71,345 research outputs found

    An Outline of Security in Wireless Sensor Networks: Threats, Countermeasures and Implementations

    Full text link
    With the expansion of wireless sensor networks (WSNs), the need for securing the data flow through these networks is increasing. These sensor networks allow for easy-to-apply and flexible installations which have enabled them to be used for numerous applications. Due to these properties, they face distinct information security threats. Security of the data flowing through across networks provides the researchers with an interesting and intriguing potential for research. Design of these networks to ensure the protection of data faces the constraints of limited power and processing resources. We provide the basics of wireless sensor network security to help the researchers and engineers in better understanding of this applications field. In this chapter, we will provide the basics of information security with special emphasis on WSNs. The chapter will also give an overview of the information security requirements in these networks. Threats to the security of data in WSNs and some of their counter measures are also presented

    Secure Mechanism For Wireless Sensor Networks - A Review

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that is very usefu l for various futuristic applications both for public and military. As the use of wireless sensor networks continue to grow, so it should require effective security mechanisms. So to ensure the security of communication and data access control in WSN is paramount importance. Because sensor networks may interact with sensitive data and operate in hostile unattended environments, it is important that these security concerns should be addressed from the beginning of the system design. However because of inh erent resource and computing constraints, security in sensor networks poses different challenges than traditional network security. There is currently enormous research is present in the field of wireless sensor network security. Thus, familiarity with t he wireless sensor network,attack on WSN and security systems design for WSN will benefit researchers greatly. With this in mind , I survey the major topics in wireless sensor network security, and presentmany of the current attacks, and finally list their corresponding defensive measure

    Different Security Mechanisms for Wireless Sensor Networks

    Get PDF
    In today’s world security becomes one of the important constraints in every research field. As increasing use of Wireless Sensor Networks (WSN) in various crucial applications security of wireless networks is becoming more important day by day. Today almost each and every important area makes use of wireless sensor networks. As Wireless Sensor Network is infrastructure-less network; data moves openly from one node to another thus it can be captured easily by attackers. To avoid data from being stolen security mechanism has to be applied. Many protocols are available for providing security on wireless network. We perform a detailed study of different security mechanisms used in sensor network against some criteria such as nature of algorithm, working, its benefits and some of the disadvantages of mechanism and also compare them

    Security Challenges and Efficient Security Solutions for Ad-Hoc Wireless Sensor Network

    Get PDF
    Wireless sensor networks sense the information, process them locally and communicate it to the outside world via satellite or Internet. Wireless Sensor Networks (WSNs) use tiny, inexpensive sensor nodes with several distinguishing characteristics: they have very low processing power and radio ranges, permit very low energy consumption and perform limited and specific monitoring and sensing functions. Wireless sensor networks (WSN) are widely used for applications such as environment monitoring, habitat monitoring, forest fire control, border surveillance and health monitoring due to their capability of establishing communications among peer nodes in a self-organizing and adapting manner, without any infrastructure. Sensor networks use radio frequencies as a communication medium, which is vulnerable of all active and passive attacks from adversaries. The sensor net-work must be protected to avoid attacks from external parties. This protection is provided by the security primitives. This paper mainly concerns with problems associated in developing security protocols for wireless sensor networks, their requirements, and different types of attacks on sensor networks. This paper describes secure solutions for collecting and processing data in Wireless Sensor Networks (WSNs). Adequate security capabilities for medium and large scale WSNs are a hard but necessary goal to achieve to prepare these networks for the market. The paper also includes security and reliability challenges and also security solution for WSNs

    Development of security in wireless sensor network using IPv6

    Get PDF
    The Wireless Sensor Networks (WSNs) is one of core technologies expected to become a potential basis of future ever-present networks. WSN consists of multiple low cost sensor nodes, which could either, have a fixed location or randomly deployed that can communicate with each other for monitoring environments, medical systems, home network, industry automation and so on. However, most of the application scenarios require connectivity between WSNs and the Internet. Though WSN is typically not IP-enabled, connection to the IP network makes it easy to monitor sensors everywhere in the world. One of the purposes of the research work is to incorporate the IPv6 with WSNs, where IPv6 offers a larger address space. Therefore each of the sensor nodes will have their own IP address compare to IPv4, which has limited address space.The main objective of this research is to implement security in WSNs. Sensor networks are typically characterized by limited power supplies, low bandwidth, small memory sizes and limited energy. In addition, unlike traditional networks, sensor nodes are often deployed in accessible areas, presenting the added risk of physical attack. This leads to a very demanding environment in providing security. The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. The encryption and decryption of the payload secure the data's of the packet transfer. Other than that the XOR encryption is meant to realize the real time routing where the packets will be delivered within their end-to-end deadlines.XOR encryption security has been implemented in the 61owpan/IPv6 stack for TinyOS 2.1. TinyOS 2.1 an embedded operating system commonly used in wireless sensor networks. The hardware platforms used in this project, the TelosB motes, the 802.15.4 wireless communication standard and the TinyOS 2.1 operating syste

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table
    • …
    corecore