Abstract
Today, in modern world, technology has improved a lot with wireless communication. Wireless sensor network is normally constructed without any fixed network infrastructure. It is very simple, cheap, self-organized and easy to deploy the nodes in wide range. WSN protocols are mainly designed to focus on energy efficiency and lifetime improvement. Apart from those, WSNs face so many challenges due to limited number of resources available such as memory, computing, space, and bandwidth. The main duty of sensor node is used to collect the information from the environment and transmit the data to the control unit. Due to large number of collection and transmission, they should need to protect from hacker. WSNs need to provide security in all aspects of their architecture reference model. In this chapter, the main contribution includes architecture, attacks and countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Miller, V.S.: Use of elliptic curves in cryptography. In: Proceedings of the Advances in Cryptology- CRYPTO’85, Santa Barbara, California, USA, Springer LNCS, vol. 218, pp. 417–426 (1986)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(1), 96–99 (1983)
Saleh, M., Khatib, I.A.: Throughput analysis of WEP Security in Ad Hoc sensor networks. In: Proceeding of the Second International Conference on Innovations in Information Technology (IIT’05), 26–28 September, Dubai (2005)
Kim, C.H., Lee, S., Yang, W.I., Lee, H-W., Steganalysis on BPCS steganography. In: Pacific Rim Workshop on Digital Steganography (STEG’03), 3–4 July, Japan (2003)
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(80), 102–114 (2002)
Hussain, M., Hussain, M.: A survey of image steganography techniques. Int. J. Adv. Sci. Technol. 54 (2013)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521–534 (2002)
Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A low-energy key management protocol for wireless sensor networks. In: Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), vol. 1, pp. 335–340 (2003)
Rabaey, J.M., Ammer, J., Karalar, T., Li, S., Otis, B., Sheets, M., Tuan, T.: PicoRadios for wireless sensor networks: the next challenge in ultra-low power design. In: 2002 IEEE International Solid-State Circuits Conference (ISSCC 2002), vol. 1, pp. 200–201, 3–7 Feb 2002
Hollar, S.: COTS Dust. Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley (2000)
Kurak, C., McHugh, J.: A cautionary note on image downgrading in computer security applications. In: Proceedings of the 8th Computer Security Applications Conference, San Antonio, December, pp. 153–159 (1992)
Mokowitz, I.S., Longdon, G.E., Chang, L.: A New paradigm hidden in steganography. In: Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, County Cork, Ireland, pp. 41–50 (2001)
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, Oct 2004
Kobiltz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)
Ye, F., Lou, H., Lu, S., Zhang, L.: Statistical en-route filtering of injected false data in sensor networks. In: Proceedings of the IEEE INFO COM, Mar 2004
Zhu, S., Setia, S., Jajodia, S., Ning, P.: An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks. In: Proceedings of the IEEE Symposium Security and Privacy (2004)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proceedings of the Advances in Cryptology (Crypto ’92), pp. 471–486, Apr 1992
Zhang, W., Subramanian, N., Wang, G.: Lightweight and compromise-resilient message authentication in sensor networks. In: Proceedings of the IEEE INFOCOM, Apr 2008
Perrig, R., Tygar, C. J., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium Security and Privacy, May 2000
Albrecht, M., Gentry, C., Halevi, S., Katz, J.: Attacking Cryptographic Schemes Based on ‘Perturbation Polynomials, Report 2009/098 (2009). http://eprint.iacr.org/
Chung, T., Roedig, U.: Efficient Key Establishment for Wireless Sensor Networks Using Elliptic Curve Diffie-Hellman (2007)
Wacker, A., Knoll, M., Heiber, T., Rothermel, K.: A New Approach for Establishing Pairwise Keys for Securing Wireless Sensor Networks (2005)
Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Netw. 13(6), 24–30 (1999)
Strulo, B., Farr, J., Smith, A.: Securing mobile Ad hoc networks—a motivational approach. BT Technol. J. 21(3), 81–89 (2003)
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile Ad Hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 38–47 (2004)
Pathan, A-S.K., Alam, M., Monowar, M., Rabbi, F.: An efficient routing protocol for mobile Ad Hoc networks with neighbor awareness and multicasting. In: Proceedings of the IEEE E-Tech, Karachi, pp. 97–100, 31 July 2004
Blackert, W.J., Gregg, D.M., Castner, A.K., Kyle, E.M., Hom, R.L., Jokerst, R.M.: Analyzing interaction between distributed denial of service attacks and mitigation technologies. In: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, pp. 26–36, 22–24 April 2003
