scholarly journals Security Attacks in Wireless Sensor Networks

Author(s):  
Lalitha Bhagavathi Gurajada ◽  
Sai Deepthi Rajaputra ◽  
Indira Gogineni ◽  
Riaz Shaik

In today’s world, Security is the prime concern for each application. Network security and Computer protection are the serious issues. A broad range of Wireless Sensor Networks (WSNs) applications[1][15] are widely used in military, researches etc. The key subject of computing is to provide network security several types of attacks are increasing day by day. The attacks present in different layers are produced due to the susceptibilities present in the layers. The Seven layers in OSI model are formulated to convey the information from highest layer to lowest layer. Broadcast of data gets modified according to the layer in which it lies. Individually every layer is weak to different types of attacks. This paper models about the different attacks present in each layer of OSI.  

Author(s):  
Monojit Dey ◽  
Arnab Das ◽  
Avishek Banerjee ◽  
Ujjwal Kumar Kamila ◽  
Samiran Chattopadhyay

In this paper, we have proposed different deployment strategies and have applied area-wise clustering along with modified Ant Colony Optimization to minimize energy consumption. Background: Previously some deployment strategies were used to enhance the lifetime of WSN. In our research, we have applied some novel deployment strategies like random, spiral, and S-pattern along with a novel area-wise clustering process to get better results than the existing literature as shown in Table 4. Objective: The main objective of the research article is to enhance the lifetime of Wireless Sensor Network with the help of different deployment strategies like random, spiral, and S-pattern). A novel clustering process (i.e., area-wise clustering), and a Meta-heuristic algorithm (modified ACO) are applied. Method: We have applied different methods for deployment strategies (random, spiral, and S-pattern). A novel clustering process (i.e., area-wise clustering), and a Meta-heuristic algorithm (modified ACO) are applied to get the desired results. Results: Random Deployment: 11.15 days to 15.09 days. Spiral Deployment: 11.25 days to 15.23 days. S-Pattern Deployment: 11.33 days to 15.33 days. Conclusion: In this paper, efficient Wireless Sensor Networks have been configured considering energy minimization as the prime concern. To minimize the energy consumption a modified ACO algorithm has been proposed. In our work, the minimization of energy consumption leads to an increment of the lifetime of WSN to a significant margin theoretically. The obtained result has been compared with the existing literature and it has been found that the proposed algorithm produced a better result than the existing literature.


Author(s):  
Ibrahiem Mahmoud Mohamed El Emary

This chapter gives a brief background on network management and how it is integrated into sensor network as well as the application of computational intelligence techniques in managing wireless sensor networks. Also discussed how Genetic Algorithms work in common and how they can be applied to sensor networks. Among the major management tasks rely on consumption power management, so there are many challenges associated with sensor networks but the primary challenge is energy consumption. Sensor networks are typically have little human interaction and are installed with limited battery supplies. This makes energy conservation a critical issue in deployed WSNs. All types of networks require monitoring and maintenance. A service that supplies a set of tools and applications that assist a network manager with these tasks is network management. It includes the administration of networks and all associated components. While all networks require some form of network management, different types of networks may stress certain aspects of network management. Some networks may also impose new tasks on network management. There are different types of network management architectures: centralized, hierarchical and distributed. In a centralized approach, one central server performs the role of the network management application. A hierarchical architecture will include multiple platforms, typically one server and several clients, performing network management functions.


Author(s):  
Mumtaz Qabulio ◽  
Yasir Arfat Malkani ◽  
Muhammad S. Memon ◽  
Ayaz Keerio

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.


2011 ◽  
Vol 162 (4) ◽  
pp. 7-27
Author(s):  
Henryk ŁUKASIEWICZ

The aim of this publication is to introduce the issues connected with the work of sensors for military purposes. It explains the theoretical and practical aspects of the identification capabilities and the use of the different types of sensors in a multi-sensor wireless network. Very up-to-date is the use of technical devices to monitor the areas occupied by the enemy and which are hard to reach. Over the last few years, the possibility of gaining updated information without risking soldiers’ lives has become very important.Numerous telecoms have been influenced by the development of new technologies. They have begun implementing technologies connected with communication and the construction of sensors for industrial and military purposes.


Author(s):  
Văn Trường Nguyễn ◽  
Tuấn Anh Dương ◽  
Quý Sỹ Nguyễn

In wireless sensor networks, each sensor node nowadays is responsible for the exchange of sensory data with high performance in terms of QoS such as network throughput and delay under energy restrictions. Besides network performance, network security plays an important role in designing a wireless sensor network. One of current challenges is to design efficiently lightweight security methods to achieve highly secured transmissions and prolonged network lifetime. In this paper, we introduce an end-to-end two-way authentication scheme for WSNs under the heterogeneous assumption. By drawing on the benefit of lightweight homomorphic encryption and watermark data, numerical evaluations and security analysis show that our proposed method can prolong the network lifetime with the enhancement in network security.


IARJSET ◽  
2017 ◽  
Vol 4 (5) ◽  
pp. 1-7
Author(s):  
Salima Rashid Al Dhabooni ◽  
Hothefa Shaker Jassim ◽  
Zeyad T. Sharef ◽  
Bara T. Sharef

Sign in / Sign up

Export Citation Format

Share Document