Security Problems in Wireless Sensor Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-39 Number-1
Year of Publication : 2016
Authors : K.Ramesh Rao, Dr. S.N.Tirumala Rao, Prof. P. Chenna Reddy
  10.14445/22312803/IJCTT-V39P109

MLA

K.Ramesh Rao, Dr. S.N.Tirumala Rao, Prof. P. Chenna Reddy "Security Problems in Wireless Sensor Networks". International Journal of Computer Trends and Technology (IJCTT) V39(1):47-52, September 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
A wireless sensor network (WSN) could be a spatially distributed autonomous sensors to watch and hand in glove report data regarding physical or environmental conditions, like temperature, sound, pressure, etc. through the network to a server machine. WSNs area unit typically enforced for collection data from insecure atmosphere. Nearly all security protocols for WSN believe that the invader can do entirely management over a sensor node by method of direct physical access. the looks of sensor networks united of the most technology within the future has display numerous challenges to researchers. The challenges thrown by WSNs area unit distinctive given their delicate design and scant resources. despite the fact that security for wireless networks has been a wide researched space for several decades, security for WSNs continues to be a serious roadblock for his or her potency and performance.

References
[1] Kahina CHELLI “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures” Proceedings of the World Congress on Engineering 2015 Vol I WCE 2015, July 1 - 3, 2015, London, U.K.
[2] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp.102-114, August 2002.
[3] D. W. Carman, P. S. Krus, and B. J. Matt, “Constraints and approaches for distributed sensor network security,” Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, 2000.
[4] HBE-Zigbex. Ubiquitous sensor network. Zigbex Manual. [Online].Available: http://www.hanback.co.kr.
[5] Y. Xiao, “Security in distributed, grid, and pervasive computing,” (Eds.) Chapt.17, in Wireless sensor network security: A Survey, J.P. Walters, Z. Liang,W. Shi, and V. Chaudhary, Auerbach Publications, CRC Press, 2006.
[6] A. D. Wood and J. A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, 2002
[7] L. K. Bysani and A. K. Turuk, “A Survey on Selective Forwarding Attack in Wireless Sensor Networks,” in 2011 International Conference on Devices and Communications (ICDeCom), Feb., pp. 1–5.
[8] L. Lazos and R. Poovendran, “Secure broadcast in energyaware wireless sensor networks,” in Proc. IEEE International Symposium on Advances in Wireless Communications (ISWC 02), BC Canada, 2002.
[9] J. Deng, R. Han, and S. Mishra, “Countermeasures against traffic analysis in wireless sensor networks,” Technical ReportCUCS- 987-04, University of Colorado at Boulder, 2004.
[10] B. Parno, A. Perrig, and V. Gligor, “Distributed detection of node replication attacks in sensor networks,” in Proc. IEEE Symposium on Security and Privacy (SSP 05), May 2005, pp. 49- 63.
[11] V. Maty_a_s and J. K_ur. Conicts between intrusion detection and privacy mechanisms for wireless sensor networks. IEEE Security and Privacy, 11(5):73-76, 2013.
[12] S. Misra and G. Xue. E_cient anonymity schemes for clustered wireless sensor networks. International Journal of Sensor Networks, 1(1-2):50-63, 2006.
[13] D. Niculescu. Communication paradigms for sensor networks. IEEE Communications Magazine, 43(3):116-122, 2005.
[14] C. Karlof and D.Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, pages 113-127, 2003.
[15] V. Maty_a_s and J. K_ur. Conicts between intrusion detection and privacy mechanisms for wireless sensor networks. IEEE Security and Privacy, 11(5):73-76, 2013. Sujesh P. Lal et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 920-924 www.ijcsit.com 923
[16] F. Liu, X. Cheng, and D. Chen. Insider attacker detection in wireless sensor networks. In Proceedings of the 26th IEEE International Conference on Computer Communications, pages 1937{1945, 2007.
[17] A. Stetsko, L. Folkman, and V. Matyas. Neighbor-based intrusion detection for wireless sensor networks. Technical Report FIMU-RS-2010-04, Faculty of Informatics, Masaryk University, May 2010.
[18] Wireless Ad Hoc and Sensor Networks. [Online]. Available: http://www.zigbee.org/ 2005.
[19] Sujesh P Lal, Prof. H R Viswakarma. QoS Based Bandwidth Allocation for Networks. Volume-2, Number-2, December 2009. Pages 111-119.
[20] M. Cinque, A. Coronato, A. Testa, and C. Di Martino, “A Survey on Resiliency Assessment Techniques for Wireless sensor Networks,” in Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, New York, NY, USA, 2013, pp. 73–80.

Keywords
security for WSNs continues to be a serious roadblock for his or her potency and performance.