scholarly journals The Relative performance of Security protocols and attacks in Wireless Sensor Network

Author(s):  
Karishma Dobhal ◽  
Rohan Varma ◽  
Varun Barthwal ◽  
M.M.S. Rauthan

Wireless Sensor Network is organized by arranging a huge number of sensor nodes in a region to the investigation of normally remote locations. A Wireless sensor network contains various applications such as landslide detec­tion, automotive application, health, noise level, environmental, vehicular movement, and battlefield. A Sensor node has different components to complete the work for sensing the data, transmitting, and processing the data into the network. Security is a very challenging issue in the WSNs. Various security threats and attacks may affect or damage the functioning (activity) of these networks. Attack divided the main two types active and passive.  This paper focuses on several security attacks like Blackhole, fabrication, Sybil, DoS, sinkhole, wormhole, flood­ing. We have also explained security protocols are 3 categories.  Data-Centric, Geographic, and hierarchical pro­tocol. Other are SPIN, LiSP, LEDs, LLSP, LEACH protocols. We explain the term attack threat, vulnerabilities, and security requirements.

2020 ◽  
Vol 16 (10) ◽  
pp. 155014772095167
Author(s):  
Walter Tiberti ◽  
Federica Caruso ◽  
Luigi Pomante ◽  
Marco Pugliese ◽  
Marco Santic ◽  
...  

Among the classes of wireless personal area networks, a wireless sensor network typically refers to a versatile and densely distributed sensing platform that enables the support of a wide variety of application domains. Among the various technical challenges addressed by more than one decade of research in wireless sensor networks, security across wireless links is by far one of the most critical ones and relates to the need of guaranteeing reliability and trustiness of the collected data. This article deals with the cryptographic aspects involved in securing wireless sensor networks, in terms of confidentiality and authentication. In particular, moving from some results previously achieved in our research activity, this article extends a cryptography scheme in order to better comply with the security requirements that arise from real-world wireless sensor network installations. The proposed scheme, called topology-authenticated key scheme 2, takes advantage of hybrid cryptography to provide security in the presence of resource-constrained sensor nodes using topology-authenticated keys to provide increased robustness to the scheme itself. The proposed extensions provide full practical support to star-topology wireless sensor networks and the article presents also some experimental results obtained by implementing the scheme on two different wireless sensor network platforms available for protocol stacks compliant with the IEEE 802.15.4 standard.


Author(s):  
T. Sri Nandini

Wireless Sensor Network security challenges and defences techniques are presented for protection of authenticity integrity, confidentiality and availability of transmission against malicious wireless attacks. Wide range of Wireless attacks and security threats at different layers. Due to the sensitive nature of the data gathered by many wireless sensor network (WSNs)it is becoming more difficult to protect the data. This paper analyzes security requirements in wireless sensor network and it facing more attacks and threats, we also discuss the open challenges in the Software Defined Network.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 153
Author(s):  
Harkesh Sehrawat ◽  
Yudhvir Singh ◽  
Vikas Siwach

A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.  


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Chaoran Li ◽  
Yun Liu

Wireless sensor network is a self-organizing multihop network, which is composed of a large number of wireless sensor nodes and usually deployed in unattended environment to collect target information. At present, WSN is facing a growing range of security threats owing to its wireless and resource-constrained characteristics. Compromised sensor nodes can easily corrupt data accuracy and integrity by falsifying sensed information, selectively forwarding or misdirecting received data packets during the process of data aggregation. To solve these security problems, we propose a smart reputation-based data aggregation protocol for WSNs (SRDA) that can provide adequate protection of data accuracy and integrity for wireless sensor network. The simulation results indicate that SRDA can effectively identify the compromised nodes and isolate them from the network by the deployment of the smart reputation system.


2016 ◽  
Vol 78 (4-3) ◽  
Author(s):  
Raja Waseem Anwar ◽  
Majid Bakhtiari ◽  
Anazida Zainal ◽  
Kashif Naseer Qureshi

The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance. 


Author(s):  
Chao Wang

Background: It is important to improve the quality of service by using congestion detection technology to find the potential congestion as early as possible in wireless sensor network. Methods: So an improved congestion control scheme based on traffic assignment and reassignment algorithm is proposed for congestion avoidance, detection and mitigation. The congestion area of the network is detected by predicting and setting threshold. When the congestion occurs, sensor nodes can be recovery quickly from congestion by adopting reasonable method of traffic reassignment. And the method can ensure the data in the congestion areas can be transferred to noncongestion areas as soon as possible. Results: The simulation results indicate that the proposed scheme can reduce the number of loss packets, improve the throughput, stabilize the average transmission rate of source node and reduce the end-to-end delay. Conclusion: : So the proposed scheme can enhance the overall performance of the network. Keywords: wireless sensor network; congestion control; congestion detection; congestion mitigation; traffic assignment; traffic reassignment.


2018 ◽  
Vol 14 (01) ◽  
pp. 4
Author(s):  
Wang Weidong

To improve the efficiency of the remote monitoring system for logistics transportation, we proposed a remote monitoring system based on wireless sensor network and GPRS communication. The system can collect information from the wireless sensor network and transmit the information to the ZigBee interpreter. The monitoring system mainly includes the following parts: Car terminal, GPRS transmission network and monitoring center. Car terminal mainly consists by the Zigbee microcontroller and peripherals, wireless sensor nodes, RFID reader, GPRS wireless communication module composed of a micro-wireless monitoring network. The information collected by the sensor communicates through the GPRS and the monitoring center on the network coordinator, sends the collected information to the monitoring center, and the monitoring center realizes the information of the logistics vehicle in real time. The system has high applicability, meets the design requirements in the real-time acquisition and information transmission of the information of the logistics transport vehicles and goods, and realizes the function of remote monitoring.


Author(s):  
Edison Pignaton de Freitas ◽  
Tales Heimfarth ◽  
Ivayr Farah Netto ◽  
Carlos Eduardo Pereira ◽  
Armando Morado Ferreira ◽  
...  

2014 ◽  
Vol 701-702 ◽  
pp. 1025-1028
Author(s):  
Yu Zhu Liang ◽  
Meng Jiao Wang ◽  
Yong Zhen Li

Clustering the sensor nodes and choosing the way for routing the data are two key elements that would affect the performance of a wireless sensor network (WSN). In this paper, a novel clustering method is proposed and a simple two-hop routing model is adopted for optimizing the network layer of the WSN. New protocol is characterized by simplicity and efficiency (SE). During the clustering stage, no information needs to be shared among the nodes and the position information is not required. Through adjustment of two parameters in SE, the network on any scale (varies from the area and the number of nodes) could obtain decent performance. This work also puts forward a new standard for the evaluation of the network performance—the uniformity of the nodes' death—which is a complement to merely taking the system lifetime into consideration. The combination of these two aspects provides a more comprehensive guideline for designing the clustering or routing protocols in WSN.


Sign in / Sign up

Export Citation Format

Share Document