A survey of potential security issues in existing wireless sensor network protocols

Abstract

The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low-power wireless personal area networks, outing protocol for routing protocol for low-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This paper culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems

    Similar works