Security Issues in Wireless Sensor Networks

This work deals with some security issues over wireless sensor networks (WSNs). A survey of recent trends in general security requirements, typical security treats, intrusion detection system, key distribution schemes and target localization is presented. In order to facilitate applications that require packet delivery from one or more senders to multiple receivers, provisioning security in group communications is pointed out as a critical and challenging goal. Presented issues are crucial for future implementation of WSN.

[1]  Mohsen Guizani,et al.  A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Trans. Wirel. Commun..

[2]  Radha Poovendran,et al.  A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[3]  Victor C. M. Leung,et al.  Key management issues in wireless sensor networks: current proposals and future developments , 2007, IEEE Wireless Communications.

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  David L. Mills,et al.  Computer network time synchronization : the network time protocol on earth and in space , 2006 .

[6]  Yee Wei Law,et al.  A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.

[7]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[8]  Cormac J. Sreenan,et al.  A new model for updating software in wireless sensor networks , 2006, IEEE Network.

[9]  Sajal K. Das,et al.  Routing Correlated Data in Wireless Sensor Networks: A Survey , 2007, IEEE Network.

[10]  Tzay-Farn Shih,et al.  Hierarchical localization strategy for wireless sensor networks , 2008 .

[11]  Deborah Estrin,et al.  The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.

[12]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[13]  Stefanos Gritzalis,et al.  Situation awareness mechanisms for wireless sensor networks , 2008, IEEE Communications Magazine.

[14]  Chong-Kwon Kim,et al.  Flooding in wireless ad hoc networks , 2001, Comput. Commun..

[15]  L. Zhang,et al.  A novel scheme for protecting receiver's location privacy in wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.

[16]  Dan Popescu,et al.  Embedding wireless sensors in UPnP services networks , 2008 .

[17]  Rahul Khanna,et al.  Control theoretic approach to intrusion detection using a distributed hidden Markov model , 2008, IEEE Wireless Communications.

[18]  Nirwan Ansari,et al.  Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks , 2007, IEEE Wireless Communications.

[19]  Soo-Hyun Park,et al.  Modified Backoff Scheme for MAC Performance Enhancement in IEEE 802.15.4 Sensor Network , 2007 .