Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey

Author(s):  
Preeti Sinha ◽  
V. K. Jha ◽  
Amit Kumar Rai ◽  
Bharat Bhushan
Author(s):  
Christian Wittke ◽  
Kai Lehniger ◽  
Stefan Weidling ◽  
Mario Schoelzel

With the growing number of wireless devices in the internet of things (IoT), maintenance and management of these devices has become a key issue. In particular, the ability to wirelessly update devices is a must in order to fix security issues and software bugs, or to extend firmware functionality. Code update mechanisms in wireless sensor networks (WSNs), a subset of IoT networks, must handle limited resources and strict constraints. Also, over-the-air (OTA) code updates in the context of an IoT ecosystem may open new security vulnerabilities. An IoT security framework should therefore be extended with additional mechanisms to secure the OTA code update functionality. The chapter presents an overview of various OTA code update techniques for WSNs and their security flaws along with some existing attacks and possible countermeasures. It is discussed which attacks can be used more easily with the code update functionality. Countermeasures are compared as to whether they secure the weakened security objectives, giving a guideline to choose the right combination of countermeasures.


Author(s):  
Zeydin Pala

Wireless sensor networks (WSNs) still attract the attention of researchers, users and the private sector despite their low power and low range tendency for malfunction. This attraction towards WSNs results from their low cost structure and the solutions they offer for many prevalent problems. Many conditions, which remain unforeseen or unexpected during the design of the system, may arise after the initialization of the system. Similarly, many situations where security vulnerabilities take place may emerge in time in WSNs operating normally. In this study, we called nodes which enter sleeping mode without any further waking up and causing a sparser number of nodes in the network without any function in data transmission as Long-Term Sleep Nodes (LT-SN); and considered energy spaces caused by such nodes as a problem; and established two Linear Programming (LP) models based on the efficiency of the present nodes. We offered two different models which present the effect of sensor nodes, which were initially operating in wireless sensor network environment and did not wake up following sleep mode, on network lifetime. The results of the present study report that as the number of LT-SN increases, the lifetime of the network decreases.


2021 ◽  
Author(s):  
Yongyu Jia

In this thesis, we propose a two-level hierarchical clustering-based routing protocol for wireless sensor networks (WSNs). WSNs consist of hundreds of thousands of energy-limited sensor nodes that are densely deployed in a large geographical region. Once deployed, the replacement of the energy sources of these sensor nodes is usually not feasible. Hence, energy efficiency is always a key design issue that needs to be enhanced in the WSN to improve the life span of the entire network. Each layer of the Open System Interconnect (OSI) Reference Model should be considered when exploiting the energy constrain in the WSN, the routing protocol proposed in this thesis, which is called the Clustering-Based Expanding-Ring Routing Protocol (CBERRP), lies mainly on the network layer. CBERRP gains the preferred performance over two typical clustering-based routing schemes in terms of network lifetime, power consumption and throughput by adopting the concept of cross-layer design. CBERRP is centralized-controlled by the base station and utilizes the two-level hierarchical structure of clusters (level-I) and chains (level-II) to route and forward the sensed data from the WSN to the base station. In addition, CBERRP can be fine-tuned to support multiple Data Aggregation Qualities for the WSN applications. The performance of CBERRP is compared to analogous clustering-based schemes such as Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-centralized (LEACH-C). The simulation results show that CBERRP presents a significant improvement over these two schemes on the performance of overall consumption and the network lifetime by around 50% and 100%, respectively


2021 ◽  
Author(s):  
Yongyu Jia

In this thesis, we propose a two-level hierarchical clustering-based routing protocol for wireless sensor networks (WSNs). WSNs consist of hundreds of thousands of energy-limited sensor nodes that are densely deployed in a large geographical region. Once deployed, the replacement of the energy sources of these sensor nodes is usually not feasible. Hence, energy efficiency is always a key design issue that needs to be enhanced in the WSN to improve the life span of the entire network. Each layer of the Open System Interconnect (OSI) Reference Model should be considered when exploiting the energy constrain in the WSN, the routing protocol proposed in this thesis, which is called the Clustering-Based Expanding-Ring Routing Protocol (CBERRP), lies mainly on the network layer. CBERRP gains the preferred performance over two typical clustering-based routing schemes in terms of network lifetime, power consumption and throughput by adopting the concept of cross-layer design. CBERRP is centralized-controlled by the base station and utilizes the two-level hierarchical structure of clusters (level-I) and chains (level-II) to route and forward the sensed data from the WSN to the base station. In addition, CBERRP can be fine-tuned to support multiple Data Aggregation Qualities for the WSN applications. The performance of CBERRP is compared to analogous clustering-based schemes such as Low-Energy Adaptive Clustering Hierarchy (LEACH) and LEACH-centralized (LEACH-C). The simulation results show that CBERRP presents a significant improvement over these two schemes on the performance of overall consumption and the network lifetime by around 50% and 100%, respectively


Sign in / Sign up

Export Citation Format

Share Document