Skip to main content
Top

2016 | OriginalPaper | Chapter

Procuring Wireless Sensor Actuator Network Security

Authors : Jasminder Kaur Sandhu, Sharad Saxena

Published in: Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless Sensor Actuator Networks (WSANs) are large-scale innovative networks. The dynamic, reconfigurable, and self-adjustment nature of these networks make them distinctive from rest of the networks using wireless medium for communication. This is because these networks are basically placed in hostile environments like—surveillance, forest fire detection, flood detection; it has many applications and defense is the most prominent one. Hence security forms the basis of this paper which includes attack detection and mitigation using various schemes. A vision on denial-of-service (DoS) attack and its preventive measures for WSAN are in particular. The preeminent objective of this paper is to identify various intruder attacks in WSANs and to propose a new optimal solution for the prevention of DoS attacks (flooding attack) in WSAN. There are various mechanisms to eliminate the malicious node that carry out an attack. These mechanisms are used to safe guard against intruder attacks. In this paper, we have simulated flooding attack in wireless sensor actuator networks, computed a mitigation system and tested the validity of our results.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Akylidiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 394–422. Elsevier Science (2002) Akylidiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 394–422. Elsevier Science (2002)
2.
go back to reference Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., Lee, I.: Sensor network security: more interesting than you think. In: HOTSEC’06: Proceedings of First USENIX Workshop on Hot Topics in Security, USENIX Association, Berkeley, CA, USA, pp. 25–30 (2006) Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., Lee, I.: Sensor network security: more interesting than you think. In: HOTSEC’06: Proceedings of First USENIX Workshop on Hot Topics in Security, USENIX Association, Berkeley, CA, USA, pp. 25–30 (2006)
3.
go back to reference Baig, Z.A.: Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Comput. Commun. 34(3) (2010) Baig, Z.A.: Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks. Comput. Commun. 34(3) (2010)
4.
go back to reference Bhende, M., Wagh, S.J., Utpat, A.: A quick survey of wireless sensor networks. In: IEEE 4th International Conference on Communication Systems abd Network Technologies, pp. 160–167 (2014) Bhende, M., Wagh, S.J., Utpat, A.: A quick survey of wireless sensor networks. In: IEEE 4th International Conference on Communication Systems abd Network Technologies, pp. 160–167 (2014)
5.
go back to reference Bojkovic, Z.S., Bakmaz, B.M., Bakwaz, M.R.: Security issues in wireless sensor network. Int. J. Commun. 2(1), 106–115 (2008) Bojkovic, Z.S., Bakmaz, B.M., Bakwaz, M.R.: Security issues in wireless sensor network. Int. J. Commun. 2(1), 106–115 (2008)
6.
go back to reference Bysani, L.K., Turuk, A.K.: A survey on selective forwarding attack in wireless sensor network. In: IEEE (2011) Bysani, L.K., Turuk, A.K.: A survey on selective forwarding attack in wireless sensor network. In: IEEE (2011)
7.
go back to reference Chan, H., Perrig, A.: Security and privacy in sensor networks. In: IEEE, pp. 103–105, October 2003 Chan, H., Perrig, A.: Security and privacy in sensor networks. In: IEEE, pp. 103–105, October 2003
8.
go back to reference Chong, C., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. In: Proceedings of the IEEE, vol. 91, no. 8, (2003) Chong, C., Kumar, S.P.: Sensor networks: evolution, opportunities, and challenges. In: Proceedings of the IEEE, vol. 91, no. 8, (2003)
9.
go back to reference Curiac, D.-I., Plastoi, M., Banias, O., Volosencu, C., Tudoroiu, R., Doboli, A.: Combined malicious node discovery and self-destruction technique for wireless sensor networks. In: International Conference on Sensor Technologies and Applications, pp. 436–441 (2009) Curiac, D.-I., Plastoi, M., Banias, O., Volosencu, C., Tudoroiu, R., Doboli, A.: Combined malicious node discovery and self-destruction technique for wireless sensor networks. In: International Conference on Sensor Technologies and Applications, pp. 436–441 (2009)
10.
go back to reference Du, X., Chen, H.-H.: Security in wireless sensor network. IEEE 15(4), 60–66 (2008)MathSciNet Du, X., Chen, H.-H.: Security in wireless sensor network. IEEE 15(4), 60–66 (2008)MathSciNet
12.
go back to reference Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: MobiCom 99, Seattle, USA (1999) Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: MobiCom 99, Seattle, USA (1999)
13.
go back to reference Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited. Springer, Berlin/Heidelberg (2005)CrossRef Gaubatz, G., Kaps, J., Sunar, B.: Public Key Cryptography in Sensor Networks—Revisited. Springer, Berlin/Heidelberg (2005)CrossRef
14.
go back to reference Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbor knowledge. IEEE International Symposium on Network Computing and Applications, pp. 325–331 (2008) Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hop neighbor knowledge. IEEE International Symposium on Network Computing and Applications, pp. 325–331 (2008)
15.
go back to reference Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for WSN. IEEE/ACM, vol. 11 (2003) Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for WSN. IEEE/ACM, vol. 11 (2003)
