Article Details : |
| | Article Name : | | A Paper Critique on Network Security and Attack
Defense Mechanism for Wireless Sensor Networks | Author Name : | | ALLYSA ASHLEY M. PALAMING | Publisher : | | Bridge Center | Article URL : | | | Abstract : | | In this report the authors discussed the severe constraints and
demanding deployment environments of wireless sensor networks make
security for these systems more challenging than for conventional
networks. However, several properties of sensor networks may help
address the challenge of building secure networks. The unique aspects
of sensor networks may allow novel defenses not available in
conventional networks. Further, the authors investigate the security
related issues and challenges in wireless sensor networks. It identifies
the security threats, and review proposed security mechanisms for
wireless sensor networks.
It was explained the concept of LEAP supports the
establishment of four types of keys for each sensor node – an individual
key shared with the base station, a pairwise key shared with another
sensor node, a cluster key shared with multiple neighboring nodes, and
a group key that is shared by all the nodes in the network. Mote-class
versus laptop-class attacks - in moteclass (sensor-class) attacks, an
adversary attacks a WSN by using a few nodes with similar
capabilities as that of network nodes. There can be many potential
threats to WSNs; the categories of the threats could be (a) passive
information gathering, (b) subversion of node or insertion of a false
node, (c) node malfunction, (d) node outage, (e) message corruption, (f)
denial of service, or (g) traffic analysis. In this type of attack an
attacker with a high radio transmission range (termed as a laptop-class attacker) and processing power sends HELLO packets to a
number of sensor nodes which are dispersed in a large area within a
WSN. Wireless sensor network (WSN) is a heterogeneous system
combining thousands to millions of tiny, inexpensive sensor nodes with
several distinguishing characteristics.
Security is becoming a major concern for energy constrained
wireless sensor network because of the broad security-critical
applications of WSNs. Thus, security in WSNs has attracted a lot of
attention in the recent years. The salient features of WSNs make it very
challenging to design strong security protocols while still maintaining
low overheads. In this paper, we have introduced some security issues,
threats, and attacks in WSNs and some of the solutions. Network
security for WSNs is still a very fruitful research direction to be further
explored. | Keywords : | | network security, attack, network management, wireless
sensor, network |
|
|
|
|
|
|
Announcements
|
- Volume 9, issue 5, August issue - publishing in progress
- Volume 9, Issue 2/ May 2021 publishing IN PROGRESS
- Call for Papers: open. Articles will be uploaded constantly, once the evaluation process is complete.
- The Certificates of Publication can be downloaded from RECEIVED ARTICLES section.
- COVER - VOLUME 2, ISSUE 12 / MARCH 2015
- COVER - VOLUME 3, ISSUE 2 / MAY 2015
- COVER - VOLUME 3, ISSUE 3 / JUNE 2015
- COVER - VOLUME 3, ISSUE 4 / JULY 2015
- COVER - VOLUME 3, ISSUE 8/ NOVEMBER 2015
- COVER - VOLUME 4, ISSUE 4 / JULY 2016
- COVER - VOLUME 4, ISSUE 5 / AUGUST 2016
- COVER - VOLUME 7, ISSUE 11/ FEBRUARY 2020
- Volume 9, issue 3, June 2021 publishing in progress
|
|
New Launched Project |
|
|
Recommend & Share
|
|