scholarly journals A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues

Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2365
Author(s):  
Gaurav Sharma ◽  
Stilianos Vidalis ◽  
Niharika Anand ◽  
Catherine Menon ◽  
Somesh Kumar

Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated.

Author(s):  
Mumtaz Qabulio ◽  
Yasir Arfat Malkani ◽  
Muhammad S. Memon ◽  
Ayaz Keerio

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 136 ◽  
Author(s):  
Riaz Shaik ◽  
Shaik Shakeel Ahamad

Wireless sensor networks are becoming part of many of the research areas to address different issues related to technological and societal. So, The developments in wireless communication technology have made the deployment of  wireless sensor nodes connected through wireless medium, known as wireless sensor networks. Wireless sensor networks have numerous applications in many fields like military , environmental monitoring , health , industry etc.. wireless sensor networks have more benefits over Wired networks .Though there are several advantages of wireless networks, they are prone to security issues. . Security became a major concern for wireless sensor networks because of the wider application. So ,this paper addresses the critical security issues of wireless sensor networks that may encounter in the different layers of the communication protocols like OSI.This paper presents a detailed review on the security issues and its challenges of the wireless sensor networks.  


Author(s):  
Karishma Dobhal ◽  
Rohan Varma ◽  
Varun Barthwal ◽  
M.M.S. Rauthan

Wireless Sensor Network is organized by arranging a huge number of sensor nodes in a region to the investigation of normally remote locations. A Wireless sensor network contains various applications such as landslide detec­tion, automotive application, health, noise level, environmental, vehicular movement, and battlefield. A Sensor node has different components to complete the work for sensing the data, transmitting, and processing the data into the network. Security is a very challenging issue in the WSNs. Various security threats and attacks may affect or damage the functioning (activity) of these networks. Attack divided the main two types active and passive.  This paper focuses on several security attacks like Blackhole, fabrication, Sybil, DoS, sinkhole, wormhole, flood­ing. We have also explained security protocols are 3 categories.  Data-Centric, Geographic, and hierarchical pro­tocol. Other are SPIN, LiSP, LEDs, LLSP, LEACH protocols. We explain the term attack threat, vulnerabilities, and security requirements.


Author(s):  
Mumtaz Qabulio ◽  
Yasir Arfat Malkani ◽  
Muhammad S. Memon ◽  
Ayaz Keerio

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.


Author(s):  
Sumita Mishra

Wireless sensor networking technology has been used extensively by both commercial and military applications for sensing and data collection purposes. The self-configuring, self-healing nature and the ease of deployment of these networks make them an attractive option to other centralized approaches. Most of the existing networking solutions for sensor networks focus on the communication aspects and do not address the data security concerns of these networks. Since sensor networks are being deployed for emerging applications involving sensitive data and are envisioned to be integrated with the cyber space, it is essential to address the security needs of wireless sensor networks. Designing security solutions for Wireless Sensor Networks is an extremely challenging task due to the resource constraints of sensor nodes and the distributed nature of network design. This chapter provides an overview of emerging sensor networks involving sensitive data and a discussion of some of the proposed security solutions.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Shu-Chuan Chu ◽  
Saru Kumari ◽  
...  

The wireless sensor network is a network composed of sensor nodes self-organizing through the application of wireless communication technology. The application of wireless sensor networks (WSNs) requires high security, but the transmission of sensitive data may be exposed to the adversary. Therefore, to guarantee the security of information transmission, researchers propose numerous security authentication protocols. Recently, Wu et al. proposed a new three-factor authentication protocol for WSNs. However, we find that their protocol cannot resist key compromise impersonation attacks and known session-specific temporary information attacks. Meanwhile, it also violates perfect forward secrecy and anonymity. To overcome the proposed attacks, this paper proposes an enhanced protocol in which the security is verified by the formal analysis and informal analysis, Burross-Abadii-Needham (BAN) logic, and ProVerif tools. The comparison of security and performance proves that our protocol has higher security and lower computational overhead.


