Abstract

WSN is one of the dominant and emerging technology that shows great promise for various application in military, ecological and health related areas.WSN is highly vulnerable to attacks and inclusion of wireless communication technology incurs various types of security threats.WSN requires security measures due to sensitive data and as sensor may operate in hostile unattended environment.WSN suffer from constraints like low computational capability, small memory limited energy resources physical capture susceptibility and insecure wireless communication channel. These create security a challenge in WSN. In this article we provide a survey of security in WSN.We provide an outline with constraints and security requirement and attacks with their counter measures in WSN.

Highlights

  • Wirless sensor networks (WSN) are emerging to solve many problems related to networking,security and social factors

  • In order to understand the security aspects of WSN, we provide a brief description of the different attacks and present the possible solutions

  • We present some of the typical attacks on WSN security and lastly we describe some well-known mechanisms for preventing some the attacks

Read more

Summary

INTRODUCTION

Wirless sensor networks (WSN) are emerging to solve many problems related to networking ,security and social factors. Idea behind sensor network is to distribute sensor devices in an area to sense any change related to different parameter and communicate those changes or incident to other devices. In WSN transreceivers are used for communicating between sensors. As WSN is progressing, security factor related to WSN is becoming crucial and new challenges are introduced in WSN day-by- day. Sensor data can be attacked externally and internally. Sensor can be captured physically and data can modify or new message can be transmitted or message can be leaked/used .WSN is more susceptible to Dos(Denial-ofservice) attack.Dos attack is performed for disturbing or destroying network and to create problem in service providing

WSN Security
WSN Attacks
WSN Requirements
Secrecy and Authentication
Denial of Service
Sybil Attacks
Secure Routing
Privacy
Anonymity mechanisms
Information flooding
Resilience to node capture
CRYPTOGRAPHY
Node Replication Attacks
HELLO flood attacks
Secure group management
Intrusion Detection
Secure Data Aggregation
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.