A Survey on Wireless Sensors Networks Security Based on a Layered Approach

The Internet of Things (IoT) is one of the most novel networking paradigms and there are yet too many technologies defining themselves as IoT complicating the scenario for developing a fully IoT environment. The situation becomes even harder when security and privacy are considered. In this paper, we present a survey on the security aspects of an IoT conformed by wireless sensors communicating through the IEEE 802.15.4 standard. This survey follows a revision of the state of art in a layer-by-layer systematic analysis.

[1]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[2]  Srdjan Krco,et al.  Performance evaluation of compact binary XML representation for constrained devices , 2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS).

[3]  Jorge Sá Silva,et al.  On the Effectiveness of End-to-End Security for Internet-Integrated Sensing Applications , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[4]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[5]  Yusuke Doi,et al.  XML-less EXI with code generation for integration of embedded devices in web based systems , 2012, 2012 3rd IEEE International Conference on the Internet of Things.

[6]  N. Vlajic,et al.  Performance Analysis of ZigBee-Based Wireless Sensor Networks with Path-Constrained Mobile Sink(s) , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[7]  Carsten Bormann,et al.  Neighbor Discovery Optimization for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) , 2012, RFC.

[8]  Pedro Castillejo,et al.  Automated determination of security services to ensure personal data protection in the Internet of Things applications , 2013, Third International Conference on Innovative Computing Technology (INTECH 2013).

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[10]  Sophie Chabridon,et al.  Trust-Based Context Contract Models for the Internet of Things , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[11]  Carles Gomez,et al.  Wireless home automation networks: A survey of architectures and technologies , 2010, IEEE Communications Magazine.

[12]  D. Habibi,et al.  Performance evaluation of IEEE 802.15.4 for mobile sensor networks , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).

[13]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[14]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[15]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[16]  Manfred Tscheligi,et al.  uTRUSTit - Usable Trust in the Internet of Things , 2012, TrustBus.

[17]  Luca Mainetti,et al.  Implementation of the EXI Schema on Wireless Sensor Nodes Using Contiki , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[18]  Klaus Wehrle,et al.  Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[19]  Antonio F. Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[20]  Antonio Iera,et al.  From "smart objects" to "social objects": The next evolutionary step of the internet of things , 2014, IEEE Communications Magazine.

[21]  Guy Pujolle,et al.  HIP Tags Privacy Architecture , 2008, 2008 Third International Conference on Systems and Networks Communications.

[22]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[23]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[24]  Wolfgang Leister,et al.  Ideas for a Trust Indicator in the Internet of Things , 2012 .

[25]  Ana R. Cavalli,et al.  An Effective Attack Detection Approach in Wireless Mesh Networks , 2013, AINA Workshops.

[26]  Luciano Lavagno,et al.  An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks , 2012, ANT/MobiWIS.

[27]  Sharifah H. S. Ariffin,et al.  Performance analysis for 6loWPAN IEEE 802.15.4 with IPv6 network , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[28]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[29]  Joel J. P. C. Rodrigues,et al.  Network Admission Control Solution for 6LoWPAN Networks , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[30]  Luigi Atzori,et al.  Network navigability in the social Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[31]  Michele Zorzi,et al.  Web Services for the Internet of Things through CoAP and EXI , 2011, 2011 IEEE International Conference on Communications Workshops (ICC).

[32]  Pascal Urien,et al.  HIP-tags architecture implementation for the Internet of things , 2009, 2009 First Asian Himalayas International Conference on Internet.

[33]  Paolo Pagano,et al.  Architecture, Functional Requirements, and Early Implementation of an Instrumentation Grid for the IoT , 2012, 2012 IEEE 14th International Conference on High Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems.

[34]  Jamshid B. Mohasefi,et al.  A novel three party key establishment scheme in the context of Internet-of-Things , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).

[35]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[36]  Óscar García-Morchón,et al.  HIP Security Architecture for the IP-Based Internet of Things , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[37]  Pascal Urien,et al.  HIP-TAG, a new paradigm for the Internet of Things , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[38]  Georg Carle,et al.  A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.

[39]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.