Author(s):  
C. R. Bharathi ◽  
Alapati Naresh ◽  
Arepalli Peda Gopi ◽  
Lakshman Narayana Vejendla

In wireless sensor networks (WSN), the majority of the inquiries are issued at the base station. WSN applications frequently require collaboration among countless sensor nodes in a network. One precedent is to persistently screen a region and report occasions. A sensor node in a WSN is initially allocated with an energy level, and based on the tasks of that sensor node, energy will be reduced. In this chapter, two proposed methods for secure network cluster formation and authentication are discussed. When a network is established then all the nodes in it must register with cluster head and then authentication is performed. The selection of cluster head is done using a novel selection algorithm and for authenticating the nodes. Also, a novel algorithm for authentication is used in this chapter. The validation and authorization of nodes are carried over by managing the keys in WSN. The results have been analyzed using NS2 simulator with an aid of list of relevant parameters.


Author(s):  
Noor Zaman ◽  
Azween Abdullah ◽  
Khalid Ragab

Wireless Sensor Networks (WSNs) are becoming common in use, with a vast diversity of applications. Due to its resource constraints, it is hard to maintain Quality of Service (QoS) with WSNs. Though they contain a vast variety of applications, at the same time they are also required to provide different levels of QoS, for various types of applications. A number of different issues and challenges still persist ahead to maintain the QoS of WSN, especially in critical applications where the accuracy of timely, guaranteed data transfer is required, such as chemical, defense, and healthcare. Hence, QoS is required to ensure the best use of sensor nodes at any time. Researchers are trying to focus on QoS issues and challenges to get maximum benefit from their applications. With this chapter, the authors focus on operational and architectural challenges of handling QoS, requirements of QoS in WSNs, and they discuss a selected survey of QoS aware routing techniques by comparing them in WSNs. Finally, the authors highlight a few open issues and future directions of research for providing QoS in WSNs.


Author(s):  
Sanatan Mohanty ◽  
Sarat Kumar Patra

Wireless Sensor Network (WSN) consists of many tiny, autonomous sensor nodes capable of sensing, computation and communication. The main objective of IEEE 802.15.4 based WSN standard is to provide low cost, low power and short range communication. Providing QoS in WSN is a challenging task due to its severe resource constraints in terms of energy, network bandwidth, memory, and CPU. In this chapter, Quality of Service (QoS) performance evaluation has been carried out for IEEE 802.15.4 networks based WSN star and mesh topology using routing protocols like AODV, DSR and DYMO in QualNet 4.5 simulator. Performance evaluations metrics like Packet Delivery Ratio (PDR), throughput, average end to end delay, energy per goodput bit, network lifetime of battery model and total energy consumption which includes transmission, reception, idle and sleep mode were considered for both the topology. From the simulation studies and analysis, it can be seen that on an average DSR and DYMO performs better than AODV for different traffic load rates.


Author(s):  
Turki Ali Alghamdi

Abstract Wireless sensor networks (WSNs) comprise tiny devices known as sensors. These devices are frequently employed in short-range communications and can perform various operations such as monitoring, collecting, analyzing, and processing data. WSNs do not require any infrastructure, are reliable, and can withstand adverse conditions. Sensor networks are autonomous structures in which the sensor nodes can enter or leave the network at any time instant. If the entering node is attacker node it will monitor the network operation and can cause security issues in the network that can affect communication. Existing literature presents security improvements in such networks in the form of cryptography, asymmetric techniques, key distribution, and various protocols. However, these techniques may not be effective in the case of autonomous structures and can increase computational complexity. In this paper, a convolutional technique (CT) is proposed that generates security bits using convolutional codes to prevent malicious node attacks on WSNs. Different security codes are generated at different hops and the simulation results demonstrate that the proposed technique enhances network security and reduces computational complexity compared to existing approaches.


Sign in / Sign up

Export Citation Format

Share Document