Skip to main content
Erschienen in:
Buchtitelbild

2020 | OriginalPaper | Buchkapitel

An Analysis and Comparison of Security Protocols on Wireless Sensor Networks (WSN)

verfasst von : Ranjit Kumar, Sachin Tripathi, Rajeev Agrawal

Erschienen in: Design Frameworks for Wireless Networks

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With increasing several applications of WSN, the provision of securing sensitive information of the entire network should be made for which sensor networks and ad hoc networks are introduced for the routing protocol. Many protocols as an opponent can disrupt the network or exploit precious data from the network which is not with the purpose of security. Large number of nodes, limited battery power, and their data-centric nature in routing WSN make routing a challenging problem in WSN. Therefore, security solutions should be properly formed because they have had a strong collision on large presentation. In this work, we mainly concentrate on security issues, security requirements, and we have also analyzed and discussed some key management protocols for secure transmission of data and comparing them on the basis of performance. This work has provided a detailed description of the WSN-related information to extremely understand the concept of the network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz, F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(80), 102–114.CrossRef Akyildiz, F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(80), 102–114.CrossRef
2.
Zurück zum Zitat Binh, H. T. T., & Dey, N. (Eds.). (2018). Soft computing in wireless sensor networks. Boca Raton: CRC Press. Binh, H. T. T., & Dey, N. (Eds.). (2018). Soft computing in wireless sensor networks. Boca Raton: CRC Press.
4.
Zurück zum Zitat Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23.CrossRef Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23.CrossRef
9.
Zurück zum Zitat Pradhan, C., Das, H., Naik, B., & Dey, N. (Eds.). (2018). Handbook of research on information security in biomedical signal processing. Hershey: IGI Global. Pradhan, C., Das, H., Naik, B., & Dey, N. (Eds.). (2018). Handbook of research on information security in biomedical signal processing. Hershey: IGI Global.
10.
Zurück zum Zitat Bletsas, A., & Lippman, A. (2005). Spontaneous synchronization in multi-hop embedded sensor networks: Demonstration of a server-free approach. In IEEE (pp. 331–341). Bletsas, A., & Lippman, A. (2005). Spontaneous synchronization in multi-hop embedded sensor networks: Demonstration of a server-free approach. In IEEE (pp. 331–341).
11.
Zurück zum Zitat Priyadarshini, V. M., Muthukumar, N., & Natarajan, M. (2011). Cellular architecture sensor for WSNs. IJRRSE, 01(02), 47–51. Priyadarshini, V. M., Muthukumar, N., & Natarajan, M. (2011). Cellular architecture sensor for WSNs. IJRRSE, 01(02), 47–51.
12.
Zurück zum Zitat Biagioni, E., & Chen, S. H. (2004). A reliability layer for ad-hoc wireless sensor network routing. In Proceedings of the 37th Hawaii International Conference on System Sciences (pp. 1–8). IEEE. Biagioni, E., & Chen, S. H. (2004). A reliability layer for ad-hoc wireless sensor network routing. In Proceedings of the 37th Hawaii International Conference on System Sciences (pp. 1–8). IEEE.
13.
Zurück zum Zitat Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2001). Wireless sensor networks: A survey (pp. 393–422). Electrical and Computer Engineering, Georgia Institute of Technology. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2001). Wireless sensor networks: A survey (pp. 393–422). Electrical and Computer Engineering, Georgia Institute of Technology.
14.
Zurück zum Zitat Wong, K. H., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing (pp. 244–251). IEEE Computer Society. Wong, K. H., Zheng, Y., Cao, J., & Wang, S. (2006). A dynamic user authentication scheme for wireless sensor networks. In Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, Trustworthy Computing (pp. 244–251). IEEE Computer Society.
15.
Zurück zum Zitat Collins, M., Dobson, S., & Nixon, P. (2010). A lightweight secure architecture for wireless sensor networks. Internet Technology and Secured Transactions, 2(1/2), 12–136. Collins, M., Dobson, S., & Nixon, P. (2010). A lightweight secure architecture for wireless sensor networks. Internet Technology and Secured Transactions, 2(1/2), 12–136.
16.
Zurück zum Zitat Aftab, M. U., Ashraf, O., Irfa, M., Majid, M., Nisar, A., & Habib, M. A. (2015). A review study of wireless sensor networks and its security. Communications and Network, 172–179. Aftab, M. U., Ashraf, O., Irfa, M., Majid, M., Nisar, A., & Habib, M. A. (2015). A review study of wireless sensor networks and its security. Communications and Network, 172–179.
