Practical overview of security issues in wireless sensor network applications

Abstract Wireless sensor networks are widely used in applications to monitor and communicate data. Even though the wireless sensor networks have been broadly used in critical applications, security and privacy issues are major concern. The attackers can gain considerably easy access into a wireless sensor networks and inject malicious data. Wireless sensor networks are considered to be vulnerable to the attacks. The aim of this research is to review the practical scenarios and applications, expose the security vulnerabilities and issues associated with wireless sensor networks specific to applications. The need for research in this area is high since it provides a broad scope to investigate problems and issues in current applications.

[1]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[2]  Ismail Mansour,et al.  Key Management in Wireless Sensor Networks , 2015 .

[3]  Wen Hu,et al.  Springbrook: Challenges in developing a long-term, rainforest wireless sensor network , 2008, 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[4]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[5]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.

[6]  Insup Lee,et al.  Quantifying eavesdropping vulnerability in sensor networks , 2005, DMSN '05.

[7]  Guiling Wang,et al.  Lightweight and Compromise-Resilient Message Authentication in Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[9]  Kota Solomon Raju,et al.  Implementation of a WSN system towards SHM of civil building structures , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).

[10]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..

[11]  Wenjing Lou,et al.  On Broadcast Authentication in Wireless Sensor Networks , 2006, IEEE Transactions on Wireless Communications.

[12]  Samir Mustapha,et al.  Advances in structural health monitoring system architecture , 2014 .

[13]  Jr B. F. Spencer,et al.  Structural Health Monitoring Using Smart Sensors , 2007 .

[14]  Anthony Dick,et al.  Towards intelligent networked video surveillance for the detection of suspicious behaviours , 2005 .

[15]  Bo Li,et al.  A survey of transport protocols for wireless sensor networks , 2006, IEEE Network.

[16]  P. S. Jadhav,et al.  Forest Fire Monitoring System Based On ZIG-BEE Wireless Sensor Network , 2012 .

[17]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[18]  Neenu George,et al.  Detection of Node Clones in Wireless Sensor Network Using Detection Protocols , 2014, ArXiv.

[19]  Gulshan Kumar,et al.  Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement , 2012 .

[20]  Marimuthu Palaniswami,et al.  Elliptical anomalies in wireless sensor networks , 2009, TOSN.

[21]  Roberto Di Pietro,et al.  Security in wireless ad-hoc networks - A survey , 2014, Comput. Commun..

[22]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[23]  Mohd Fauzi Othman,et al.  Wireless Sensor Network Applications: A Study in Environment Monitoring System , 2012 .

[24]  Shamim N. Pakzad,et al.  Distributed modal identification using restricted auto regressive models , 2011, Int. J. Syst. Sci..

[25]  Chia-Mei Chen,et al.  Defense Denial-of Service Attacks on IPv6 Wireless Sensor Networks , 2015, ICGEC.

[26]  Peter I. Corke,et al.  Environmental Wireless Sensor Networks , 2010, Proceedings of the IEEE.

[27]  Mehrisadat Makki Alamdari,et al.  Damage identification of a concrete arch beam based on frequency response functions and artificial neural networks , 2015 .

[28]  Rawya Rizk,et al.  Two-phase hybrid cryptography algorithm for wireless sensor networks , 2015 .

[29]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[30]  R. venkatesh,et al.  Independent Living For Persons with Disabilities and Elderly People Using Smart Home Technology , 2015 .

[31]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[32]  Ismail Mansour,et al.  Key Management inWireless Sensor Networks , 2015, J. Sens. Actuator Networks.

[33]  Weisong Shi,et al.  Using Wireless Sensor Networks for Fire Rescue Applications: Requirements and Challenges , 2006, 2006 IEEE International Conference on Electro/Information Technology.

[34]  Almir Davis,et al.  A SURVEY OF WIRELESS SENSOR NETWORK ARCHITECTURES , 2012 .

[35]  B SrivastavaMani,et al.  Reputation-based framework for high integrity sensor networks , 2008 .

[36]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).