Wireless sensor network is more prone to adversary compare to common wireless network. This is due to the nature of wireless sensor network that involves many nodes, thus making the system more vulnerable. Another reason is the nature of wireless sensor network as an ad hoc network, making it having no hierarchal structure, complicating management tasks. Deploying new technology without security in mind has often proved to be unreasonably dangerous.One of the most fundamental rights in a 'healthy' society is the right of every citizen to be left alone. Article 12 of the U.N, Universal Declaration of Human Rights, states that “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence.”, in reality, though this right is increasingly being trod upon, along with undreamed of comforts and conveniences for the population in general. The digital revolution has made it possible to gather as well as store information about human behaviour on a massive scale. We leave electronic footprints everywhere we go, footprints that are being watched, analyzed and sold without our knowledge or even control.With this Security and Privacy solutions are mandatory aspects when developing new pervasive technologies such as wireless sensor networks (WSN).This paper analyses the security issues, threats and attacks and requirements of wireless sensor networks. This paper further proposes security framework and security architecture to integrate existing technologies with WSN technology, to provide secure and private communications to its users.
[1]
Liqun Chen,et al.
Identity based authenticated key agreement protocols from pairings
,
2003,
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[2]
Gerhard Frey,et al.
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
,
1999,
IEEE Trans. Inf. Theory.
[3]
Stefan Fischer,et al.
A Security Architecture for Mobile Wireless Sensor Networks
,
2004,
ESAS.
[4]
Nigel P. Smart,et al.
An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing
,
2002,
IACR Cryptol. ePrint Arch..
[5]
Edgar H. Callaway,et al.
Home networking with IEEE 802.15.4: a developing standard for low-rate wireless personal area networks
,
2002,
IEEE Commun. Mag..
[6]
David E. Culler,et al.
SPINS: Security Protocols for Sensor Networks
,
2001,
MobiCom '01.
[7]
Ian F. Akyildiz,et al.
Sensor Networks
,
2002,
Encyclopedia of GIS.