Security and Challenges for Wireless Sensor Network

Authors

  • T. Sri Nandini  M. Tech Scholar, Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, Telangana, India

DOI:

https://doi.org//10.32628/CSEIT1953129

Keywords:

Wireless Sensor Network, SDN, Security challenges, Attacks, Security issues.

Abstract

Wireless Sensor Network security challenges and defences techniques are presented for protection of authenticity integrity, confidentiality and availability of transmission against malicious wireless attacks. Wide range of Wireless attacks and security threats at different layers. Due to the sensitive nature of the data gathered by many wireless sensor network (WSNs)it is becoming more difficult to protect the data. This paper analyzes security requirements in wireless sensor network and it facing more attacks and threats, we also discuss the open challenges in the Software Defined Network.

References

  1. M. Abu-Mahfouz and G. P. Hancke, "Confined Information Fusion. Systems for Location Discovery in Wireless Sensor Networks," Int.J. Sens. Frameworks, 2017.
  2. A.M. Abu-Mahfouz, G. Hancke, S. Isaac, "Arranging structure in remote sensor frameworks using NS-2," Softw. Eng., vol. 2, no. 4, pp. 91– 100, 2012.
  3. A. De Gante, M. Aslan, and A. Matrawy, "Splendid remote sensororganize the administrators reliant on programming portrayed arranging," (QBSC), 2014 27th Bienn. 2014.
  4. A. M. Abu-Mahfouz and G. P. Hancke, "ALWadHA Localisation Calculation: Yet More Energy Efficient," IEEE Access, vol. 5, no. 5, pp. 6661– 6667, 2017.
  5. S. Sharma, R. K. Bansal, and S. Bansal, "Issues and Challenges inWireless Sensor Networks," in International Conference on Machine Insight and Research Advancement, 2013, no. July, pp. 58– 6.
  6. A. M. Abu-Mahfouz, T. Olwal, A. Kurien, J. L. Munda, and K. Djouani, "Toward structure up an appropriated self-decision imperativeness the board system (DAEMS)," in IEEE AFRICON 2015, 2015, pp. 1– 6.
  7. A. M. Abu-Mahfouz, Y. Hamam, P. R. Page, and K. Djouani, "Realtime dynamic weight driven model for consumable water disaster decline," Procedia Eng., vol. 154, no. 7, pp. 99– 106, 2016.
  8. M. J. Mudumbe and A. M. Abu-Mahfouz, "Splendid water meter frameworkfor customer driven usage estimation," in Proc. of the IEEE Worldwide Conference on Industrial Informatics, 2015, pp. 993– 998.
  9. S. Sezer, S. Scott-Hayward, and P. Chouhan, "Would we say we are set up for SDN? Execution challenges for programming described frameworks," IEEE, 2013.
  10. T. Grandison and M. Sloman, "A survey of trust in web applications," Commun. Surv. Instructional activities, 2000.
  11. M. Ndiaye, G. P. Hancke, and A. M. Abu-Mahfouz, "Programming Defined Systems organization for Improved Wireless Sensor Network Management?: A Review," Sensors, vol. 17, no. 5: 1031, pp. 1– 32, 2017.
  12. K. Bakshi, "Thoughts for programming described arranging (SDN) Methodologies and use cases," IEEE Aerospace Conference, 2013, pp. 1– 9.
  13. Chiu, Hon Sun, and King-Shan Lui. "DelPHI: wormhole area framework for extraordinarily named remote frameworks." Wireless inevitable enrolling, 2006 first overall symposium on. IEEE, 2006.
  14. C. Siva Ram Murthy and B.S. Manoj "Building remote M2M and IoT sensor frameworks: issues and troubles".
  15. Wireless Sensor Networks and Applications (Book) changed by Ibrahiem M. M. El Emary, S.Ramakrishhnan.
  16. N. Ntuli and A. M. Abu-Mahfouz, "A Simple Security Architecture for Savvy Water Management System," Procedia Comput. Sci., vol. 83, no. 4, pp. 1164– 1169, 2016.
  17. V. Nagarajan and D. Huang, "Using power ricocheting to counter MAC spoof strikes in WLAN," in Proc. IEEE Consumer Commun. Netw. Conf., Las Vegas, NV, USA, Jan. 2010, pp. 1– 5.
  18. A. M. Abu-Mahfouz and G. P. Hancke, "Evaluating ALWadHA for giving secure localisation to remote sensor frameworks," in IEEE AFRICON Conference, 2013, pp. 501– 505.
  19. J. Stankovic, "Investigation challenges for remote sensor frameworks," ACM SIGBED Rev., 2004.
  20. Y. Zhou, Y. Tooth, and Y. Zhang, "Checking remote sensor orchestrates: an audit," IEEE Commun. Surv. Instructional activities, vol. 10.3, no. APA, 2008.
  21. X. Chen, K. Makki, K. Yen, N. Pissinou, "Sensor compose security: a survey," IEEE Commun. Surv. Instructional activities, vol. 11, no. 2, pp. 52– 73, 2009. 22M. Saraogi, "Security in Wireless Sensor Networks," ACM Sensys, pp. 513– 552, 2004.
  22. D. De, O. Gonçalves, and D. G. Costa, "A Survey of Image Security in Wireless Sensor Networks," J. Imaging, vol. 1, pp. 4– 30, 2015.
  23. O. Cheikhrouhou, "Secure Group Communication in Wireless Sensor Systems: An audit," J. Netw. Comput. Appl., vol. 61, pp. 115– 132, 2016.
  24. M. Jacobsson and C. Orfanidis, "Using Software-described Networking Standards for Wireless Sensor Networks," in eleventh Swedish National PC Networking Workshop, 2015, no. Sncnw.
  25. T. Luo, H. Tan, and T. Q. S. Quek, "Sensor OpenFlow?: Enabling Programming Defined Wireless Sensor Networks," pp. 2– 5, 2012.
  26. C. Chaudet and Y. Haddad, "Remote programming described frameworks: Difficulties and openings”, Commun. Recieving wires 2013.
  27. H. Farhady, H. Lee, and A. Nakao, "Programming described sorting out: An audit," Comput. Frameworks, 2015.
  28. M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, "Programming described sorting out: State of the craftsmanship and research troubles," Comput. Frameworks, 2014.
  29. J. Chen, X. Zheng, and C. Rong, "Survey on programming described arranging," Int. Conf. Cloud Comput., 2015.

Downloads

Published

2019-07-30

Issue

Section

Research Articles

How to Cite

[1]
T. Sri Nandini, " Security and Challenges for Wireless Sensor Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 4, pp.42-49, July-August-2019. Available at doi : https://doi.org/10.32628/CSEIT1953129