Wireless sensor networks : A Survey of Intrusions and their Explored Remedies

Abstract – On one hand, where we are seeing and experiencing the dilated technologies, the retrospective of the past is giving the researchers a new area to learn and pioneer new dimensions of the same challenges. Wired sensor networks had been a great source of getting the information about a specific object. But with incremental challenges that were posed to the researchers, wireless sensor networks were developed so that the impugnation that had become drawbacks of the wired network system could be dealt with. The upcoming of the wireless sensor network indeed brought with it many advantageous characteristic features, but there were also some vulnerabilities that crept in along with this great development.

[1]  Elfed Lewis,et al.  Security for wireless sensor networks: A review , 2009, 2009 IEEE Sensors Applications Symposium.

[2]  Zhong Chen,et al.  FBSR: feedback-based secure routing protocol for wireless sensor networks , 2008, Int. J. Pervasive Comput. Commun..

[3]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[4]  Scott F. Midkiff,et al.  Clustered Adaptive Rate Limiting: Defeating Denial-of-Sleep Attacks in Wireless Sensor Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[5]  William A. Arbaugh,et al.  Toward resilient security in wireless sensor networks , 2005, MobiHoc '05.

[6]  Jianbo Yao A Security Architecture for Wireless Sensor Networks Based-On Public Key Cryptography , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[7]  Judith Kelner,et al.  Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[8]  Peng Ning,et al.  Defending against Sybil attacks in sensor networks , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[9]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[10]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[11]  Kalpana Sharma,et al.  Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.

[12]  Mohsen Sharifi,et al.  A Survey on Wireless Sensor Networks Security , 2007 .

[13]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[14]  Abhishek Pandey,et al.  A Survey on Wireless Sensor Networks Security , 2010 .

[15]  Siddharth Ramesh,et al.  A Protocol Architecture for Wireless Sensor Networks , 2022 .

[16]  Behçet Sarikaya,et al.  EAP-Sens: a security architecture for wireless sensor networks , 2008, WICON.

[17]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[18]  Dennis Pfisterer,et al.  Comprehensible security synthesis for wireless sensor networks , 2008, MidSens '08.

[19]  M. Brownfield,et al.  Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols , 2006, 2006 IEEE Information Assurance Workshop.

[20]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[21]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[22]  Subir Kumar Sarkar,et al.  Issues in Wireless Sensor Networks , 2008 .

[23]  Kannan Srinivasan,et al.  State based key hop protocol: a lightweight security protocol for wireless networks , 2004, PE-WASUN '04.

[24]  Roberto Di Pietro,et al.  Emergent properties: detection of the node-capture attack in mobile wireless sensor networks , 2008, WiSec '08.

[25]  Akbar Abbasi Better Security for Wireless Sensor Networks , 2009, 2009 International Conference on Future Networks.

[26]  M. Brownfield,et al.  Wireless sensor network denial of sleep attack , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[27]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.