scholarly journals Internet of Things (IoT) Enabled Wireless Sensor Networks Security Challenges and Current Solutions

Nowadays Internet of Things (IoT) is emerging and effective technology along with Wireless Sensor Networks (WSNs) in a few constant applications in which the human intervention significantly reduced along with better human life. In IoT enabled WSNs, the sensor nodes used to assemble the fragile data and communicate towards the sink hub and actuators for automotive remote monitoring process. However as the WSNs operating at free frequency band, it is powerless against different attacks at various layers of WSNs protocol stack in which attackers may try to hack and compromise the user’s personal information. There are different types of attacks in WSNs and several research works conducted to protect from these attacks in WSNs. Majority of security methods proposed are based layered technique. However, the layer approach is not enough to protect the WSNs effectively as the many attackers used the cross-layer information to perform the attacks. This paper presents the study over the layered security solutions and their research problems at first to justify the importance of cross-layer solutions. The review of different ways of designing the cross-layer security techniques for WSNs with their behaviour presented as well. The challenges of IoT enabled WSNs single layered security solutions presented and then the various cross-layer solutions reviewed in this paper. The comparative study of different cross-layer techniques to demonstrate the layers and their parameters involved to detect of security threats. The outcome of this review work is the research challenges noticed from the present cross-layer solutions.

2022 ◽  
pp. 104-122
Author(s):  
Zuleyha Akusta Dagdeviren ◽  
Vahid Akram

Internet of things (IoT) envisions a network of billions of devices having various hardware and software capabilities communicating through internet infrastructure to achieve common goals. Wireless sensor networks (WSNs) having hundreds or even thousands of sensor nodes are positioned at the communication layer of IoT. In this study, the authors work on the connectivity estimation approaches for IoT-enabled WSNs. They describe the main ideas and explain the operations of connectivity estimation algorithms in this chapter. They categorize the studied algorithms into two divisions as 1-connectivity estimation algorithms (special case for k=1) and k-connectivity estimation algorithms (the generalized version of the connectivity estimation problem). Within the scope of 1-connectivity estimation algorithms, they dissect the exact algorithms for bridge and cut vertex detection. They investigate various algorithmic ideas for k connectivity estimation approaches by illustrating their operations on sample networks. They also discuss possible future studies related to the connectivity estimation problem in IoT.


2019 ◽  
Vol 3 (2) ◽  
pp. 48-52
Author(s):  
Reem Jafar Ismail ◽  
Samar Jaafar Ismae ◽  
Wisam H. Ali

Internet of things (IoT) aims to develop a smart world based on sensing environment. The energy management of wireless sensor networks (WSNs) is a big challenge in IoT since sensor nodes have limited energy and they need to have long life for collecting data and information. The aim of this paper is to propose an efficient energy routing algorithm in WSN and infrastructure based on construction an adaptive energy map of sensor nodes. The results show improvement in overall system performance and lifetime of WSN compared to traditional scenario.


IoT (Internet of Things) means the technology of connecting to the Internet by adding communication functions to all objects. IoT is physical constraints and limited resources which means are a vulnerability for hacking attacks. Therefore, IoT needs countermeasures of the hacking attack. These IoT devices are becoming a target of hacking. Hacking attacks on IoT devices are causing privacy and personal information leakage, and hacked devices are also used for DDoS(Distributed DoS) attacks. To overcome IoT physical constraints, various methods on each sensor in a wireless sensor networks are proposed. We analyzed various characteristics of sensor nodes and listed pros & cons. In addition, countermeasures on each IoT attacks were suggested. By analyzing such cases of hacking damage, I have identified the common weaknesses of IoT devices and looked for countermeasures. Therefore, it contributes to secure communication over a wireless sensor networks


2021 ◽  
Vol 5 (2) ◽  
pp. 52-55
Author(s):  
Reem J. Ismail ◽  
Khalid F. Jasim ◽  
Samar J. Ismael ◽  
Soma A. M. Solaimanzadeh

Wireless sensor networks aim to develop a smart city based on sensing environment. The routing protocols of wireless sensor networks is important to transfer the data in smart cities since sensor nodes have limited power and transmission range. The aim of this research is to enhance wireless sensor networks routing protocols based on proposed cross-layer interaction between physical layer and network layer also a proposed routing table information of wireless sensor nodes is developed to consider the transmission power of neighbor’s nodes to determine the next hop. Cross-layer interaction provides a useful information and effective adaptation for WSN routing protocols. As a result, the proposed routing protocol shows an improvement in network performance when number of intermediate nodes are minimized.


