Introduction Wireless sensor networks have become an increasingly viable and effective form of

2700 Words11 Pages
Introduction
Wireless sensor networks have become an increasingly viable and effective form of aggregating information in recent years. They are being used in a variety of different industries, most notably including healthcare, environmental monitoring, and industrial applications. This survey paper will focus on the application of wireless sensor networks in healthcare. Wireless sensor networks present unique challenges to security that cannot be completely solved by using WLAN security mechanisms and protocols. Due to the extreme sensitivity of the information exchange involved in patient healthcare and the increasing accessibility of advanced technology, taking steps to secure wireless sensor networks in healthcare is of growing
…show more content…
Unlike traditional WLANs, the physical security of nodes in a wireless sensor network cannot necessarily be assured. This is an important consideration to take into account when designing security for the sensor network. Another beneficial feature of the sensor network is the inexpensiveness of the individual nodes. Individual sensors are designed to be cheap, inexpensive, and easily replaceable. This presents a security challenge where it is needed to provide enough security on sensor network in an economical manner. Lastly, because sensors are inexpensive, small, and consume very little power, their computational ability is extreme limited which makes cryptography application difficult.
Limited security in wireless sensor networks has led to a number of attacks come to prominence. Ameen et al (2012) identify the most common transmission threats to wireless sensor networks which include data modification, impersonation attacks, eavesdropping, and replaying (p. 97). Kumar and Lee (2012) specify routing threats in wireless sensor networks which they identify as follows:

• Selective forwarding- malicious nodes choosing whether or not to forward information or to drop a packet altogether.
• Sinkhole threat- attracting neighboring nodes to a route through a malicious node.
• Sybil attack- a compromised node presents fake identities to neighboring nodes on the network. (p. 68-69)

Exploitation of these
Open Document