17.
Zurück zum Zitat Men, X., Shi, X., Wang, Z., Wu, S., & Li, C. (2016). A grid-based reliable routing protocol for wireless sensor networks with randomly distributed clusters (pp. 41–61). International School of Software, Wuhan University. Men, X., Shi, X., Wang, Z., Wu, S., & Li, C. (2016). A grid-based reliable routing protocol for wireless sensor networks with randomly distributed clusters (pp. 41–61). International School of Software, Wuhan University.
19.
Zurück zum Zitat Carman, D. W., Krus, P. S., & Matt. B. J. (2000). Constraints and approaches for distributed sensor network security (pp. 1–126). Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD, USA. Carman, D. W., Krus, P. S., & Matt. B. J. (2000). Constraints and approaches for distributed sensor network security (pp. 1–126). Technical Report 00-010, NAI Labs, Network Associates Inc., Glenwood, MD, USA.
20.
Zurück zum Zitat Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., & Tygar, J. D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRef Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., & Tygar, J. D. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRef
21.
Zurück zum Zitat Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 113–127. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 113–127.
22.
Zurück zum Zitat Saxena, A., Pal, O., & Saquib, Z. (2011). Public key cryptography based approach for securing SCADA communications. Computer Networks & Information Technologies, 56–62. Saxena, A., Pal, O., & Saquib, Z. (2011). Public key cryptography based approach for securing SCADA communications. Computer Networks & Information Technologies, 56–62.
23.
Zurück zum Zitat Fatema, N., & Brad, R. (2013). Attacks and counterattacks on wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 4(6), 1–15.CrossRef Fatema, N., & Brad, R. (2013). Attacks and counterattacks on wireless sensor networks. International Journal of Ad Hoc and Ubiquitous Computing, 4(6), 1–15.CrossRef
24.
Zurück zum Zitat Culpepper, B. J., & Tseng, H. C. (2004). Sinkhole intrusion indicators in DSR MANETs. In Proceedings of the First International Conference on Broad band Networks (pp. 681–688). Culpepper, B. J., & Tseng, H. C. (2004). Sinkhole intrusion indicators in DSR MANETs. In Proceedings of the First International Conference on Broad band Networks (pp. 681–688).
25.
Zurück zum Zitat Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003) Packet leashes: A defense against wormhole attacks in wireless networks. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, 30 March–3 April 2003, vol. 3, pp. 1976–1986. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003) Packet leashes: A defense against wormhole attacks in wireless networks. In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE INFOCOM 2003, 30 March–3 April 2003, vol. 3, pp. 1976–1986.
26.
Zurück zum Zitat Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1 & 2), 1–9. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security, 4(1 & 2), 1–9.
27.
Zurück zum Zitat Xiong, N. N., Cheng, H., Hussain, S., Qu, Y. (2013). Fault tolerant and ubiquotous computing in sensor networks. International Journal of Distributed Sensor Networks, 1–2. Article ID 524547. Xiong, N. N., Cheng, H., Hussain, S., Qu, Y. (2013). Fault tolerant and ubiquotous computing in sensor networks. International Journal of Distributed Sensor Networks, 1–2. Article ID 524547.
28.
Zurück zum Zitat Huang, A. (2005, October). Security primitives for ultra-low power sensor nodes in wireless sensor networks. Faculty of Engineering, the Built Environment and Information Technology, University of Pretoria. Huang, A. (2005, October). Security primitives for ultra-low power sensor nodes in wireless sensor networks. Faculty of Engineering, the Built Environment and Information Technology, University of Pretoria.
29.
Zurück zum Zitat Gaubatz, G., Kaps, J., & Sunar, B. Public key cryptography in sensor networks—Revisited (pp. 1–17). Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USA. Gaubatz, G., Kaps, J., & Sunar, B. Public key cryptography in sensor networks—Revisited (pp. 1–17). Department of Electrical & Computer Engineering Worcester Polytechnic Institute, 100 Institute Road, Worcester, MA 01609, USA.
30.
Zurück zum Zitat Szczechowiak, Piotr. (2010). Cryptographic key distribution in wireless sensor networks using bilinear pairings. PhD dissertation, Dublin City University. Szczechowiak, Piotr. (2010). Cryptographic key distribution in wireless sensor networks using bilinear pairings. PhD dissertation, Dublin City University.
31.
