A Survey on Network Security and Attack Defense Mechanisam for Wireless sensor Network
Shio Kumar Singh , M P Singh and D K Singh. "A Survey on Network Security and Attack Defense Mechanisam for Wireless sensor Network "International Journal of Computer Trends and Technology (IJCTT),V1(2):131-139 May to June Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract—The severe constraints and demanding depl oyment environments of wireless sensor networks make s ecurity for these systems more challenging than for conventional networks. However, several properties of sensor networks may help address the challenge of building secure networks. T he unique aspects o f sensor networks may allow novel defenses not available in conventional networks. In this paper, we investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks
References-
1. Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEEE, 2009.
[2] Shio Kumar Sing h, M.P. Singh, and D.K. Singh, “A survey of Energy - Efficient Hierarchical Cluster - based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA) , Sept. – Oct. 2010, vol. 02, issue 02, pp. 570 – 580.
[3] Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Energy - efficient Homogeneous Clustering Algorithm for Wireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN) , Aug. 2010, vol. 2, no. 3, pp. 49 - 61.
[4] Shio Kumar Singh, M.P. Singh, and D.K. Sin gh, “Applications, Classifications, and Selections of Routing Protocols for Wireless Sensor Networks” International Journal of Advanced Engineering Sciences and Technologies (IJAEST) , November 2010, vol. 1, issue no. 2, pp. 85 - 95.
[5] Shio Kumar Singh, M.P. Si ngh, and D.K. Singh, “Routing Protocols in Wireless Sensor Networks – A Survey” International Journal of Computer Science and Engineering Survey (IJCSES) , November 2011, Vol. 1, issue no. 2, pp. 63 - 83.
[6] Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Perform ance Evaluation and Comparison of Energy - efficient Routing Protocols for Wireless Sensor Network", Global Journal of Computer Application and Technology (GJCAT), Jan. 2011, vol. 1, no. 1, pp. 57 - 65.
[7] Shio Kumar Singh, M.P. Singh, and D.K. Singh, "Energy Eff icient Transmission Error Recovery for Wireless Sensor Network", International Journal of Grid and Distributed Computing (IJGDC), December 2010, vol. 3, no. 4, pp. 89 - 104.
[8] E. Yoneki and J. Bacon, “A survey of Wireless Sensor Network technologies: research trends and middleware’s role”, Technical Report, 2005 . http://www.cl.cam.ac.uk/TechReports, ISSN 1476 - 2986.
[9] J.P. Walters, Z. Liang, W. Shi, and V. Chaudhary, “Wireless sensor network security - a survey”, Security in Distributed, Grid, Mobile, and Pervas ive Computing , Auerbach Publications, CRC Press, 2007.
[10] L.L. Fernandes,“Introduction to Wireless Sensor Networks Report”, University of Trento . 2007, http://dit.unitn.it/~fernand/downloads/iwsn .pdf
[11] A. T. Zia, “A Security Framework for Wireless Sensor Networks”. 2008, http://ses.library.usyd.edu.au/bitstream/2123/ 2258/4/02whole.pdf
[12] P. Mohanty, S. A. Panigrahi, N. Sarma, and S. S. S atapathy, “ Security Issues in Wireless Sensor Network Data Gathering Protocols: A Survey” Journal of Theoretical and Applied Information Technology , 2010, pp. 14 - 27.
[13] M.J. Karmel Mary Belinda and C. Suresh Gnana Dhas, “A Study of Security in Wireless Sensor Networks”, MASAUM Journal of Reviews and Surveys” , Sept. 2009, vol. 1, Issue 1, pp. 91 - 95.
[14] A.D. Wood and J. Stankovic, “Denial of service in sensor network”, IEEE Computer Magazine , vol. 5, no. 10, Oct. 2002, pp. 54 - 62.
[15] J. Newsome, E. Shi, D. Song, and A. Perrig, “The Sybil attack in sensor networks: Analysis and defenses” in Proceedings of the 3 rd IEEE International Symposium on Information Processing in Sensor Networks (IPSN’04) , Berkley, CA, Apr. 2004, pp. 259 - 268.
[16] Y. C. Hu, A. Perrig, and D.B. Johnso n, “Packet leashes: A defense against wormhole attacks in wireless networks”, in Proceedings of the 22 nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ’03) , vol. 3, San Francisco, CA, Mar. 2003, pp. 1976 - 1986.