Wang, B.-T., Schulzrinne, H.: An IP traceback mechanism for reflective DoS attacks. Can. Con. Electric. Comput. Eng. 2(2–5), 901–904 (2004)
Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 3rd edn., Prentice Hall (2003)
Harold Robinson, Y., Rajaram, M.: “Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”. Sci. World J. 1–9. (2015). https://doi.org/10.1155/2015/284276
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the Third International Symposium on Information Processing in Sensor Networks. ACM, pp. 259–268 (2004)
Julie, E.G., Tamilselvi, S., Robinson, Y. H.: Performance analysis of energy efficient virtual back bone path based cluster routing protocol for WSN. Wireless Pers. Commun. 91(3), 1171–1189 Springer (2016)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, pp. 293–315, September 2003
Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, vol. 3, pp. 1976–1986, 30 March–3 April 2003
Robinson, Y.H., Julie, E.G., Balaji, S., Ayyasamy, A.: Energy aware clustering scheme in wireless sensor network using neuro-fuzzy approach. Wireless Pers. Commun. 95(2), 703–721 Springer (2017)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 42–51 (2003)
Oniz, C.C, Tasci, S.E, Savas, E., Ercetin, O., Levi, A.: SeFER: Secure, Flexible and Efficient Routing Protocol for Distributed Sensor Networks, from http://people.sabanciuniv.edu/~levi/SeFER_EWSN.pdf
Robinson, Y.H., Julie, E.G., Saravanan, K., Kumar, R.: FD-AOMDV: Fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks. J. Ambient Intell. Humanized Comput. 1–18. Springer (2017) https://doi.org/10.1007/s12652-018-1126-3
Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava,M.B.: On communication security in wireless ad-hoc sensor networks. In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139–144, 10–12 June 2002
Balaji, S., Julie, E.G., Robinson, Y.H.: Development of fuzzy based energy efficient cluster routing protocol to increase the lifetime of wireless sensor networks. Mobile Network. Appl. 24(2), 394–406 (2019)
Yuan, L., Qu, G.: Design space exploration for energy-efficient secure sensor network. In: Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 88–97, 17–19 July 2002
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, MD, USA, pp. 162–175 (2004)
Younis, M., Youssef, M., Arisha, K.: Energy-aware routing in cluster-based sensor networks. In: Proceedings 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, pp. 129–136, 1–16 Oct 2002
Y. Harold Robinson & E. Golden Julie, MTPKM: Multipart Trust Based Public Key Management Technique to Reduce Security Vulnerability in Mobile Ad-Hoc Networks, pp. 1–22, Wireless Personal Communications, Springer (2019). https://doi.org/10.1007/s11277-019-06588-4
Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, RTSS 2003, pp. 286–297 (2003)
Krishnan, R.S., Julie, E.G., Robinson, Y.H., Kumar, R., Abdel-Basset, M., Thong, P.H.: A new algorithm for high power node multicasting in wireless sensor networks. IEEE Acc. 7, 38584–38592 (2019)
Hamid, M.A., Rashid, M-O., Hong, C.S.: Routing security in sensor network: hello flood attack and defense. In: To Appear in IEEE ICNEWS 2006, Dhaka, 2–4 January
Robinson, Y.H., Krishnan, R.S., Julie, E.G., Kumar, R., Thong, P.H. Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in Mobile Ad-hoc Networks. Ad Hoc Network. 93, 101896. Elseiver (2019). https://doi.org/10.1016/j.adhoc.2019.101896
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the ACM CCS’02, pp. 41–47, 18–22 Nov 2002
Robinson, Y.H., Julie, E.G., Kumar, R.: Probability-based cluster head selection and fuzzy multipath routing for prolonging lifetime of wireless sensor networks. Peer-to-Peer Network. Appl. 1–15 (2019). https://doi.org/10.1007/s12083-019-00758-8
Robinson, Y.H., Julie, E.G.: SMR: a Synchronized Multipath Re-broadcasting mechanism for improving the quality of conversational video service. Wireless Pers. Commun. 104(3), 1149–1173 (2019)
Harold Robinson, Y., Golden Julie, E., Ayyasamy, A, Archana, M.: Cluster based routing in sensor network using soft computing techniques: a survey. Asian J. Res. Soc. Sci. Humanit. 7(3), 341–360
Thanga Aruna, M., Golden Julie, E., Harold Robinson, Y.: A survey on techniques for selection of forwarding node in wireless sensor networks. Int. J. Adv. Comput. Electron. Eng. 2(4), 24–29 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Golden Julie, E., Harold Robinson, Y. (2020). Security and Privacy Issues in Wireless Sensor Networks. In: Pattnaik, P., Kumar, R., Pal, S., Panda, S. (eds) IoT and Analytics for Agriculture. Studies in Big Data, vol 63. Springer, Singapore. https://doi.org/10.1007/978-981-13-9177-4_9
Download citation
DOI: https://doi.org/10.1007/978-981-13-9177-4_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9176-7
Online ISBN: 978-981-13-9177-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)