A Review on Security Analysis in WSN (original) (raw)

A SECURITY OVERVIEW OF WIRELESS SENSOR NETWORK

As of late, remote sensor organize (WSN) is utilized in numerous application zones, for example, checking, following, and controlling. For some utilizations of WSN, security is an essential necessity. In any case, security arrangements in WSN vary from conventional systems because of asset confinement and computational requirements. This paper investigates security arrangements: Tiny Sec, IEEE 802.15.4, Twists, Mini SEC, LSec, LLSP, LISA, and Drawl in WSN. The paper additionally introduces qualities, security prerequisites, assaults, encryption calculations, and operation modes. This paper is thought to be valuable for security planners in WSNs.

An Evaluation of Security Protocols on Wireless Sensor Network

cse.tkk.fi

In recent years, Wireless Sensor Network (WSN) is employed in many application areas such as environmental monitoring, and battle field strategy planning. For many applications of WSN, security is an important requirement. However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes & compares five popular WSN protocols: Tinysec, LLSP, SPINS, LiSP, and LEDS with respect to security requirements, attack scenarios, and performance. The paper also presents application scenarios for general guidance.

Security Threats in Sensor Network in IoT: A Survey

In recent years, wireless sensor network (WSN) is used in several application areas resembling observance, tracking, and dominant in IoTs. for several applications of WSN, security is a crucial demand. However, security solutions in WSN disagree from ancient networks because of resource limitation and process constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. This paper additionally presents characteristics, security needs, attacks, cryptography algorithms, and operation modes. This paper is taken into account to be helpful for security designers in WSNs.

LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network

Lecture Notes in Computer Science, 2006

Constraint specific wireless sensor networks need energy efficient and secure communication mechanisms. In this paper we propose Lightweight Security protocol (LSec) that fulfils both requirements. LSec provides authentication and authorization of sensor nodes with simple secure key exchange scheme. It also provides confidentiality of data and protection mechanism against intrusions and anomalies. LSec is memory efficient that requires 72 bytes of memory storage for keys. It only introduces 74.125 bytes of transmission and reception cost per connection. 1

Study of wireless sensor networks with its applications and security

Wireless Sensor Networks (WSNs) are an emerging technology with a wide range of potential application areas such as monitoring, tracking and controlling. For several applications of Wireless Sensor Network, security is an important requirement. However, security solutions in Wireless Sensor Network are entirely different compared with traditional networks due to resource limitation and computational constraints. This paper presents the characteristics, security requirements, encryption algorithms and operation modes of Wireless Sensor Network to develop a security solution. Also, an overview of the applications of WSNs and different attacks and their countermeasures are to be discussed.

Security Issues in Wireless Sensor Networks: A Survey

International Journal of Future Generation Communication and Networking, 2013

Due to a wide range of applications, wireless sensor networks (WSNs) have recently attracted a lot of interest to the researchers. Limited computational capacity and power usage are two major challenges to ensure security in WSNs. Recently, more secure communication or data aggregation techniques have discovered. So, familiarity with the current research in WSN security will benefit researchers greatly. In this paper, security related issues and challenges in WSNs are investigated. We identify the security threats and review proposed security mechanisms for WSNs. Moreover, we provide a brief discussion on the future research direction in WSN security. be easily broken by attackers. Since in most cases, sensor nodes are insecure, so vulnerability to attack is an important issue. In this paper, we explore various security issues in WSNs and try to give a comparative note of various existing security approaches. Our contribution is therefore to provide a detailed yet concise analysis of various existing techniques which will enable the WSN implementers to approach security in an organized way. In this paper, we have reviewed possible attacks on WSN in general as well as existing security mechanism.

Security for wireless sensor networks: A review

2009 IEEE Sensors Applications Symposium, 2009

Due to the sensitive nature of the data gathered by many wireless sensor networks (WSNs) it is becoming critical that this data be protected. However, due to the constrained nature of the resources available on sensor nodes, traditional wireless networking security solutions are not viable due to their processing requirements, power consumption, speed and communications overhead. We review the threats and attacks faced by WSNs and then the current state of the art of dedicated WSN security protocols are examined and compared, focusing on their relative strengths and weaknesses.