16.
go back to reference Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, USA (2009) Issariyakul, T., Hossain, E.: Introduction to Network Simulator NS2. Springer, USA (2009)
17.
go back to reference Jokhio, S.H., Jokhio, I.A., Kemp, A.H.: Node capture attack detection and defence in wireless sensor networks. IET 2(3), 161–169 (2011) Jokhio, S.H., Jokhio, I.A., Kemp, A.H.: Node capture attack detection and defence in wireless sensor networks. IET 2(3), 161–169 (2011)
18.
go back to reference Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley, New York (2005) Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. Wiley, New York (2005)
19.
go back to reference Latre, B., Braem, B., Moerman, I., Blondia, C., Demeester, P.: A survey on wireless body area networks. Wirel. Netw. 17(1), 1–18 (2011)CrossRef Latre, B., Braem, B., Moerman, I., Blondia, C., Demeester, P.: A survey on wireless body area networks. Wirel. Netw. 17(1), 1–18 (2011)CrossRef
20.
go back to reference Li, Y.-X., Qin, L., Liang, Q.: Research on wireless sensor network security. In: IEEE, International Conference on Computational Intelligence and Security, pp. 493–496 (2010) Li, Y.-X., Qin, L., Liang, Q.: Research on wireless sensor network security. In: IEEE, International Conference on Computational Intelligence and Security, pp. 493–496 (2010)
21.
go back to reference Liu, S., Tang, Y., Liu, Y.: A survey of transport protocols for wireless sensor networks. In: IEEE, pp. 2338–2341 (2012) Liu, S., Tang, Y., Liu, Y.: A survey of transport protocols for wireless sensor networks. In: IEEE, pp. 2338–2341 (2012)
22.
go back to reference Olariu, S.: Information assurance in wireless sensor networks. Sensor Network Research Group, Old Dominion University, New York, NY, USA, pp. 259–268. ACM (2004) Olariu, S.: Information assurance in wireless sensor networks. Sensor Network Research Group, Old Dominion University, New York, NY, USA, pp. 259–268. ACM (2004)
23.
go back to reference Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4(1), 1–9 (2009) Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. (IJCSIS) 4(1), 1–9  (2009)
24.
go back to reference Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: ICACT (2006) Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: ICACT (2006)
25.
go back to reference Qian, Y., Lu, K., Tipper, D.: Towards survivable and secure wireless sensor networks. In: IEEE, pp. 442–448 (2007) Qian, Y., Lu, K., Tipper, D.: Towards survivable and secure wireless sensor networks. In: IEEE, pp. 442–448 (2007)
26.
go back to reference Sharma, G., Bala, S., Verma, A.K.: Security frameworks for wireless sensor networks—review. In: 2nd International Conference on Communication, Computing & Security (ICCCS-2012) Sharma, G., Bala, S., Verma, A.K.: Security frameworks for wireless sensor networks—review. In: 2nd International Conference on Communication, Computing & Security (ICCCS-2012)
27.
go back to reference Singal, T.L.: Wireless Communications. New. Delhi, Tata Mc Graw Hill (2010) Singal, T.L.: Wireless Communications. New. Delhi, Tata Mc Graw Hill (2010)
28.
go back to reference Sohrabi, K.: Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 7(5), 16–27 (2000)CrossRef Sohrabi, K.: Protocols for self-organization of a wireless sensor network. IEEE Pers. Commun. 7(5), 16–27 (2000)CrossRef
29.
go back to reference Verma, A.K., Singh, A.: Simulation and analysis of AODV, DSDV, ZRP in VANET. IJFCST 3(5), (2013) Verma, A.K., Singh, A.: Simulation and analysis of AODV, DSDV, ZRP in VANET. IJFCST 3(5), (2013)
30.
go back to reference Verma, A.K.: Comparison of flooding and directed diffusion for wireless sensor network. In: IEEE, pp. 1–4 (2009) Verma, A.K.: Comparison of flooding and directed diffusion for wireless sensor network. In: IEEE, pp. 1–4  (2009)
31.
go back to reference Verma, A.K.: Promising key management schemes in wireless sensor networks: a review. In: IEEE, pp. 1061–1066 (2009) Verma, A.K.: Promising key management schemes in wireless sensor networks: a review. In: IEEE, pp. 1061–1066  (2009)
32.
go back to reference Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tuts. 8(2), 2–22 (2006)CrossRef Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tuts. 8(2), 2–22 (2006)CrossRef
33.
go back to reference Wood, A.D., Stankovic, J.A.: Denial of sevice in sensor network. IEEE 35(10), 54–62 (2002) Wood, A.D., Stankovic, J.A.: Denial of sevice in sensor network. IEEE 35(10), 54–62 (2002)
34.
go back to reference Yen, W., Chen, C., Yang, C.: Single Gossip ing with Directional Flooding Routing Protocol in WSNs. In: IEEE (2008) Yen, W., Chen, C., Yang, C.: Single Gossip ing with Directional Flooding Routing Protocol in WSNs. In: IEEE (2008)
35.
go back to reference Zhang, Y., Li, X., Liu, Y.: The detection and defence of DoS attack for wireless sensor network. J. China Univ. Posts Telecommun. 19, 52–56 (2012) Zhang, Y., Li, X., Liu, Y.: The detection and defence of DoS attack for wireless sensor network. J. China Univ. Posts Telecommun. 19, 52–56 (2012)
36.
go back to reference Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Comm. Surv. Tuts. 10(3), 6–28 (2008)CrossRef Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Comm. Surv. Tuts. 10(3), 6–28 (2008)CrossRef
Metadata
Title
Procuring Wireless Sensor Actuator Network Security
Authors
Jasminder Kaur Sandhu
Sharad Saxena
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2638-3_102