Sensor networks are composed of provide low powered, inexpensive distributed devices which can be deployed over enormous physical spaces. Coordination between sensor devices is required to achieve a common communication. In low cost, low power and short-range wireless environment, sensor networks cope with significant resource constraints. Security is one of main issues in wireless sensor networks because of potential adversaries. Several security protocols and models have been implemented for communication on computing devices but deployment these models and protocols into the sensor networks is not easy because of the resource constraints mentioned. Memory intensive encryption algorithms as well as high volume of packet transmission cannot be applied to sensor devices due to its low computational speed and memory. Deployment of sensor networks without security mechanism makes sensor nodes vulnerable to potential attacks. Therefore, attackers compromise the network to accept malicious sensor nodes as legitimate nodes. This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.
[1]
Alfredo Pironti,et al.
Formally based semi-automatic implementation of an open security protocol
,
2012,
J. Syst. Softw..
[2]
Felix C. Freiling,et al.
Vulnerabilities and Attacks in Wireless Sensor Networks
,
2008
.
[3]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[4]
Danny Dolev,et al.
On the security of public key protocols
,
1981,
22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[5]
Sri Ramakrishna,et al.
Wireless Sensor Network Security: Vulnerabilities, Threats and Countermeasures
,
2016
.
[6]
Mohammad Abdus Salam,et al.
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
,
2016
.
[7]
Hiroshi Ishii,et al.
Threat Models and Security Issues in Wireless Sensor Networks
,
2010
.