Research and Analysis of Open Security Issues in Communication for Wireless Sensor Network

Sensors are resource constrained and computing devices used in wireless networks. These networks are comprised of large numbers sensors deployed randomly over an area. The wireless sensor network (WSN) has a direct impact on human welfare as their application can be extended to military surveillance, environmental monitoring and to healthcare also. Security breaches might lead to grave consequences, so it is important to protect wireless sensor networks against such threats. The specific characteristics of wireless sensor networks make them vulnerable to attacks on their communication channels and their hardware. This research work discusses the open security issues in WSN. Section 2 focuses on the problem statement and later, existing security mechanisms are discussed. This research paper also present an discussion on the Cryptographic mechanisms, which can be employed to protect against some of the possible attacks such as eavesdropping and the injection of messages by the attacker is prevented by authentication.

[1]  Anupam Joshi,et al.  Secure sensor networks for perimeter protection , 2003, Comput. Networks.

[2]  C. K. Jha,et al.  Implementing the Logical Security Framework for E-Commerce Based on Service-Oriented Architecture , 2016 .

[3]  Gary McGraw,et al.  Software Penetration Testing , 2005, IEEE Secur. Priv..

[4]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[5]  Michael A. Caloyannides Society cannot function without privacy , 2003, IEEE Security & Privacy Magazine.

[6]  Ravindra Luhach,et al.  RESEARCH AND IMPLEMENTATION OF SECURITY FRAMEWORK FOR SMALL AND MEDIUM SIZED E-COMMERCE BASED ON SOA , 2015 .

[7]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.

[8]  Sanjay K. Dwivedi,et al.  Desiging a logical security framework for e-commerce system based on soa , 2014, ArXiv.

[9]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[10]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[11]  Ross J. Anderson,et al.  Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[12]  Mike Burmester,et al.  Secure multipath communication in mobile ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[13]  Zinaida Benenson,et al.  An algorithmic framework for robust access control in wireless sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[14]  Martina Zitterbart,et al.  Towards Acceptable Public-Key Encryption in Sensor Networks , 2005, IWUC.