Online citations, reference lists, and bibliographies.
← Back to Search

Security In Wireless Sensor Networks

V. C. Giruka, M. Singhal, James Royalty, S. Varanasi
Published 2008 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
With sensor networks on the verge of deployment, security issues pertaining to the sensor networks are in the limelight. Though the security in sensor networks share many characteristics with wireless ad hoc networks, the two fields are rapidly diverging due to the fundamental differences between the make-up and goals of the two types of networks. Perhaps the greatest dividing difference is the energy and computational abilities. Sensor nodes are typically smaller, less powerful, and more prone to failure than nodes in an ad hoc network. These differences indicate that protocols that are valid in the context of ad-hoc networks may not be directly applicable for sensor networks. In this paper, we survey the state of art in securing wireless sensor networks. We review several protocols that provide security in sensor networks, with an emphasis on authentication, key management and distribution, secure routing, and methods for intrusion detection. Copyright © 2006 John Wiley & Sons, Ltd.
This paper references
Security for Sensor Networks
Sasikanth Avancha (2004)
10.1016/S1570-8705(03)00008-8
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof (2003)
10.1109/VETECF.2003.1286170
Energy efficient security protocol for wireless sensor networks
H. Cam (2003)
10.1016/S1389-1286(03)00352-9
Secure sensor networks for perimeter protection
Sasikanth Avancha (2003)
James Royalty graduated with an M.S. degree in computer science from the University of Kentucky
Multi-Level μ TESLA : A Broadcast Authentication System for Distributed Sensor Networks ∗
D. Liu (2003)
Securing sensor networks against base station DoS and search-and-destroy attacks
J Deng (2003)
10.1524/itit.2010.9066
Security in Sensor Networks
S. Fischer (2010)
10.1145/565702.565708
A taxonomy of wireless micro-sensor network models
S. Tilak (2002)
Secure routing in sensor networks: Attacks and countermeasures
C Karlof (2003)
10.1109/IPDPS.2001.925191
Time synchronization for wireless sensor networks
J. Elson (2001)
10.1109/MPRV.2002.993145
Connecting the Physical World with Pervasive Networks
D. Estrin (2002)
Everywhere: A Research Agenda for Networked Systems of Embedded Computers, 1st (edn)
(2001)
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
D. W. Carman (2000)
10.1109/MC.2002.1039518
Denial of Service in Sensor Networks
A. Wood (2002)
10.1016/S1570-8705(03)00046-5
Providing secrecy in key management protocols for large wireless sensors networks
R. Pietro (2003)
INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02
Jing Deng (2002)
Copyright Ltd. Wirel. Commun. Mob. Comput
(2006)
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
D. Liu (2003)
10.1109/65.806983
Securing ad hoc networks
L. Zhou (1999)
He is a Fellow of IEEE. He is a recipient of
(1993)
Securing sensor networks against base station DoS and search-and-destroy attacks. Submitted for publication (http://www.cs.colorado.edu/∼mishras/research/ sensor.html)
J Deng (2003)
Security in Computing, 2nd edn
CP Pfleeger (1997)
Smart dust: wireless networks of millimeter-scale sensor networks Energyefficient security protocol for wireless sensor networks
Ksj Pister (1999)
10.1145/774763.774788
Routing on a curve
B. Badrinath (2003)
10.1145/345910.345955
Mitigating routing misbehavior in mobile ad hoc networks
S. Marti (2000)
10.1109/ENABL.2002.1030000
On communication security in wireless ad-hoc sensor networks
Sasha Slijepcevic (2002)
10.1109/SNPA.2003.1203366
Data funneling: routing with aggregation and compression for wireless sensor networks
D. Petrovic (2003)
He is currently serving in the editorial board of From 1998 to 2001, he served as the Program Director of Operating Systems and Compilers program at National Science Foundation
10.1109/SECPRI.2003.1199337
Random key predistribution schemes for sensor networks
H. Chan (2003)
The energy cost of secrets in ad-hoc networks
A. Hodjat (2002)
Security and Deployment Issues in a Sensor Network
Mike Chen (2000)
Challenge: secure routing protocols. http:// research.microsoft.com/projects / SWSecInstitute / five -minute/ Perrig5.ppt Presentation given at Software Security
A Perrig (2003)
The TESLA Broadcast Authentication Protocol
A. Perrig (2002)
INSENS: secure and intrusion tolerant routing for wireless sensor networks
J Deng (2002)
License free ethernet radio modems—The only wireless ethernet modem designed for industrial environments
D Mhoon (1999)
Challenge: secure routing protocols. http:// research.microsoft.com/projects /SWSecInstitute /five -minute/ Perrig5.ppt
A. Perrig (2003)
SPINS : Security Protocols for Sensor Networks
Jeffery Undercoffer (2002)
Enhancing Base Station Security in Wireless Sensor Networks
Jing Deng (2003)
Security for sensor networks. Technical report, University of Maryland Baltimore County, Center for Architectures for Data-Driven
J Undercoffer (2002)
10.1145/381677.381684
Capacity of Ad Hoc wireless networks
Jinyang Li (2001)
10.1145/941311.941317
Rushing attacks and defense in wireless ad hoc network routing protocols
Y. Hu (2003)
Smart dust: wireless networks of millimeter-scale sensor nodes
K. Pister (1999)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
Srilekha Varanasi graduated with an M.S. degree in computer science from the university of Kentucky
10.1016/0960-2593(91)90044-a
Security in computing
C. Pfleeger (1988)
Energyefficient security protocol for wireless sensor networks
H am (2003)
10.1109/MCOM.2002.1024422
A survey on sensor networks
I. Akyildiz (2002)