[17] Chris Ka rlof, Naveen Sastry, and David Wagner, “TinySec: A Link Layer security Architecture for Wireless Sensor Networks”, ACM SenSys 2004 , Nov. 3 - 5, 2004, pp. 162 - 175.
[18] W. Stallings, “ Cryptography and Network Security Principles and Practice “, Cryptography Book, 2 nd Edition, Prentice - Hall , 2000, 0 - 13 - 869017 - 0.
[19] C. Karlof and D. Wagner, “Secure Routing in Sensor Networks: Attacks and Countermeasures”, Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network ( SNPA) , Sept. 2003, pp. 293 - 315.
[20] Ritu Sharma, Yoge sh Chaba, and Yudhbir Singh, “Analysis of Security Protocols in Wireless Sensor Network”, International Journal of Advanced Networking and Applications”, Aug. 2010, vol. 2, Issue 2, pp. 707 - 713.
[21] Xiuli Ren and Haibin Yu, “Security Mechanisms for Wireless S ensor Networks”, International Journal of Computer Science and Network security (IJCSNS) , March 2006, vol. 6, no. 3, pp. 155 - 161.
[22] Jeffery Undercoffer, Sasikanth Avancha, Anupam Joshi, and John Pinkston, “Wireless Sensor Networks”, an edited book, Kluwer P ublications, ISBN: 1 - 4020 - 7883 - 8
[23] M. Sharifnejad, M. Shari, M. Ghiasabadi and S. Beheshti, “A Survey on Wireless Sensor Networks Security”, SETIT 2007.
[24] J.R. Douceur, “The Sybil Attack”, in 1 st International Workshop on Peer - to - Peer Systems (IPTPS’02) , March 2002, LNCS 2429, 2002, pp. 251 - 260.
[25] Y.C. Hu, A. Perrig, and D. B. Johnson, "Wormhole detection in wireless ad hoc networks," Department of Computer Science, Rice University, Tech. Rep. TR01 - 384 , June 2002.
[26] H.K. Kalita and A. Kar, “Wireless Sensor Networks Security Analysis”, International Journal of Next - Generation Networks (IJNGN), vol. 1, no. 1, Dec. 2009, pp. 01 - 09.
[27] W.J. Blackert, D.M. Gregg, A.K. Castner, E.M. Kyle, R.L. hom, and R.M. Jokerst “Analyzing interaction between distributed denial of service attacks and mitigation technologies”, Proc. DARPA Information Survivability Conference and Exposition , Vol. 1, 22 - 24 April, 2003, pp. 26 – 36
[28] B.T. Wang and H. Schulzrinne, “An IP traceback mechanism for reflective DoS attacks”, Canadian Conference on Ele ctrical and Computer Engineering , Vol. 2, 2 - 5 May 2004, pp. 901 – 904.
[29] B.J. Culpepper and H.C. Tseng, “Sinkhole intrusion indicators in DSR MANETs”, Proc. First International Conference on Broad band Networks , 2004, pp. 681 – 688.
[30] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical en - route filtering of injected false data in sensor networks”, IEEE Journal on Selected Areas in Communications , Volume 23, Issue 4, April 2005, pp. 839 – 850.
[31] L. Yuan and G. Qu, G, “Design space exploration for energy - efficient sec ure sensor network”, Proc. The IEEE International Conference on Application - Specific Systems, Architectures and Processors , 2002, 17 - 19 July 2002, pp. 88 – 97.
[32] G. Jolly, M.C. Kuscu, P. Kokate, and M. Younis, “A Low - Energy Key Management Protocol for Wirele ss Sensor Networks”, Proc. Eighth IEEE International Symposium on Computers and Communication , 2003. (ISCC 2003). vol.1, pp. 335 - 340.
[33] M. Younis, M. Youssef, and K. Arisha, “Energy - aware routing in cluster - based sensor networks” Proc. 10th IEEE Internatio nal Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems, 1 - 16 Oct. 2002 pp. 129 – 136.
[34] A.D. Wood, J.A. Stankovic, and S.H. Son, “JAM: A Jammed - Area Mapping Service for Sensor Networks”, 24th IEEE Real - Time Systems Symp osium, (RTSS) , 2003, pp. 286 - 297.
[35] M. Cagalj, S. Capkun, and J.P. Hubaux, “Wormhole - based Anti - Jamming Techniques in Sensor Networks” from http://lcawww.epfl.ch/Publications/Cagal j/CagaljCH05 - worm.pdf .
[36] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, “SPINS:
KeywordsWireless Sensor Networks (WSNs) , Security, Threats, Attacks,