Protect wireless sensor network from Internet attacks
As the rapid development of internet, the technology of wireless sensor network (WSN) plays an important role in our real life. Moreover, WSN are the essential elements on a wide range of fields such as Internet of things (IOT). Thus, it is necessary to prevent WSN from internet attacks and maintain its stability. Sensor nodes in WSN can not only collect and process physical data, but also communicate with other entities. Therefore, this essay will illustrate three approaches on the security of WSN and analyze as well as discuss the three approaches based on attacks types, attacks source, applied range and energy consumption and so on.
Nowadays, there are already a large number of new
…show more content…
Although wireless sensor network and the other types of network sometimes need same security requirements, providing security service for WSN own more challenges when compared with secure foundation of network because of limited energy, the nodes number, storage, Internet bandwidth, communication of sensor nodes and the capabilities of computation. Two main reasons are computation capabilities and low traffic rates. The low traffic rate of sensor nodes can not support battery of sensors to make the network smooth for a long time and devices in the WSN can not support very complex computation to deal with some typical internet attacks. Additionally, Internet attacks can be divided into two types: internal attacks and external attacks. Generally, internal attacks are produced from malicious nodes. On the other hand, when it comes to the external attacks, wireless sensor network are easy to be attacked by several types of external internet attacks, which can be considered to three main aspects: secrecy and authentication attacks, network availability attacks and replay attacks.(p135, denial). Although many traditional techniques that have been used to resist various kinds of attacks, there are still remain serious problems in security of WSN. As a result, it is necessary to come up with the most effective approach to handle the Internet attacks in time because the faster development of technology, the more security problems. For these reasons, the prevention of
Wireless Sensor Networks (WSN) are made up of tiny sensing devices; capable of sensing some changes of incident/parameters and communicating with other devices, over a specific area. Mainly used for tracking, surveillance and environmental monitoring. These devices make it possible to be used in a system such as Home Automation and Security. Our purpose is to make our Home secure from any attacks physically and to the sensor network. Securing our Home starts from the outside, setting up a perimeter around house sensing intrusion and alerting the home owner. Allowing only predetermined users to enter the home. From the inside you can monitor for fires, leak, humidity or smoke, which the system will promptly report this to the owner as well as alert the proper authorities. Making most of the home voice controlled only recognized by the owner’s voice can add another layer of security.
The exponential increase use of the Internet to communicate, conduct business transactions, access personal banking, healthcare, education at confront of being anywhere has become an everyday lifestyle for many people around the globe. This reliance on computers, laptops, devices and other Internet of Things to access the Internet means, organizations, businesses and the government have also seen an increase occurrence of sophisticated attacks.
Nowadays, Wireless sensor networks (WSNs) are getting more and more involved in our society, researchers and manufacture. As the use of WSNs increases the more challenges rise to make them immune and life longer. Therefore, both fields industry and academia invest money to improve the capability of the security integrity, confidentiality, and authentication. Since WSNs are distributed in unfrequented and abandoned venues, the physical security is unconcerned or less concern. The most concern is the lifetime of Wireless sensor networks, sensors have limited source of power. Thus, economizing energy will keep sensors live longer, the less power means more efficiency. Moreover, secure data is important as well, since no one attends where sensors are located, it is easy to manipulate data or steal it. Cryptography provides high security to WSNs, using algorithms to encrypt and decrypt the sent data is
With wireless sensor network, the applications are cost effective and people can use it. The main disadvantage of the wireless sensor network is that it have the limited energy and computational power so it is impossible to make traditional security methodologies to use. Many of the researchers (A.Perrig, et.al 2001) and (Karlof. C., et.al, 2004) have given attention on this problem in there research paper. There are some devices which work with sensor network which use “Check, Track and Trace”, this type of functionality is used by most of the companies for example check determines the wind monitoring ability to sense what is going around the environment. Track determines locating an object at its place as an example in the hospital or in the warehouse, we can determine the location of physical assets and then tracing that with the help of sensors. The large application in the Wireless sensor networks make it hard to discuss security without any specific context. In wireless sensor networks, the security is the main problem.
