The Security Issues and Common Attacks in Wireless Sensor Networks

Article Preview

Abstract:

Wireless Sensor Networks (WSNs) are used in many applications in military, ecological, and health-related areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. Security is therefore important in WSNs. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. In this article we present a study of wireless sensor network and security issues. And we outline the constraints, security requirements, and attacks with their corresponding countermeasures in WSNs.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

1299-1304

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Akyildiz, Ian F., and Mehmet Can Vuran. Wireless sensor networks. Vol. 4. John Wiley & Sons, (2010).

Google Scholar

[2] Sora D. Security Issues in Wireless Sensor Networks[J]. International Journal of Online Engineering (iJOE), 2010, 6(4): pp.26-30.

Google Scholar

[3] Potdar, Vidyasagar, Atif Sharif, and Elizabeth Chang. Wireless sensor networks: A survey. " Advanced Information Networking and Applications Workshops, 2009. WAINA, 09. International Conference on. IEEE, (2009).

DOI: 10.1109/waina.2009.192

Google Scholar

[4] Jaydip Sen, A SURVEY ON WIRELESS SENSOR NETWORK SECURITY, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 1, No. 2, August (2009).

Google Scholar

[5] Ghamgin H, Akhgar M S, Jafari M T. Attacks in Wireless Sensor Network[J]. Journal of Applied Sciences Research, 2011, 7(7).

Google Scholar

[6] D. Boyle, T. Newe, Security Protocols for use with Wireless Sensor Networks, Third International Conference on Wireless and Mobile Communications (ICWMC'07).

DOI: 10.1109/icwmc.2007.80

Google Scholar

[7] Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou, Sensor Network Security: A Survey, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 11, NO. 2, SECOND QUARTER (2009).

DOI: 10.1109/surv.2009.090205

Google Scholar