72 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    A security scheme for wireless sensor networks

    Get PDF
    Security is critical for wireless sensor networks (WSN)deployed in hostile environments since many types of attacks could reduce the trust on the global functioning of any WSN. Many solutions have been proposed to secure communications for WSNs and most of them rely on a centralized component which behaves as a certificate authority. We propose in this paper a distributed solution able to ensure authentication of nodes at any time without having any on-line access to a certificate authority. Each node will be equipped with a Trusted Platform Module (TPM) which is able to store keys with security. Each node will have its own public key and private key pair in the TPM and a certificate of the public key. The certificate is issued off-line when setting-up the node. When a node communicates with another, it has to sign the message with its own private key (done securely by the TPM) and sends the message, the signature and the certificate of the public key. The evaluation of the solution has been done using simulation and the overhead added by integrating authentication does not exceed 15% of energy consumption

    Secure Data Collection Using Randomized Multipath Routing

    Get PDF
    Wireless Sensor Networks (WSNs) are widely used in various real time applications such as surveillance, environment monitoring, studying wildlife habitat and so on. As the nodes in the network are resource constrained, they are vulnerable to various attacks. This is the reason there is need for secure data collection in such networks. Many solutions came into existence to provide secure communications in WSN. However, the solutions were based on different techniques. Minimization of packet failure rate is one of the objectives of many researchers in this area. The potential attacks on the network can jeopardise its purpose. Recently Alghamdi et al. proposed a solution using multipath routing in which the effect of adversaries is reduced besides ensuring secure data transmission in the presence of malicious nodes in the network. Our work is similar to this with certain improvements in terms of energy consumption and also packet delivery failure ratio. We implemented a WSN with simulations and our approach used a controller in the network which, in consultation with base station, can play a vital role in prevention of attacks. Since the solution is based on randomized multipath routing, it is able to withstand potential attacks and ensure that the failure of packet delivery is minimized and the overall network performance is improved. The simulation results reveal that the proposed approach has better performance in terms of performance level of protocol, network throughput, delay analysis, percentage of packet loss, and energy consumption. DOI: 10.17762/ijritcc2321-8169.150713

    Enhancing the Stability of Underwater Wireless Sensor Networks Using Firefly Swarm Intelligence Approach

    Get PDF
    The wireless sensor networks have become a vital part of environmental monitoring and prediction. These sensors identify the changes that take place around the area where it is deployed and transmit the sensed data to the base station it is connected. The main drawback of the wireless sensor networks is they are remotely installed and are prone to frequent failures and mass collapse. In this paper we propose a clustering technique based on the Firefly Swarm Intelligence Approach (FSIA) to improve the stability of the Under Water Wireless Sensor Networks (UWSN). The firefly algorithm helps in keeping the sensor nodes intact and produces fewer failures in network connectivity. The simulation results are convincing and the same has been given at the end

    Solving Isolated Nodes Problem in ZigBee Pro for Wireless Sensor Networks

    Get PDF
    Wireless sensor network based on the ZigBee protocol consists of many sensor devices. In some cases, the sensor nodes may turn to isolated node because random distribution, particularly when creating the network. In this research was suggested two cases to overcome on the isolated node problem, the first case had able to overcome this problem by distributing the isolated nodes on the router nodes that carry the least number of sensor nodes, it helps to minimize the computational overhead on router nodes too, while the second one is able to overcome this problem by calculating the distance between the isolated nodes and the routers and then adds these nodes to the nearest routers. Subsequently, this method helps to minimize the energy consumption. The results show our approach able to solve the problem of isolated nodes using these two methods and when compared between them turns out the second method is better In terms of energy consumption. In addition, we are able to make the network larger scale

    Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks

    Get PDF
    The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance

    Kriptografi Dan Skema Keamanan Untuk Jaringan Sensor Nirkawat

    Full text link
    This paper attempts to explore the security issues in sensor network that include constraints in sensor networks security, the requirements of secure sensor networks, attack classification and its counter measures and security mechanisms at wirelesssensor network (WSN) such as cryptography and key management. Popularity of wireless sensor network is increasing because of its potential to provide low-cost solution for a variety of real-world problem. As a special form of ad-hoc networks, sensor networks has many limitations that lead to vulnerabilities in security issues. Currently, there are many researches in the field of sensor network security. Our analysis shows that symmetric key cryptography systems are more favorable to provide WSN security services because of its computation and energy cost. Moreover, distributed combine with pre-distributed key management is important to overcome security threats and centralize threats detection is more favorable to reduce energy and computation cost of sensor nodes
    corecore