WSN Security Mechanisms for CPS

Author(s):  
Saqib Ali ◽  
Taiseera Al Balushi ◽  
Zia Nadir ◽  
Omar Khadeer Hussain
Keyword(s):  

Offering efficient key management scheme (KMS) in WSN faces many challenges that will significantly impact the design and implementation of security protocols for WSN. The goal of KMS is to provide an effective environment in which the sensor node can communicate in a secure manner. It should be able to resolve the issue of generate, allocate the cryptographic keys in WSN in an efficient and effective manner. Hence, the methods for trustworthy allocation and management of these keys are very important for security of WSN. Many KMSs have been developed in recent years. However inherent characteristics of a WSN make incorporating security a great challenge. This paper presents a comprehensive review of current state-of-the-art of KMS designed for WSN security and compare with respect to several evaluation metrics. This paper also investigates the security requirements, goals and challenges of KMS based on existing literature reviews. We also attempt to provide insight in to potential research trends in the area of WSN security and outline the approaches that are likely to play a very important role.


2013 ◽  
Vol 818 ◽  
pp. 230-236
Author(s):  
Yu Quan Zhang

A secure scheme for wireless sensor network is presented through dividing sensing area into clusters and using the overlap key sharing (OKS) concept in this paper. The two-dimensional sensing square is divided into a number of small squares called cells, four of which consist of a cluster called logical group. The overlap key sharing protocol creates long bit clusters as the key cluster pools and distributes a sub-group to store every sensor as the key cluster. Analysis and comparison demonstrate this scheme enhances the WSN security, realizes the flexile secure grades for WSNs, and has good network connectivity.


Author(s):  
Juan A. Nolazco Flores ◽  
Vinh Hoa La ◽  
Ana Rosa Cavalli ◽  
Raul V. Ramirez Velarde ◽  
Raul A. Fuentes Samaniego
Keyword(s):  

2021 ◽  
Vol 3 (2) ◽  
pp. 59-67
Author(s):  
Abul Bashar ◽  
Smys S

This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.


2009 ◽  
Vol 42 (3) ◽  
pp. 171-178
Author(s):  
Herbert Schweinzer ◽  
Gerhard Spitzer

2014 ◽  
Vol 530-531 ◽  
pp. 45-49
Author(s):  
Jian Gang Tang

Security measures could not absolutely prevent network intrusion. The security technology of intrusion detection system had made up for the lack of preventive measures; it could provide real-time intrusion detection and take appropriate protection for network. The research directions of WSN security were how to improve security strength and prolong the life of nodes, how to enhance the preventive ability of intelligent security system and real-time detection with high detection accuracy. This paper analyzed the typical network intrusion and defensive strategies, and researched WSN intrusion detection model by analyzing the typical algorithm. IDS model was divided into three types the first was based on single-node detection, the other was based on Multi-node peer cooperative, and the third was based on task decomposition level. Finally the paper gave the main research topic and direction for WSN security issues.


Sign in / Sign up

Export Citation Format

Share Document