A Review on Security Challenges and Features in Wireless Sensor Networks: IoT Perspective

Authors

  • M. A. Burhanuddin Faculty of Information and Communications Technology, UTeM, Melaka, Malaysia.
  • Ali Abdul-Jabbar Mohammed Faculty of Information and Communications Technology, UTeM, Melaka, Malaysia.
  • Ronizam Ismail Kolej Universiti Islam Melaka, Kuala Sg Baru, Melaka, Malaysia
  • Mustafa Emad Hameed Faculty of Electronics and Computer Engineering, UTeM, Melaka, Malaysia.
  • Ali Noori Kareem Department of Computer Engineering Techniques, AlYarmouk University College, Diyala, Iraq.
  • Halizah Basiron Faculty of Information and Communications Technology, UTeM, Melaka, Malaysia.

Keywords:

Internet Of Things, Security Attacks And Threats, Security Challenges, Security Requirements, Wireless Sensor Networks,

Abstract

The Internet of Things is becoming a very promising paradigm with the extensive market adoption of the development of associated technologies, such as; cloud computing, near-field communications, wireless mobile networks, etc. This will expose the future direction of communication around the world. Wireless Sensor Networks together with the existing communication technologies are enabling the continuous integration of controlling and processing the functionality of the Internet of Things applications. Since Wireless Sensor Networks are typically deployed for gathering sensitive information from unattended or hostile environments, they are exposed for security attacks, which are strongly affecting the user privacy and the network performance. There are various security mechanisms and solutions for Wireless Sensor Networks that have been proposed in the previous works. Therefore, it is mandatory to give attention for its applicability and feasibility features in terms of related security challenges based on the Internet of Things perspectives. The purpose of this paper is to explore and show the influence of Wireless Sensor Networks security challenges within the perspective of the Internet of Things and its applications. Consequently, an exploration of the major and minor security requirements in the Wireless Sensor Networks has been made in this paper, accompanied by a classification of the available attacks and threats against these requirements. Finally, a discussion on the Internet of Things security issues and challenges in Wireless Sensor Networks is provided.

References

L. In and K. Lee, “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Business Horizons, ScienceDirect, vol. 58, no. 4, pp. 431-440, 2015.

G. Gordana, M. Veletić, N. Maletić, D. Vasiljević, I. Radusinović, S. Tomović and M. Radonjić, “The IoT Architectural Framework, Design Issues and Application Domains,” Wireless Personal Communications, Springer Science and Business Media, pp. 1-22, 2016.

K. Nacer, M. R. Abid, D. Benhaddou and M. Gerndt, “Wireless Sensors Networks for Internet of Things,” Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), EEE Ninth International Conference on, pp. 1-6, 2014.

I. Gudymenko, K. Borcea-Pfitzmann and K. Tietze, “Privacy implications of the Internet of Things,” In Constructing Ambient Intelligence, Springer Berlin Heidelberg., vol. 277, pp. 280-286, 2012.

A. Sahabul and D. Debashis, “Analysis of security threats in wireless sensor network,” International Journal of Wireless & Mobile Networks, arXiv preprint arXiv, vol. 6, no. 2, pp. 35-46, 2014.

M. Prabhudutta, P. Sangram, S. Nityananda and S. S. Satapathy, “SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY." 13 ().,” Journal of Theoretical & Applied Information Technology, vol. 13 , pp. 14-27, 2010.

C. Delphine, R. Andreas, M. Parag and S. Ralf, “Wireless sensor networks and the internet of things: selected challenges,” Proceedings of the 8th GI/ITG KuVS Fachgespräch Drahtlose Sensornetze, pp. 31- 34, 2009.

R. Rodrigo, Z. Jianying and L. Javier, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, ScienceDirect, Elsevier B.V., vol. 57, no. 10, pp. 1-14, 2013.

P. Tiwari, V. P. Saxena, R. G. Mishra and D. Bhavsar, “Wireless Sensor Networks: Introduction, Advantages, Applications and Research Challenges,” HCTL Open International Journal of Technology Innovations and Research (IJTIR), vol. 14, pp. 1-11, April 2015.

R. Singh, J. Singh and R. Singh, “SECURITY CHALLENGES IN WIRELESS SENSOR NETWORKS,” IRACST - International Journal of Computer Science and Information Technology & Security (IJCSITS), vol. 6, no. 3, 2016.

S. Jaydip, “A Survey on Wireless Sensor Network Security,” International Journal of Communication Networks and Information Security, vol. 1, no. 2, pp. 55-78, 2009.

W. Yong, A. Garhan and R. Byrav, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 1-22, 2006.

S. Elaine and P. Adrian, “Designing secure sensor networks,” IEEE Wireless Communications, vol. 11, no. 6, pp. 38-43, 2004.

D. Padmavathi and M. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks,” International Journal of Computer Science and Information Security, vol. 4, no. 2, pp. 1-9, 2009.

a. Bryan, A. Perrig and V. GligorP, “Distributed detection of node replication attacks in sensor networks,” IEEE Symposium on Security and Privacy (S&P'05), pp. 49-63, 2005.

H. a. A. P. Chan, “Security and privacy in sensor networks,” IEEE Computer Magazine, vol. 36, no. 10, pp. 103-105, 2003.

J. P. Walters, L. Zhengqiang, S. Weisong and C. Vipin, “Wireless sensor network security: A survey,” Security in distributed, grid, mobile, and pervasive computing, pp. 367-404, 2007.

A. Mukherjee, A. F. S. Ali, H. Jing and S. A. Lee, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 3, pp. 1550- 1573, 2014.

A. S. Sastry, S. Shazia and S. Vagdevi, “Security threats in wireless sensor networks in each layer,” International Journal of Advanced Networking and Applications, vol. 4, no. 4, p. 1657, 2013.

G. Han, S. S. C. Lei and H. Jiankun, “Security and privacy in Internet of things: methods, architectures, and solutions,” Security and Communication Networks, vol. 9, no. 15, pp. 2641-2642, 2016.

J. Thakur and K. Nagesh, “DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis,” International journal of emerging technology and advanced engineering, vol. 1, no. 2, pp. 6-12, 2011.

Downloads

Published

2018-02-12

How to Cite

Burhanuddin, M. A., Mohammed, A. A.-J., Ismail, R., Hameed, M. E., Kareem, A. N., & Basiron, H. (2018). A Review on Security Challenges and Features in Wireless Sensor Networks: IoT Perspective. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-7), 17–21. Retrieved from https://jtec.utem.edu.my/jtec/article/view/3589