This paper is referenced by
Improving Security and Enhancing Energy Efficiency in Routing for Wireless Sensor Networks
S. Malik (2012)
On the Tradeoff Between Privacy and Energy in Wireless Sensor Networks
S. Shrestha (2010)
10.1109/TIT.2019.2955473
Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers
J. Zhang (2020)
A Hierarchical Intrusion Detection System in Wireless Sensor Networks
Razib Hayat Khan (2010)
10.3390/s110404401
A Secure Cluster-Based Multipath Routing Protocol for WMSNs
Islam T. Almalkawi (2011)
10.3844/AJASSP.2014.969.977
EFFICIENT KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS
T. Lalitha (2014)
Energy Analysis of Wireless Sensor Networks using RSA and ECC Encryption Method
Amanjot Kaur (2013)
10.21172/1.ires.15
DETECTING MALICIOUS DATA INJECTION IN EVENT DETECTION USING EADA SCHEME
T. Priya (2017)
10.1109/SPAWC.2014.6941664
Power allocation for distortion minimization in distributed estimation with security constraints
Xiaoxi Guo (2014)
10.1145/2644809
SpartanRPC: Remote Procedure Call Authorization in Wireless Sensor Networks
Peter C. Chapin (2014)
10.1016/j.procs.2019.01.225
Challenges and Security Issues in Underwater Wireless Sensor Networks
G. Yang (2018)
10.1109/ICME.2008.4607465
Four dimensional chaotic ciphers for secure image transmission
M. Hamdi (2008)
10.5121/ijwmn.2014.6204
Analysis of Security Threats in Wireless Sensor Network
Sahabul Alam (2014)
Security Challenges of Wireless Communications Networks: A Survey
Gerald Ijemaru (2018)
Wireless Sensor Networks: An Overview on its Security Threats
Kalpana Sharma (2010)
10.1360/JOS181218
Key Management Schemes and Protocols for Wireless Sensor Networks
S. Zhong (2007)
Forward-Secure Sequential Aggregate Authentication
D. Ma (2007)
10.1145/2248371.2248383
Optimization schemes for protective jamming
S. Sankararaman (2012)
10.1109/ICWMC.2007.80
Security Protocols for Use with Wireless Sensor Networks: A Survey of Security Architectures
D. Boyle (2007)
10.1109/MILCOM.2010.5679559
DSF - A Distributed Security Framework for heterogeneous wireless sensor networks
Himali Saxena (2010)
10.1155/2010/975607
Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks
M. Otero (2010)
10.1109/GLOCOM.2009.5425922
CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks
X. Lin (2009)
10.24297/IJCT.V4I2C1.4175
TAXONOMY FOR WSN SECURITY-A SURVEY
K. A. Chaple (2018)
10.1109/NTMS.2008.ECP.94
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks
H. Redwan (2008)
10.5120/10718-5262
Categorized Security Threats in the Wireless Sensor Networks: Countermeasures and Security Management Schemes
Ulya Sabeel (2013)
10.4304/jnw.9.11.2943-2950
Elliptic curve cryptography for WSN and SPA attacks method for energy evaluation
Nabil Ghanmy (2014)
10.3233/978-1-60750-007-0-47
Securing wireless sensor networks towards a trusted "Internet of Things"
Theodore B. Zahariadis (2009)
10.1109/TrustCom.2012.281
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources
Arshad Jhumka (2012)
10.1109/WICT.2012.6409144
Securing Wireless Sensor Network based solutions
Rajarathnam Nallusamy (2012)
10.26472/IJRAE.V1I2.3
Analysis of Cryptography Techniques
Ravi K. Sheth (2015)
10.31979/ETD.BHPK-EU4Z
CENTRALIZED SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
Li Yang (2011)
10.11648/J.WCMC.20130104.11
Identifying and Locating Multiple Spoofing Attackers Using Clustering in Wireless Network
Amala Gracy (2013)
See more
Semantic Scholar Logo Some data provided by SemanticScholar