Professional Documents
Culture Documents
A Survey of Security in Wireless Sensor Networks: Aditi Rani, Sanjeet Kumar
A Survey of Security in Wireless Sensor Networks: Aditi Rani, Sanjeet Kumar
Abstract— Wireless sensor networks are spatially distributed routing protocols needs to be devised that compensates its
sensor nodes that keeps the track of the physical or deficiencies and also maximize the network lifetime.
environmental conditions like sound, stress waves, temperature
of surrounding etc, and also send the sensed data back to the sink
or base station.WSN are used in many applications like military
areas, disaster management in remote areas, in building smart
cities etc. Therefore security is an important aspect in WSN.
These networks can be prone to various disastrous attacks or
hackers that has the motive to disrupt the entire network. In this
article, various aspects of security in Wireless Sensor Networks
has been observed like secure routing protocols, security at the
node level in the network, cryptography etc.
I. INTRODUCTION
Various attacks are discussed below:- WSNs due to its wide range of applications are often deployed in
hostile environmentthus are susceptible to node capture,sensor nodes
Selective Forwarding(SF)-As we know in multi-hop can be trained or reprogramed by the attacker secretly turning them
technique all the nodes in the network will forward received into clones.Various solutions have been given to this problem like
Line-SelectedMulticast(LSM) [11] that uses the routing topology of
messages to the sink or sensor nodes .An attacker may create the network to detect the clones. In fig 4,in LSM any node p
corrupt nodes in the network that drops some important announces its location and any neighboring node e forwards the
messages intentionally while forwarding only few of them. signature of the claimed node or node id to destination node h via
Defense mechanism against this attack is to use multiple paths several intermediate nodes.The replicated node is caught by the
to route data in the network [2]. intersection of two paths generated by two different nodes with same
node ids. Node p’ is the clone of node p, detected at the intersection
Sinkhole-In this scenario, an attacker makes the defected node of the two paths.Here x is the node at the intersection point of two
look very attractive as compared to other nodes in the paths.
network. As a consequence, the surrounding nodes chooses
the defected node to send the data.
2
3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)
Dynamic Cryptographic Algorithm [14] has been also TABLE I. PUBLIC KEY CRYPTOGRAPHY
proposed to provide nodal level security in the Wireless
Sensor Network (WSNs).In this algorithm all the nodes are KEY SIZE SPECIFICATIONS
shared with an initial key.It consists of two main steps:-
RSA-1024 1024 bit keys Offer equal security for
• Each sensor node will encrypt the sensed data with smaller key size, smaller
the initial key.All the nodes also consist of another overhead
key called as secondary key ECC-160 160 bit keys
• This secondary key is used to encrypt the data and
initial key with simple XOR operation,as this
operation consumes less energy.The secondary key is
RSA-2048 2048 bit keys New minimum key size
made dynamic by changing its value periodically. So ,both are equivalent
by the time attacker comes close to guessing the
value of initial key,secondary key changes.To ensure ECC-224 224 bit keys
that the data and the initial key are safe, a safe time
gap is maintained.
Other light weight protocols like HEIGHT [15] and 2. Providing security at network level
PRESENT [16] can also be used as encryption techniques in
this.Security in WSNs is essential but some of the trust system WSNs are prone to various attacks,one such attack is the Black
consumes more energy and has high overhead.A Light weight hole [18] attack which affects data collection.Active Trust [19]
and Dependable Trust System (LDTS) [17] provides security protocol is proposed to tackle such type of attacks.This model
that compensates the above deficiencies,it employs clustering creates numerous routes for detection,thus provides trust in the
algorithm.It is based on node identities in clustered entire network and so it improves data route security. A
WSNs.Canceling feedback between cluster members or detection route refers to a route without data packets whose
between cluster heads improves system efficiency thus goal is to convince the adversary to launch an attack so the
providing more efficient network with lesser malicious nodes. system can identify the attack behavior and then mark the
Simulation results show that LDTS demands less memory and black hole location.For the implementation of this algorithm
overhead compared to other schemes. two types of model i.e. the system model as well as the
adversaries model have to be created.This model simply uses
A. Cryptography residue energy to createdetection routes,it improves network
security performance and also increases the lifetime of the
It is very important to select the most efficient cryptographic wireless sensor networks.
method in terms of memory, speed,power consumption etc. Ju Ren et al. proposed channel aware-reputation system with
Various cryptographic techniques have been proposed to adaptive detection threshold (CRS-A) [20] to detect selective
provide nodal level security.There can be symmetric and forwarding attack in WSNs.This is responsible for evaluation
asymmetric cryptography techniques based on the key of the data forwarding behavior of sensor nodes,according to
used.However symmetric cryptography is preferred over the deviation of the monitored packet loss and the estimated
asymmetric because of constraints on power consumption and normal loss.In this the optimal threshold is theoretically
computation in sensor nodes[2].Symmetric key cryptography derived,this is done to optimize the detection accuracy of
uses same key for both encryption and decryption at both the CRS-A.For improving the data delivery ratio of the
transmitting and receiving end.Some of the popular forms are network,an attack tolerant data forwarding method is
RC4[3],RC5[4],SHA-1[5],MD5[6] etc. developed that cooperates with the CRS-A model.Various
Asymmetric cryptographic techniques like Diffie- simulations reveal that it detects selective forwarding attack
Hellman[7],or RSA[8] can be used in WSNs,however due to very accurately and also detect the compromised nodes
its computational complexity and overhead it is undesirable to present in the network.
be used in WSNs. Brown et al. found that public key
cryptography requireson the order of tens of seconds or up to
minutes to perform encryption and decryption operations in
constrained wireless devices which exposes risk of DOS
attacks [9].On contrast private key cryptography consume much
lesser time. Table I summarizes some important asymmetric or public
key cryptography techniques with their key sizesand specifications
that can be used in WSNs.Elective Curve Cryptography (ECC-
160)[25] provides almost the same security even with smaller key
size,same is for RSA-1024[8].
Fig.5. Architecture of CRS-A[20]
3
3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)
4
3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)
[7] W. Diffie and M. E. Hellman, “New Directions in Cryptography,”IEEE [25] Elliptic Curve Cryptography, SECG Std. SEC1, 2000, available
Trans. Info. Theory, vol. 22, no. 6, Nov. 1976, pp.644–54. atwww.secg.org/collateral/sec1.pdf.
[8] R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining [26] M.Dong, “LSCD:A Low storage Clone Detection Protocol for Cyber
Digital Signatures and Public-Key Cryptosystems,”Commun. ACM, vol. 26, Physical Systems, IEEE Transactions on Computer aided Design of Integrated
no. 1, 1983, pp. 96–99. Circuits and Systems,vol.35, no.5,May 2016.