Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Security attacks and challenges in wireless sensor networks. In: Encyclopedia On Ad Hoc And Ubiquitous Computing: Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks. World Scientific Publishing, USA, pp. 397-426. ISBN 9789812833488
PDF (Security attacks and challenges in wireless sensor networks)
- Published Version
Restricted to Registered users only Download (276kB) | Request a copy |
Abstract
With the advancements of networking technologies and miniaturization of electronic devices, wireless sensor networks (WSN) have become an emerging area of research in academic, industrial, and defense sectors. Sensors combined with low power processors and wireless radios, will see widespread adoption in the new future for a variety of applications including battlefield, hazardous area, and structural health monitoring. However, many issues need to be solved before the full-scale implementations are practical. Among the research issues in WSN, security is one of the most challenging. Securing WSN is challenging because of the limited resources of the sensors participating in the network. Moreover, the reliance on wireless communication technology opens the door for various types of security threats and attacks. Considering the special features of this type of network, in this chapter we address the critical security issues in wireless sensor networks. We discuss cryptography, steganography, and other basics of network security and their applicability to WSN. We explore various types of threats and attacks against wireless sensor networks, possible countermeasures, and notable WSN security research. We also introduce the holistic view of security and future trends for research in wireless sensor network security. Briefly, in this chapter we will present the following topics: - Basics of security in wireless sensor networks - Feasibility of applying various security approaches in WSN - Threats and attacks against wireless sensor networks - Key management issues - Secure routing in WSN - Holistic view of security in WSN - Future research issues and challenges
Item Type: | Book Chapter |
---|---|
Additional Information: | 6841/574 |
Uncontrolled Keywords: | attacks, constraints, energy, key, security, sensor, threat |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Information and Communication Technology Kulliyyah of Information and Communication Technology Kulliyyah of Information and Communication Technology > Department of Computer Science Kulliyyah of Information and Communication Technology > Department of Computer Science |
Depositing User: | Dr. Al-Sakib Khan Pathan |
Date Deposited: | 14 Jul 2011 16:22 |
Last Modified: | 08 Nov 2012 11:50 |
URI: | http://irep.iium.edu.my/id/eprint/574 |
Actions (login required)
View Item |