Abstract -- Internet of Things is rapidly gaining popularity in the recent days. The availability of different variety of sensors and wireless technologies is responsible for the existence of the Internet of Things. The Internet of things finds a large number of applications in numerous fields such as Energy sector, Healthcare, Transportation, Business field and Agriculture. This paper mainly concentrates on the challenges and security issues of the Internet of things. In addition to that the paper provides solutions to these issues with the help of a construction of secure IoT
The next big boom in the networking fields is the Internet of things (IoT). The basic idea of IoT is the networking of different physical devices, smart devices, vehicles and also the items embedded with electronics, software, sensors etc. to the internet. IoT is playing a more and more important role. It covers from traditional equipment to most general household objects such as WSNs and RFID. With this great potential of IoT there come security problems which are discussed in this paper. As IoT is built on the internet, security problems of the internet will also show up in the IoT. IoT contains three layers: perception layer, transportation layer and the application layer. This paper analyses the security problems related to each layer separately and try to find the new solutions for the problems.
There have been significant contributions to overcome many weaknesses in sensor networks like coverage problems, lack in power and making best use of limited network bandwidth, however; work in sensor network security is still in its infancy stage. This paper is an effort to introduce the
Wireless sensor network (WSN) is an infrastructure less, dynamic topology, application oriented, multihoping network design with small, sensing wireless distributed nodes. [1] WSN consists of thousand of wireless node distributed in a geographical area. The distributed nodes senses the current status of its region and supply to the next upper which collects different information from different nodes and supplied final information to the
A wireless sensor network (WSN) is a collection of large number of sensor nodes and at least one base station. The sensor node is an autonomous small device that consists of mainly four units that are sensing, information gathering, processing and communication. In wireless sensor network there of many issues that are much affects in communication, processing and in deployments. The main issue is its coverage and connectivity problem. Most of the times communications does not prohibited properly amongst sensors and base station due lacking of ranges problem. Full coverage and connectivity means that every location in the field is covered by at least one node and
The basic building blocks of internet of things are wearable devices, IP address, operational computers to monitor the connected devices and sophisticated networks. Also all these devices are connected under one network be it a industrial sector or personal home. With each new device being -connected, there arise number of vulnerabilities and threats. There are number of devices that come under the umbrella and each behaves in a different manner. For example, wearable devices, baby monitor, fit bit, Google assistant, virtual assistant like Siri from Apple and many more each have their own functionality and it is important to understand these devices and secure them before it is used.
Since data are transmitted wirelessly between sensor nodes, it is usually prone to eavesdropping and interception. It is important to maintain the privacy of data among sensor nodes even from trusted cooperating sensor nodes of the WSNs. It is necessary to prevent recovering the privacy of the data, even it is overheard or decrypted by the adversaries.
via synthesizing present WSN applications as part of the infrastructure device, capability new programs may be diagnosed and developed to satisfy future technology and marketplace developments. for example WSN generation applications for smart grid, smart water, wise transportation systems, and smart home generate big quantities of statistics, and this information can serve many purposes.
A wireless sensor network (WSN) is a network of nodes that sense and control the environment providing interaction between the machines and the surrounding environment. It is formed by large number of sensors nodes where each node is equipped with sensor to detect physical characteristic such as temperature, pressure, weight etc. [2]. WSN is a new revolutionary method which gathers information from sensor nodes providing a reliable and efficient network. With the growing technology of sensors, WSNs will become the key for internet of things. The current focus of sensor network is mainly on networking technology comprising of dynamic environment and the sensor nodes. The new research program of SenseIT provided the sensor networking with new capabilities such
Therefore, there is a need to find a suitable algorithm which clusters sensor nodes in such a way that when a BS fails and a new BS takes the charge, new group key gets established with minimum computation and less energy consumption.
The concept of the internet of things is that every physical of object in the real world has a virtual component on the internet that can produce and consume services .Such super connected objects would be of great convivences but they would require novel approaches to ensure security and ethical uses. While internet of things is more than concept and it cannot be defined in concise manner as it is complex topic, in this paper we are trying to provide review of concerns about security of internet of things and possible ways to overcome the security threats.