Security Issues and Challenges in Event-Driven Wireless Sensor Networks

Recently, wireless sensor networks (WSNs) have attracted a lot of attention from the network research community, especially in the aspect of event-driven wireless sensor networks (EWSNs), such as adversary locating, fire detection and so on. As the nature of importance of event monitoring, security has to be assured in both of communication and processing. However, due to the inherent resource constraints, security in EWSNs is faced different issues and challenges than traditional WSNs. In this paper, we attempt to give an outline on the security issues in the EWSNs. And then we propose a new secure architecture for it, which covers potential security issues. In this architecture, we analyze the possible threats and give out the corresponding

[1]  Ertan Onur,et al.  WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .

[2]  Robert H. Deng,et al.  Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.

[3]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[5]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[6]  Oliver W. W. Yang,et al.  Efficient Event Detecting Protocol in Event-Driven Wireless Sensor Networks , 2011, IEEE Sensors Journal.

[7]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[8]  Mun Choon Chan,et al.  Information Quality Aware Routing in Event-Driven Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Deborah Estrin,et al.  Dimensions: why do we need a new data handling architecture for sensor networks? , 2003, CCRV.

[10]  Özgür B. Akan,et al.  A real-time and reliable transport (RT) 2 protocol for wireless sensor and actor networks , 2008, IEEE/ACM Trans. Netw..

[11]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[14]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[15]  Victor C. M. Leung,et al.  A Novel Reliable Transmission Protocol for Urgent Information in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[16]  Yi Pan,et al.  Delay-Bounded and Energy-Efficient Composite Event Monitoring in Heterogeneous Wireless Sensor Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[17]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[18]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.

[19]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[20]  Andreas Willig,et al.  Protocols and Architectures for Wireless Sensor Networks , 2005 .

[21]  Weisong Shi,et al.  Analysis of ratings on trust inference in open environments , 2008, Perform. Evaluation.

[22]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[23]  Rachid Beghdad,et al.  Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.

[24]  Sungyoung Lee,et al.  Securing Distributed Wireless Sensor Networks: Issues and Guidelines , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).