Security Analysis Framework in Wireless Sensor Networks

IJAST, 2019

Security is an most important requirement in recent time for wireless sensor networks (WSNs) because WSNs employed in large number of application areas like as monitoring, tracking, and controlling in different fields. In this paper we analyze the various security solutions such as TinySec, LLSP, MiniSEC, SPINS, LSec, LISA, IEEE 802.15.4 and LISP in WSNs. In this paper also discussed the characteristics, security solutions, different wireless attacks on the layers of Physical, data link, network and transport layers, encryption algorithms, and operation modes in WSNs. This security analysis in wsn paper would be helpful for the researcher those are working on the security framework for WSNs. I. INTRODUCTION-Improvements in ease sensor models have made remote sensor systems (WSNs) another and known research zone. These systems comprise of huge number of low-power and ease sensors with restricted limit, short-go transmitters spatially appropriated in a regularly out of reach and inconsistent condition. Every hub has the capacities of computation, location, and correspondence. These hubs that can be arbitrarily dispersed in the earth to be watched can perceive one another and can play out the errand of estimating in a wide territory by cooperating. Perception of basic foundations, brilliant structures, circulated apply autonomy, traffic observing, analyzing human pulses, etc. Most of WSNs are conveyed in antagonistic conditions with dynamic savvy restriction. Subsequently security is a pivotal issue [1]. The WSN is confronting a wide assortment of security vulnerabilities because of the equipment restrictions of the sensor hubs, remote correspondence condition, continuous preparing needs, heterogenic structure, enormous number of hubs, requirement for quantifiability, versatility, the heaviness of the application natural conditions, and cost [2]. Privacy which is the essential objective of security gives one of the most significant impediments to defeat so as to guarantee the trustworthiness and accessibility just as the accomplishment of time basic and indispensable objectives. During touchy WSN applications, for example, the observation of adversary or fringes, the security conventions which empower the sensors to move mystery information to the base station must be utilized. The security conventions to be created should actualize all the security issues (information privacy, information trustworthiness, information freshness, information confirmation, and accessibility) yet in addition give high security low vitality utilization. "Besides, the way that the greater part of the recommended arrangements is simply founded on the reenactment stage and that arrangements on tangible stages are not considered is a major inadequacy in past research". Therefore, so as to have the option to utilize the proposed conventions in applications that require strong security, the conventions ought to likewise be tried on sensor hubs other than the recreation stage. TinyOS is introduced on the sensor hubs that make the WSN. DoS attack cannot steal the data from the sensor node and hub but it is deactivate the wireless sensor network system, so it's very dangerous attack in the WSNs [3]. TinyOS is an installed working framework appropriated for nothing out of pocket and with open source code to be utilized in remote sensor systems. Planned calculations or conventions can be introduced on the hubs by utilizing NesC programming language. TinyOS working framework is intended to help the necessities of remote sensor systems. While attempting to satisfy these necessities, it ought not be overlooked that WSN has limited vitality sources and the essential objective of a WSN is vitality productivity. Something else, a convention that satisfies all the security necessities however expend a touch of a lot of vitality will be only unreasonable for WSN. In this manner, to give the security prerequisites and the security arrangements, the techniques they use and their varieties in the writing must be very notable by the analysts building up another security arrangement. In this examination, security arrangements in WSN are investigated in detail. In WSN

Current Trends and Security Issues in Wireless Sensor Networks

Wireless Sensor Network (WSN) is a collection of sensor nodes. Sensor nodes are small in size and of low cost, which are operated under the control of central authority known as base station using wireless channel. Wireless sensor network shows a great promise for various futuristic applications like military applications, nuclear power plant, Environment monitoring, health care, target tracking and recognition of physical phenomenon .It has a set of constraints like low computation capability, limited memory, reduced battery life, and lack of infrastructure. Due to extensive use of wireless sensor network in real world data confidentiality must be maintained, so security plays a vital role. The use of this particular network is crucial in many contexts regardless of geographical position and so on. This work brief out the security requirements and outline the current research issues.