Zurück zum Zitat Hegland, M., Winjum, E., Mjolsnes, S. F., Rong, C., Kure, O., & Spilling, P. (2006). A survey of key management in ad hoc networks. IEEE Communications Surveys & Tutorials., 8(3), 48–66.CrossRef Hegland, M., Winjum, E., Mjolsnes, S. F., Rong, C., Kure, O., & Spilling, P. (2006). A survey of key management in ad hoc networks. IEEE Communications Surveys & Tutorials., 8(3), 48–66.CrossRef
32.
Zurück zum Zitat Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey (pp. 1–27). Camtepe, S. A., & Yener, B. (2005). Key distribution mechanisms for wireless sensor networks: A survey (pp. 1–27).
33.
Zurück zum Zitat Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Key predistribution in wireless sensor networks when sensors are within communication range. In S. Nikoletseas & J. D. P. Rolim (Eds.), Theoretical aspects of distributed computing in sensor networks (pp. 787–832). Berlin: Springer. Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Key predistribution in wireless sensor networks when sensors are within communication range. In S. Nikoletseas & J. D. P. Rolim (Eds.), Theoretical aspects of distributed computing in sensor networks (pp. 787–832). Berlin: Springer.
34.
Zurück zum Zitat Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002, September). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002, September). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.
35.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4), 500–528.CrossRef Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4), 500–528.CrossRef
36.
Zurück zum Zitat Celozzi, C., Gandino, F., & Rebaudengo, M. (2013). Improving key negotiation in transitory master key schemes for wireless sensor networks. Politecnico di Torino, lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (vol. 122, pp. 1–16). Cham: Springer. Celozzi, C., Gandino, F., & Rebaudengo, M. (2013). Improving key negotiation in transitory master key schemes for wireless sensor networks. Politecnico di Torino, lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (vol. 122, pp. 1–16). Cham: Springer.
37.
Zurück zum Zitat Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (pp. 162–175). New York, NY, USA: ACM. Karlof, C., Sastry, N., & Wagner, D. (2004). TinySec: A link layer security architecture for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (pp. 162–175). New York, NY, USA: ACM.
38.
Zurück zum Zitat Brickell, E. F. (1993). The SKIPJACK algorithm, July, vol. 28, pp. 1–7. Brickell, E. F. (1993). The SKIPJACK algorithm, July, vol. 28, pp. 1–7.
39.
Zurück zum Zitat Munivel, E., & Ajit, G. M. (2010). Efficient public key infrastructure implementation in wireless sensor networks. In International Conference on Wireless Communication and Sensor Computing (pp. 1–6). Munivel, E., & Ajit, G. M. (2010). Efficient public key infrastructure implementation in wireless sensor networks. In International Conference on Wireless Communication and Sensor Computing (pp. 1–6).
40.
Zurück zum Zitat Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Symposium on Cryptography and Information Security (SCIS’00) (pp. 26–28). Japan. Sakai, R., Ohgishi, K., & Kasahara, M. (2000). Cryptosystems based on pairing. In Symposium on Cryptography and Information Security (SCIS’00) (pp. 26–28). Japan.
41.
Zurück zum Zitat Jing, Q., Hu, J., & Chen, Z. (2006). C4W: An energy efficient public key cryptosystem for large-scale wireless sensor networks. In 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS) (pp. 827–832). Jing, Q., Hu, J., & Chen, Z. (2006). C4W: An energy efficient public key cryptosystem for large-scale wireless sensor networks. In 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS) (pp. 827–832).
42.
Zurück zum Zitat Oliveira, L. B., Aranha, D. F., Gouvêa, C. P. L., Scott, M., Câmara, D. F., López, J., & Dahab, R. (2011). TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Computer Communications, 34(3), 485–493. Oliveira, L. B., Aranha, D. F., Gouvêa, C. P. L., Scott, M., Câmara, D. F., López, J., & Dahab, R. (2011). TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Computer Communications, 34(3), 485–493.
43.
Zurück zum Zitat Devi, C., Dhivya, & Santhi, B. (2013). Study on security protocols in wireless sensor networks. International Journal of Engineering and Technology, 5(5), 200–207. Devi, C., Dhivya, & Santhi, B. (2013). Study on security protocols in wireless sensor networks. International Journal of Engineering and Technology, 5(5), 200–207.
Metadaten
Titel
An Analysis and Comparison of Security Protocols on Wireless Sensor Networks (WSN)
verfasst von
Ranjit Kumar
Sachin Tripathi
Rajeev Agrawal
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-9574-1_1

Neuer Inhalt