Low cost enabled deployment of large amounts of sensor nodes

Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless sensor network is highly vulnerable to attacks because it consists of various resources constrained devices with their low battery power, less memory, and associated low energy. Sensor nodes communicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. This paper is an attempt to present a survey on the major topics in wireless sensor network security, and also present the obstacles and the requirements in the sensor security, classify many of the current attacks, and finally list their corresponding defensive measures.

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  H. Chris Tseng,et al.  Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.

[6]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[7]  Choong Seon Hong,et al.  A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks , 2007, ArXiv.

[8]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[9]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[10]  B. Strulo,et al.  Securing Mobile Ad hoc Networks — A Motivational Approach , 2003 .

[11]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[12]  W. J. Blackert,et al.  Analyzing interaction between distributed denial of service attacks and mitigation technologies , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[13]  H. Schulzrinne,et al.  An IP traceback mechanism for reflective DoS attacks , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[14]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[15]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[16]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[17]  Lemin Li,et al.  Research and analysis on routing protocols for wireless sensor networks , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..

[18]  Gang Qu,et al.  Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[19]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  Yan-Xiao Li,et al.  Research on Wireless Sensor Network Security , 2010, 2010 International Conference on Computational Intelligence and Security.

[21]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[22]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[23]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.