Security Attacks and Countermeasures for Wireless Sensor Networks: Survey

The security topic is a conclusive challenge for Wireless Sensor Networks (WSNs) due to the deployment nature and the resources limitations of wireless sensor devices used in such networks. Wireless Sensor Networks are used sometime in very sensitive applications, such as military, airports, and healthcare. Therefore, we must address the security concerns from the beginning of network design. Due to limited resources and computing constraints security in WSNs poses severe challenges as compare to the conventional wireless networks. There are currently massive studies in the field of sensor networks security. So far no comprehensive survey lists the security attacks which consider unique threats to the WSNs with suitable countermeasures against them. In this study we have addressed well known security threats and have provided the reasonable solutions towards effective countermeasures against the threats posed by this hot field of study.

[1]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[2]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[4]  Bo Zhu,et al.  Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN , 2009, ISA.

[5]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  Srdjan Capkun,et al.  Implications of radio fingerprinting on the security of sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[7]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[8]  Radha Poovendran,et al.  Secure Broadcast in Energy-Aware Wireless Sensor Networks , 2002 .

[9]  Adrian Perrig,et al.  SAKE: Software attestation for key establishment in sensor networks , 2008, Ad Hoc Networks.

[10]  Ahmed Helmy,et al.  Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.

[11]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[12]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[13]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[15]  Pekka Nikander,et al.  DOS-Resistant Authentication with Client Puzzles , 2000, Security Protocols Workshop.

[16]  Zhilbert Tafa Ubiquitous Sensor Networks , 2011 .

[17]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[18]  Adrian Perrig,et al.  SAKE: Software attestation for key establishment in sensor networks , 2011, Ad Hoc Networks.

[19]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[20]  Mingbo Xiao,et al.  Cross-Layer Design for the Security of Wireless Sensor Networks , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[21]  Kalpana Sharma,et al.  Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.

[22]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .

[23]  Adrian Perrig,et al.  The Coremelt Attack , 2009, ESORICS.

[24]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[25]  Kalpana Sharma,et al.  A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks , 2010 .

[26]  Hiroshi Ishii,et al.  Threat Models and Security Issues in Wireless Sensor Networks , 2010 .

[27]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[28]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[29]  Radha Poovendran,et al.  Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[30]  Xun Wang,et al.  Sensor network configuration under physical attacks , 2005, Int. J. Ad Hoc Ubiquitous Comput..

[31]  Garimella Rama Murthy,et al.  Distributed key management for wireless sensor networks , 2009, Q2SWinet '09.

[32]  Tanveer A. Zia,et al.  Cross-layer based security solutions for wireless sensor networks , 2011 .

[33]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[34]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.