IIUM Repository (IREP)

Security attacks and challenges in wireless sensor networks

Pathan, Al-Sakib Khan and Hong, Choong Seon (2009) Security attacks and challenges in wireless sensor networks. In: Encyclopedia On Ad Hoc And Ubiquitous Computing: Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks. World Scientific Publishing, USA, pp. 397-426. ISBN 9789812833488

[img] PDF (Security attacks and challenges in wireless sensor networks) - Published Version
Restricted to Registered users only

Download (276kB) | Request a copy

Abstract

With the advancements of networking technologies and miniaturization of electronic devices, wireless sensor networks (WSN) have become an emerging area of research in academic, industrial, and defense sectors. Sensors combined with low power processors and wireless radios, will see widespread adoption in the new future for a variety of applications including battlefield, hazardous area, and structural health monitoring. However, many issues need to be solved before the full-scale implementations are practical. Among the research issues in WSN, security is one of the most challenging. Securing WSN is challenging because of the limited resources of the sensors participating in the network. Moreover, the reliance on wireless communication technology opens the door for various types of security threats and attacks. Considering the special features of this type of network, in this chapter we address the critical security issues in wireless sensor networks. We discuss cryptography, steganography, and other basics of network security and their applicability to WSN. We explore various types of threats and attacks against wireless sensor networks, possible countermeasures, and notable WSN security research. We also introduce the holistic view of security and future trends for research in wireless sensor network security. Briefly, in this chapter we will present the following topics: - Basics of security in wireless sensor networks - Feasibility of applying various security approaches in WSN - Threats and attacks against wireless sensor networks - Key management issues - Secure routing in WSN - Holistic view of security in WSN - Future research issues and challenges

Item Type: Book Chapter
Additional Information: 6841/574
Uncontrolled Keywords: attacks, constraints, energy, key, security, sensor, threat
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering
Kulliyyahs/Centres/Divisions/Institutes: Kulliyyah of Information and Communication Technology
Kulliyyah of Information and Communication Technology

Kulliyyah of Information and Communication Technology > Department of Computer Science
Kulliyyah of Information and Communication Technology > Department of Computer Science
Depositing User: Dr. Al-Sakib Khan Pathan
Date Deposited: 14 Jul 2011 16:22
Last Modified: 08 Nov 2012 11:50
URI: http://irep.iium.edu.my/id/eprint/574

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year