Cross-layer based security solutions for wireless sensor networks

Wireless sensor networks (WSNs) were often used to collect sensitive data and the entire network was particularly vulnerable to various threats at different layers of the protocol stack. With this in mind, there was need to improve security solutions that were inevitable and advantageous to the successful deployment of the wireless sensor networks. The vast research conducted to provide security solutions against various attacks in the WSNs so far was based on the layered approach. In this study, we emphasized that the layered approaches have noticeable shortcomings such as the redundancy and/or inflexibility of the security solutions, which made the layers security solutions often inefficient and inadequate. It was, however, beneficial to construct the security approach for the WSNs based on cross-layer interaction between all components in different layers of the protocol stack. Consequently, these new approaches surely gave a new direction towards the issue of security for wireless sensor networks. The outline of the existing cross layer security schemes in literature was presented, while some new novel security solutions were proposed. More so, the synopsis of the proposed cross-layer based comprehensive security framework (CLBCSF) as the framework model for hierarchical clustering wireless sensor networks was also presented. Nonetheless, the open problems in this area were debated too.

[1]  Stephan Olariu,et al.  Towards a new paradigm for securing wireless sensor networks , 2003, NSPW '03.

[2]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[3]  Tae Kyung Kim,et al.  A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .

[4]  Qi Li,et al.  A security framework for wireless sensor networks , 2010 .

[5]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[6]  Kalpana Sharma,et al.  Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.

[7]  Radha Poovendran,et al.  VP3: using vertex path and power proximity for energy efficient key distribution , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[8]  Ayman Khalil,et al.  Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN , 2010, ArXiv.

[9]  Kameswari Chebrolu,et al.  Censor networks: a critique of "sensor networks" from a systems perspective , 2008, CCRV.

[10]  Mingbo Xiao,et al.  Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[11]  Fei Hu,et al.  Key Management Schemes in Sensor Networks , 2007 .

[12]  Kalpana Sharma,et al.  Cross Layer Security Framework for Wireless Sensor Networks , 2011 .

[13]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[14]  Nathan Ickes,et al.  The Hardware and the Network: Total-System Strategies for Power Aware Wireless Microsensors , 2002 .

[15]  Paramvir Bahl,et al.  Distributed Topology Control for Wireless Multihop Ad-hoc Networks , 2001, INFOCOM.

[16]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[17]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[18]  Radha Poovendran,et al.  Cross-layer design for energy-efficient secure multicast communications in ad hoc networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[19]  Dario Pompili,et al.  The State of the Art in Cross-Layer Design for Wireless Sensor Networks , 2005, EuroNGI Workshop.

[20]  Qun Li,et al.  Three power-aware routing algorithms for sensor networks , 2003, Wirel. Commun. Mob. Comput..

[21]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[22]  Aura Ganz,et al.  Runtime security composition for sensor networks (SecureSense) , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[23]  J. Rabaey,et al.  PicoRadio: Ad-hoc wireless networking of ubiquitous low-energy sensor/monitor nodes , 2000, Proceedings IEEE Computer Society Workshop on VLSI 2000. System Design for a System-on-Chip Era.

[24]  Siew Hooi Tan,et al.  Kuala Lumpur, Malaysia , 2012 .

[25]  N. Pissinou,et al.  A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.

[26]  Sami S. Al-Wakeel,et al.  PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[27]  Yong Guan,et al.  A robust group-based key management scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[28]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[29]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[30]  Ivan Stojmenovic,et al.  Sensor Networks , 2005 .

[31]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[32]  Hui-Feng Huang A Pairwise Key Pre-distribution Scheme for Wireless Sensor Network , 2008, ISI Workshops.