Internet of things is defined in many ways is an internet technology connected to devices, machines and tools by the means of wireless technology, such as connected homes, cities, cars and roads, etc. The IoT is the platform to connect physical objects that contain built-in technology to interact and sends or communicate with their internal blocks or external environment. Nearly one trillion devices are internet connected devices which are available with mobile applications, linking all these connected things. Billions of devices are being communicated all the way though out the world over network protocols, in 2010 which was made by an IoT. Daily around 12.5 billion things or devices are interacting with internet. Since past two decades many researchers and industries were attracted towards IoT because of its reliability. If domestic appliances like Oven, Refrigerator, Air conditioner, Geezer, Smart TV are connected in a network, they all work together in association to provide an ideal service as an entire, not as a collection of independently working devices. IoT is a powerful tool which is used in many ways in the development of real-world applications and services, for example building a smart residence where light should ON when the person enters into the room at night time, windows can be closed automatically when it rains, and automatically windows will be open if any leakage of gas. Wireless Sensor Networks are included into the “Internet of Things”, where sensor nodes are connected to the Internet vigorously, and use it to act as a team and complete their action. Wireless Sensor Networks are well apt for long-term environmental data acquirement for IoT representation. In this paper, we provide the information on designing challenges on wireless sensor networks for an IoT application.. This paper presents an overview on an IoT, functional design of WSN for IoT application, details an architecture of IoT and related key issues.


2015 ◽  
Vol E98.B (7) ◽  
pp. 1333-1344
Author(s):  
Raymundo BUENROSTRO-MARISCAL ◽  
Maria COSIO-LEON ◽  
Juan-Ivan NIETO-HIPOLITO ◽  
Juan-Antonio GUERRERO-IBANEZ ◽  
Mabel VAZQUEZ-BRISENO ◽  
...  

Author(s):  
A. Radhika ◽  
D. Haritha

Wireless Sensor Networks, have witnessed significant amount of improvement in research across various areas like Routing, Security, Localization, Deployment and above all Energy Efficiency. Congestion is a problem of  importance in resource constrained Wireless Sensor Networks, especially for large networks, where the traffic loads exceed the available capacity of the resources . Sensor nodes are prone to failure and the misbehaviour of these faulty nodes creates further congestion. The resulting effect is a degradation in network performance, additional computation and increased energy consumption, which in turn decreases network lifetime. Hence, the data packet routing algorithm should consider congestion as one of the parameters, in addition to the role of the faulty nodes and not merely energy efficient protocols .Nowadays, the main central point of attraction is the concept of Swarm Intelligence based techniques integration in WSN.  Swarm Intelligence based Computational Swarm Intelligence Techniques have improvised WSN in terms of efficiency, Performance, robustness and scalability. The main objective of this research paper is to propose congestion aware , energy efficient, routing approach that utilizes Ant Colony Optimization, in which faulty nodes are isolated by means of the concept of trust further we compare the performance of various existing routing protocols like AODV, DSDV and DSR routing protocols, ACO Based Routing Protocol  with Trust Based Congestion aware ACO Based Routing in terms of End to End Delay, Packet Delivery Rate, Routing Overhead, Throughput and Energy Efficiency. Simulation based results and data analysis shows that overall TBC-ACO is 150% more efficient in terms of overall performance as compared to other existing routing protocols for Wireless Sensor Networks.


2017 ◽  
pp. 252
Author(s):  
Mohammed A. Abuhelaleh ◽  
Tahseen A. Al-Ramadin ◽  
Bassam A. Alqaralleh ◽  
Moha'med Al-Jaafereh ◽  
Khaled Almi'ani

Sign in / Sign up

Export Citation Format

Share Document