A Study of Security Requirements in Wireless Sensor Networks for Smart Home Healthcare Systems

Author(s):  
Ahlam Alami ◽  
Laila Benhlima ◽  
Slimane Bah
Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


2014 ◽  
Vol 977 ◽  
pp. 484-490
Author(s):  
Run Zeng

Wireless Sensor Networks (WSNs) are used in many applications in military and commercial areas. These applications often include the monitoring of sensitive information such as enemy movement on the battlefield or the location of personnel in a building. However, due to the highly resource constrained in sensor nodes, traditional security strategies always can do few with attacks on WSNs. In this Paper, we proposes a study of attacks and security mechanisms in WSNs. First, we summarize the attacks to WSNs and the security requirements based on the TCP\IP networking model, then we present the security solutions to each attack. Along the way we highlight the advantages and disadvantages of various WSN solutions and further compare and evaluate these solutions.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Baojiang Cui ◽  
Ziyue Wang ◽  
Bing Zhao ◽  
Xiaobing Liang ◽  
Yuemin Ding

With rapid development and extensive use of wireless sensor networks (WSNs), it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.


2013 ◽  
Vol 10 (2) ◽  
pp. 589-609 ◽  
Author(s):  
Chin-Ling Chen ◽  
Yu-Ting Tsai ◽  
Aniello Castiglione ◽  
Francesco Palmieri

Wireless sensor networks (WSN) have become increasingly popular in monitoring environments such as: disaster relief operations, seismic data collection, monitoring wildlife and military intelligence. The sensor typically consists of small, inexpensive, battery-powered sensing devices fitted with wireless transmitters, which can be spatially scattered to form an ad hoc hierarchically structured network. Recently, the global positioning system (GPS) facilities were embedded into the sensor node architecture to identify its location within the operating environment. This mechanism may be exploited to extend the WSN?s applications. To face with the security requirements and challenges in hierarchical WSNs, we propose a dynamic location-aware key management scheme based on the bivariate polynomial key predistribution, where the aggregation cluster nodes can easily find their best routing path to the base station, by containing the energy consumption, storage and computation demands in both the cluster nodes and the sensor nodes. This scheme is robust from the security point of view and able to work efficiently, despite the highly constrained nature of sensor nodes.


Sign in / Sign up

Export Citation Format

Share Document