN security related algorithms.

[1]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Ricardo Simon Carbajo,et al.  Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes , 2009, PM2HW2N '09.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[6]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[7]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[8]  G. H. Raisoni,et al.  Secure and Efficient Sink Node Location Privacy Technique in WSN , 2014 .

[9]  S. Shanawaz Basha,et al.  Secure Routing in Wireless Sensor Networks using WEAP Protocol , 2013 .

[10]  Madhusudana Rao Kothari,et al.  6LoWPAN Based Wireless Sensor Network to Monitor Temperature , 2014 .

[11]  Torsten Braun,et al.  Integration of WSNs into enterprise systems based on semantic physical business entities , 2013, 2013 IFIP Wireless Days (WD).

[12]  Hiren Kumar Deva Sarma,et al.  Security Threats in Wireless Sensor Networks , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[13]  Moumita Ghosh,et al.  Enhancement the security of WSN using ALARM protocol to Prevention from Reply Attack , 2014 .

[14]  Muhammad Bilal,et al.  Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN) , 2012, ArXiv.

[15]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[16]  Miguel Garcia,et al.  A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification , 2009, Sensors.

[17]  Winston Khoon Guan Seah,et al.  Reliability in wireless sensor networks: A survey and challenges ahead , 2015, Comput. Networks.

[18]  Sushma,et al.  Security Threats in Wireless Sensor Networks , 2011 .

[19]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[20]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[21]  Lida Xu,et al.  Enterprise Systems: State-of-the-Art and Future Trends , 2011, IEEE Transactions on Industrial Informatics.

[22]  Yan Sun,et al.  WSN14-4: Energy-efficient Reliable Transmission Protocol with Outsourcing in WSNs , 2006, IEEE Globecom 2006.

[23]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .