scholarly journals Improving the Resilience of Wireless Sensor Networks Against Security Threats: A Survey and Open Research Issues

2018 ◽  
Vol 9 (4) ◽  
pp. 828 ◽  
Author(s):  
Saqib Ali ◽  
Taisira Al Balushi ◽  
Zia Nadir ◽  
Omar Khadeer Hussain
Author(s):  
Al-Salti Faiza A. ◽  
Al-Zeidi Nasser M. ◽  
Day Khaled ◽  
Arafeh Bassel ◽  
Touzene Abderezak

With the recent advances in underwater sensor devices and technologies, underwater wireless sensor networks (UWSNs) enable a variety of applications such as underwater exploration and monitoring, disaster prevention, and military surveillance and reconnaissance. However, these kinds of networks faces a number of challenges induced by the nature of the underwater environment and its influence on the physical media. Therefore, new routing protocols are proposed specifically for such networks to mitigate these challenges. This paper surveys some of the recent routing protocols for UWSNs. Specifically, the idea of each protocol is presented as well as its advantages and disadvantages. Furthermore, the presented protocols are classified into different categories. The paper is concluded with some open research issues.


2017 ◽  
Vol 2017 ◽  
pp. 1-16 ◽  
Author(s):  
Farruh Ishmanov ◽  
Yousaf Bin Zikria

Routing is one of the most important operations in wireless sensor networks (WSNs) as it deals with data delivery to base stations. Routing attacks can cripple it easily and degrade the operation of WSNs significantly. Traditional security mechanisms such as cryptography and authentication alone cannot cope with some of the routing attacks as they come from compromised nodes mostly. Recently, trust mechanism is introduced to enhance security and improve cooperation among nodes. In routing, trust mechanism avoids/includes nodes in routing operation based on the estimated trust value. Many trust-based routing protocols are proposed to secure routing, in which they consider different routing attacks. In this research work, our goal is to explore the current research state and identify open research issues by surveying proposed schemes. To achieve our goal we extensively analyze and discuss proposed schemes based on the proposed framework. Moreover, we evaluate proposed schemes based on two important factors, which are energy consumption and attack resiliency. We discuss and present open research issues in the proposed schemes and research field.


Author(s):  
Anita Swain ◽  
Arun Kumar Ray

In this paper, we present a survey concerned with research focusing on the convergence of wireless sensor networks (WSN) and mobile cellular networks (MCN). The convergence of WSNs and MCNs may be a trigger stimulating new research dealing with such issues as architecture, protocols and air interfaces. The highlights and constraints of the phenomenon are discussed in this paper as well. The survey deals with convergence networks and with their smarty city applications. A few open research issues are also brought to the attention of researchers specializing in this field


2014 ◽  
Vol 556-562 ◽  
pp. 5976-5978
Author(s):  
Ke Zhao ◽  
Long Fei Xiao ◽  
Ya Long Hu ◽  
Zhong Wang

With the advance of technology, people is more and more nervous to security threats posed by wireless sensor. Therefore, Based on security technology, this paper puts forward a suitable for the safety management unit used in wireless sensor network, And the provisions of its agreement, authentication methods and security processing methods, making wireless sensor networks can transmit user information in a secure environment, while simulation analysis the affect design module on date security transmission, when the wireless sensor networks have security management unit, it will a better, more reliable transmission environments.


Author(s):  
Farooq Alam ◽  
Zahooruddin ◽  
Ayaz Ahmad ◽  
Muhammad Iqbal

In this chapter, the authors provide a comprehensive review of spectrum sensing in cognitive radio sensor networks. Firstly, they focus on general techniques utilized for spectrum sensing in wireless sensor networks. To have good understanding of core issues of spectrum sensing, the authors then give a brief description of cognitive radio networks. Then they give a thorough description of the main techniques that can be helpful in doing spectrum sensing in cognitive radio sensor network. The authors conclude this chapter with open research issues and challenges that need to be addressed to provide efficient spectrum sensing in order to minimize the limitations in cognitive radio sensor networks.


Author(s):  
Alekha Kumar Mishra

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.


Sign in / Sign up

Export Citation Format

Share Document