Wireless Sensor Networks: Security Issues, Challenges and Solutions
Wireless Sensor Networks: Security Issues, Challenges and Solutions
ABSTRACT
INTRODUCTION
O
NE of fundamental goals for Wireless Sensor Networks (WSNs) is to collect
information from the physical world. Comparing to existing infrastructure – based
networks, wireless sensor networks can virtually work in any environment, especially
those where wired connections are not possible. WSNs are often deployed to sense,
process and disseminate information of targeted physical environments.
860 Vikash Kumar et al
In general, WSNs consist of battery-operated sensor devices with computing, data
processing, and communicating components. The ways the sensors are deployed can
either be in a controlled environment where monitoring and surveillance are critical or in
an uncontrolled environment. In the uncontrolled environments, security for sensor
networks becomes extremely important. This paper is outlined as follows. Section I
provides the introduction to WSN and also covers the basic components and architecture
of WSN. Section II describes various security threats of WSN. Section III describes the
security challenges in implementing WSN. Section IV provides goals of security in WSN.
Section V describes some security mechanism against these security threats. Section VI
provides the conclusion of highlighted issues.
The base stations are one or more distinguished components of the WSN with much
more computational, energy and communication resources. They act as a gateway
between sensor nodes and the end user as they typically forward data from the WSN on to
a server. Other special components in routing based networks are routers, designed to
compute, calculate and distribute the routing tables. Many techniques are used to connect
to the outside world including mobile phone networks, satellite phones, radio modems,
high power Wi-Fi links etc. Figure 1-1 shows the architecture of WSN.
Wireless Sensor Networks: Security Issues, Challenges and Solutions 861
2 Security Threats And Issues In WSN
Wireless Sensor Networks are vulnerable to security attacks due to the broadcast nature of
the transmission medium. Basically attacks are broadly classified in two categories i.e.
active attacks and passive attacks. This paper points out both of these attacks in details.
Figure 2-2 (a and b) shows a situation where a wormhole attack takes place. When a
node B (for example, the base station or any other sensor) broadcasts the routing request
packet, the attacker receives this packet and replays it in its neighborhood. Each
neighboring node receiving this replayed packet will consider itself to be in the range of
Node B, and will mark this node as its parent. Hence, even if the victim nodes are multi-
hop apart from B, attacker in this case convinces them that B is only a single hop away
from them, thus creates a wormhole.
whether the network is available for the messages to communicate. However, failure of
the base station or cluster leader’s availability will eventually threaten the entire sensor
network. Thus availability is of primary importance for maintaining an operational
network.
5.1.3 Privacy:
Like other traditional networks, the sensor networks have also force privacy concerns.
Initially the sensor networks are deployed for legitimate purpose might subsequently be
used in unanticipated ways. Providing awareness of the presence of sensor nodes and data
acquisition is particularly important.
References
[1] Römer and Mattern, The Design Space of Wireless Sensor Networks. IEEE Wireless
Communications, 2004.
[2] B. Krishnamashari, D. Estrin and S. Wicker, "Impact of Data Aggregation in Wireless
Sensor Networks", Proc. 22nd International Conference Distrib. Comp. Systems,
Jul. 2002.
868 Vikash Kumar et al
[3] X. Du, and H-H. Chen, "Security in Wireless Sensor Networks", IEEE Wireless
Communications, vol. 15, no. 4, Aug. 2008, pp.60-66.
[4] H. Luo, Y. Lin and S. K. Das, "Routing Correlated Data in Wireless Sensor Networks:
A Survey", IEEE Network, vol. 21, no.6, Nov/Dec. 2007, pp. 40-47. [5] R. Ramen, J.
Lopez, S. Gritzalis, "Situation awareness mechanisms for wireless sensor networks ",
IEEE Communication Magazine, vol. 46, no. 4, pp. 102-107, Apr. 2008.
[6] S. Rajasegarar, C. Leckie, and M. Palansiwami, "Anomaly detection in wireless
sensor networks", IEEE Wireless Communications, vol. 15, no. 4, Aug. 2008, pp.
34-40.
[7] Yun Zhou, Yuguang Fang, Yanchao Zhang, Securing Wireless Sensor Networks: A
Survey, IEEE Communications Surveys & Tutorials, year 2008 [8] Y. Wang, G. Attebury,
and B. Ramamurthy, “A Survey of Security Issues in
Wireless Sensor Networks, ” IEEE Commun. Surveys Tutorials, vol. 8, pp. 2– 23,
year 2006.