A survey of wireless sensor network security in the context of Internet of Things

Today, the common vision of smart components is usually based on the concept of the Internet of Things (IoT). Intelligent infrastructures combine sensor networks, network connectivity and software to oversee and analyze complex systems to identify inefficiencies and inform operational decision-making. Wireless Sensor nodes collect operational information over time and provide real-time data on current conditions such as (volcano activities, disaster parameters in general). The security of wireless sensor networks in the world of the Internet of Things is a big challenge, since there are several types of attacks against different layers of OSI model, in their goal is falsified the values of the detected parameters.

[1]  Zahid Ullah,et al.  Internet of Things Security, Device Authentication and Access Control: A Review , 2019, ArXiv.

[2]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[3]  Karl N. Levitt,et al.  A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[4]  Ramjee Prasad,et al.  Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[5]  Ian F. Akyildiz,et al.  Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.

[6]  Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks , 2005 .

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  Paul Fremantle,et al.  A survey of secure middleware for the Internet of Things , 2017, PeerJ Prepr..

[9]  George Kesidis,et al.  Managing sybil identities in distributed networks , 2010 .

[10]  Asadullah Shah,et al.  Security Attacks and Solutions On Ubiquitous Computing Networks , 2013 .

[11]  Samira Moussaoui,et al.  Disaster Management Projects Using Wireless Sensor Networks: An Overview , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[12]  Aristides Mpitziopoulos,et al.  An effective defensive node against jamming attacks in sensor networks , 2009, Secur. Commun. Networks.

[13]  Philip W. L. Fong Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems , 2011, 2011 IEEE Symposium on Security and Privacy.

[14]  Engin Leloglu A Review of Security Concerns in Internet of Things , 2017 .

[15]  Mostafa Belkasmi,et al.  Internet of Things Security: Layered classification of attacks and possible Countermeasures , 2016 .

[16]  M. Castillo-Effer,et al.  Wireless sensor networks for flash-flood alerting , 2004, Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, 2004..

[17]  Amit Kumar Mishra,et al.  ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .

[18]  Matt Welsh,et al.  Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[19]  S. Eisenman,et al.  Sensor Networks , 2002 .

[20]  K. Inoue,et al.  Design of search balls with wide field of view for searching inside of rubble , 2005, IEEE International Safety, Security and Rescue Rototics, Workshop, 2005..

[21]  Minglu Zhang,et al.  Design and implementation of an Emergency Search and Rescue System based on mobile robot and WSN , 2010, 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics (CAR 2010).

[22]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[23]  Akshya Swain,et al.  Wireless Sensor Network attacks: An overview and critical analysis , 2013, 2013 Seventh International Conference on Sensing Technology (ICST).

[24]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[25]  Wirawan,et al.  Design of low cost wireless sensor networks-based environmental monitoring system for developing country , 2008, 2008 14th Asia-Pacific Conference on Communications.

[26]  Josef Pieprzyk,et al.  Broadcast anti-jamming systems , 1999, IEEE International Conference on Networks. ICON '99 Proceedings (Cat. No.PR00243).

[27]  Ammar Rayes,et al.  The Internet of Things (IoT) , 2020, Energy and Analytics.

[28]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[29]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[30]  A VaniB.,et al.  Security Attacks and its Countermeasures in Wireless Sensor Networks , 2014 .

[31]  Dorothea Hilhorst,et al.  Mapping Vulnerability: Disasters, Development and People , 2004 .

[32]  Devendra Prasad,et al.  DISASTER MANAGEMENT IN WIRELESS SENSOR NETWORKS : A SURVEY REPORT , 2016 .

[33]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[34]  Indira Priyadarshinee,et al.  Flood Prediction and Prevention through Wireless Sensor Networking (WSN): A Survey , 2015 .

[35]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[36]  Romano Fantacci,et al.  A novel communication infrastructure for emergency management: the In.Sy.Eme. vision , 2010, Wirel. Commun. Mob. Comput..

[37]  Kamarulzaman Ab. Aziz,et al.  Managing disaster with wireless sensor networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[38]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.