Security issues in wireless sensor networks

Wireless sensor network consists of densely populated nodes connected to one another. In a typical sensor network environment, sensor nodes communicate with one or more base stations. Wireless sensor network is widely used in different areas such as agriculture, healthcare, defense, and other research areas. These areas differ in term of their respective security requirements. Areas such as agriculture demand less security, whereas defense and healthcare require more security. Resource constraints of sensor nodes make it complicated to implement classical security approaches in a wireless sensor network. This report overviews the existing literature on security issues in a wireless sensor network. In this report, security requirements are defined in a typical sensor network. Possible attacks are shown on different communication layers along with their mitigations. The feasibility of cryptographic measures is also examined in order to enforce security in the wireless sensor network. We discuss secure key exchange techniques to exchange cryptographic keys between sensor nodes and the base station. Additionally, The area of adaptive security is touched before concluding this report.

[1]  Perry Metzger,et al.  The ESP Triple DES Transform , 1995, RFC.

[2]  Jakob Jonsson,et al.  Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.

[3]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[4]  Bodo Möller,et al.  Network Working Group Elliptic Curve Cryptography (ecc) Cipher Suites for Transport Layer Security (tls) , 2006 .

[5]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[6]  Mohamed F. Younis,et al.  Adaptive security provision for increased energy efficiency in Wireless Sensor Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[7]  The Elgamal Cryptosystem on the Ti-83 , 2009 .

[8]  Douglas Selent ADVANCED ENCRYPTION STANDARD , 2010 .

[9]  Christof Paar,et al.  Message Authentication Codes (MACs) , 2010 .

[10]  Alberto Ferrante,et al.  Gradual adaptation of security for sensor networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).