Security Protocols for Wireless Sensor Networks

2004 ◽  
pp. 213-233 ◽  
Author(s):  
Mumtaz Qabulio ◽  
Yasir Arfat Malkani ◽  
Muhammad S. Memon ◽  
Ayaz Keerio

Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.


2014 ◽  
Vol 9 (5) ◽  
Author(s):  
Fangmin Sun ◽  
Zhan Zhao ◽  
Zhen Fang ◽  
Lidong Du ◽  
Zhihong Xu ◽  
...  

Author(s):  
Jihyeon Ryu ◽  
Hakjun Lee ◽  
Hyoungshick Kim ◽  
Dongho Won

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.'s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.'s scheme in detail. We also propose a new scheme by fixing such vulnerabilities and improving the performance of the protocol.


2014 ◽  
Vol 13 (9) ◽  
pp. 4898-4906
Author(s):  
Hesham A. El Zouka

The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs.  Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.


Sensors ◽  
2018 ◽  
Vol 18 (12) ◽  
pp. 4481 ◽  
Author(s):  
Jihyeon Ryu ◽  
Hakjun Lee ◽  
Hyoungshick Kim ◽  
Dongho Won

Wireless sensor networks are widely used in many applications such as environmental monitoring, health care, smart grid and surveillance. Many security protocols have been proposed and intensively studied due to the inherent nature of wireless networks. In particular, Wu et al. proposed a promising authentication scheme which is sufficiently robust against various attacks. However, according to our analysis, Wu et al.’s scheme has two serious security weaknesses against malicious outsiders. First, their scheme can lead to user impersonation attacks. Second, user anonymity is not preserved in their scheme. In this paper, we present these vulnerabilities of Wu et al.’s scheme in detail. We also propose a new scheme to complement their weaknesses. We improve and speed up the vulnerability of the Wu et al. scheme. Security analysis is analyzed by Proverif and informal analysis is performed for various attacks.


Wireless Sensor Networks (WSN) is falls under overwhelming and surging technology that shows extraordinary guarantee for different advanced potential applications like military, atomic power plant, human services and so forth, where security is a basic issue. These systems are generally utilized as a part of different conditions that likewise incorporates open condition, unattended nature, a few asset limitations, remote and shared correspondence, un-trusted and broadband transmissions between them, that have different imperatives like low calculation ability, restricted memory, decreased battery existence, absence of foundation that forces safety as an extra difficult undertaking. In this paper a point-by-point examination on the safety related problems in WSN are made. Likewise, a brief on different security systems with proficient power conservation procedures is shown in a table. Comparison of all the security protocols are based on the technique used to give security in wireless sensor networks, the framework used or model used, the key mechanism they are using to provide the best security they can give, which all performance parameters they are improving in terms of energy consumption or increasing network age or reducing some unwanted network performance affecting characteristics and also on what kind of security they are providing and up to which extend they are providing security while transmitting the packets from one end to other end.


Sign in / Sign up

Export Citation Format

Share Document