Security Challenges in Wireless Sensor Network

Author(s):  
Meenakshi Tripathi ◽  
M.S. Gaur ◽  
V.Laxmi

Wireless Sensor Networks are a subset of ad hoc networks. Their unique characteristics are smaller node size, high node density, unattended operation in remote areas. Dynamic topology and wireless communication make them vulnerable to numerous types of attacks. In addition to that, memory, processing, and energy constraint make it difficult to incorporate compute-intensive security solutions in these networks. Existing solutions for developing cost and energy efficient algorithms do not fit the security parameters for these resource constrained networks. As a result, these networks remain vulnerable to several types of attacks. This chapter presents a survey of various attacks at the different layers of WSN protocol stack, their detection, and countermeasures. Although every layer of the stack has its own security challenges, the network layer is most vulnerable to many security attacks because it provides an excellent basis for traffic monitoring activities, which helps the attacker form a strategy to perform the attack. The most common attacks on this layer are the Sybil attack, selective forwarding attack, wormhole attack, sinkhole attack, etc. This survey provides a comprehensive view of present attacking strategies to disrupt the normal functioning of WSN.

Author(s):  
Meenakshi Tripathi ◽  
M.S. Gaur ◽  
V. Laxmi

Wireless Sensor Networks are a subset of ad hoc networks. Their unique characteristics are smaller node size, high node density, unattended operation in remote areas. Dynamic topology and wireless communication make them vulnerable to numerous types of attacks. In addition to that, memory, processing, and energy constraint make it difficult to incorporate compute-intensive security solutions in these networks. Existing solutions for developing cost and energy efficient algorithms do not fit the security parameters for these resource constrained networks. As a result, these networks remain vulnerable to several types of attacks. This chapter presents a survey of various attacks at the different layers of WSN protocol stack, their detection, and countermeasures. Although every layer of the stack has its own security challenges, the network layer is most vulnerable to many security attacks because it provides an excellent basis for traffic monitoring activities, which helps the attacker form a strategy to perform the attack. The most common attacks on this layer are the Sybil attack, selective forwarding attack, wormhole attack, sinkhole attack, etc. This survey provides a comprehensive view of present attacking strategies to disrupt the normal functioning of WSN.


2012 ◽  
Vol 3 (1) ◽  
pp. 158-161 ◽  
Author(s):  
A.V Pramod ◽  
Md. Abdul Azeem ◽  
M. Om Prakash

Mobility is frequently a problem for providing security services  in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passively monitor traffic in the network can able to detect a Sybil attacker which uses a number of network identities simultaneously. We can do through simulation that this detection can be done by a single node, or multiple trusted nodes can join to improve the accuracy of detection. We then show that although the detection mechanism will falsely identify groups of nodes traveling together as a Sybil attacker, we can extend the protocol to monitor collisions at the MAC level to differentiate between a single attacker spoofing many addresses and a group of nodes traveling in close proximity.


Author(s):  
S. Srinivasan ◽  
S. P. Alampalayam

Mobile ad hoc networks (MANET) present the opportunity to connect transient nodes to the internet without having central control. This very design supports new nodes to join and leave the network based on their proximity to the MANET. Concurrently, it creates many security challenges for authenticating nodes that are not present in a traditional wired network. Much of the existing work on MANET security has focused on routing and mobility. In this paper, the authors present an algorithm that considers the neighboring nodes’ status to determine if a particular node is malicious or not. The authors used NS2 simulation tool to test the algorithm and present the results in the paper. The major benefits of this research work are in military applications.


Author(s):  
Ana Vazquez Alejos ◽  
Paula Gómez Pérez ◽  
Manuel Garcia Sanchez ◽  
Muhammad Dawood

Simulation software in MANET research is vital. Such a tool provides a versatile mechanism to understand all the involved aspects of these particular systems, from the radio interface to the last communication layer. In this chapter, the authors present the SimuMANET project, a tool for both simulation and field tests purpose. It allows the deployment of wireless reconfigurable ad-hoc networks and MANETs, assisted by a real-time graphical user interface (GUI) for network traffic monitoring and management of radio electric features of the links established between the active network nodes. Due to a set of functionalities, such as GUI, network topology visualization, traffic and motion pattern configuration, and real-time network status analysis, the simulator introduced here becomes a valid tool for both research and education targets. Two scenarios with different types of motion and traffic are simulated using the SimuMANET tool, and the results are shown and commented to illustrate some capabilities of this software.


Author(s):  
Ramprasad Subramanian ◽  
Farhana Afroz ◽  
Kumbesan Sandrasegaran ◽  
Xiaoying Kong

This chapter forays into the literature of emerging field of Self-Organization Network (SON) and its application in the area of location-based services. SON is a widely applied technology in the ad hoc networks, wireless sensor networks and automatic computer networks. This chapter deal exclusively about the projects, standards and literature of SON in the context of the cellular networks and how it can aid to achieve higher position accuracy information of the subscriber. Additionally, in this chapter a clear understanding of SON taxonomy and the guidelines for the design of SON has been presented and a comparison of SON with the existing solutions about its strength and weakness has been made in this chapter. The key research areas for further development is also highlighted in this chapter. This literature will provide comprehensive guidance for anyone interested to delve into the research of SON in cellular wireless communication and location based services.


2012 ◽  
pp. 864-892
Author(s):  
Jianmin Chen ◽  
Jie Wu

Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.


Author(s):  
Phan Cong-Vinh

In mobile environments (MEs) such as vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and so on, formal specification of self-configuring P2P networking (SPN) emerges as a need for programming, and verifying such mobile networks. Moreover, well-specified SPN in MEs becomes a requirement of developing middleware for the mobile networks. The chapter is a reference material for readers who already have a basic understanding of the MEs for their applications and are now ready to know how to specify and verify formally aspect-oriented self-configuring P2P networking (ASPN) in MEs using categorical language, assured that their computing needs are handled correctly and efficiently. ASPN in MEs is presented in a straightforward fashion by discussing in detail the necessary components and briefly touching on the more advanced components. Several explanatory notes and examples are represented throughout the chapter as a moderation of the formal descriptions. Significant properties of ASPN in MEs, which emerge from the specification, create the firm criteria for verification.


Sign in / Sign up

Export Citation Format

Share Document