IJITCS Vol. 4, No. 6, 8 Jun. 2012
Cover page and Table of Contents: PDF (size: 1125KB)
Full Text (PDF, 1125KB), PP.45-56
Views: 0 Downloads: 0
Physical environments, QoS metrics, WSN nodes, dynamic cross layer security, secure mechanisms, WSN security protocols
In dynamic insensitive application specific network, WSN consists of hundred and thousands of sensor nodes densely deployed in the sensor field. Majority of sensor nodes are static having power limitations, low network throughput, message transfer delays and computation power limits that are major obstacles. The limited communication range of WSN nodes, link asymmetry, and the characteristics of the physical environment lead to a major sources of QoS degradation in WSNs. The potential applications of the WSNs typically range from those in defense, military, environmental monitoring, health monitoring and civilian surveillance applications etc. All of these applications being omnipresent in nature necessitate appropriate heavy secure mechanisms to ensure the data security and privacy. On the other hand, the WSN nodes, being extremely resource constrained, it is really challenging to devise the WSNs security protocols. So need to propose dynamic high level cross layer security mechanism for detecting various attacks and the countermeasures taken to avoid the same without comprising any network resources.
Sanjeev Puri, S.P Tripathi, "Dynamic High Level Cross Layer Security Mechanisms for Wireless Sensor Networks", International Journal of Information Technology and Computer Science(IJITCS), vol.4, no.6, pp.45-56, 2012. DOI:10.5815/ijitcs.2012.06.07
[1]Liang Song and Dimitrios Hatzinakos. A cross-layer architecture of wireless sensor networks for target tracking. IEEE/ACM Trans. Netw., 15(1):145–158, 2007.
[2]E. Shi, A. Perrig, Designing secure sensor networks, IEEE Wireless Communications (2004)
[3]Healy.M, Newe.T, Lewis.E, “Security for Wireless Sensor Networks: A Review‟, IEEE Sensor Application Symposium, New Orleans, LA, USA-Feb 17-19, 2009.
[4]Idrees SK, Chee-Onn C, Hiroshi I, Tanveer AZ (2010). Threat Models and Security Issues in Wireless Sensor Networks ''proc. (ICINC 2010), 1: 384-389. Kuala Lumpur.
[5]Raymond, D.R, Midkiff, S.F, „Denial of Service in Wireless Networks: Attacks and Defences, IEEE CS: Security and Privacy, 2008,pg 74-81.
[6]Y. Huang, W. Fan, W. Lee and P. Yu, “Cross-feature analysis for detecting ad-hoc routing anomalies,” in Proceedings of the 23rd International Conference on Distributed Computing Systems, 2002.
[7]M. Pugliese, “Managing Security Issues in Advanced Applications of Wireless Sensor Networks,” PhD Thesis, University of L’Aquila, 2008
[8]M. Pugliese, A. Giani, and F. Santucci, “A Weak Process Approach to Anomaly Detection in Wireless Sensor Networks,” In Proc. 1st Intern. Workshop on Sensor Networks (SN08), Virgin Islands, 2008
[9]Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks, in: Proceedings of MobiCom ’01, July 2001, pp. 189–199.
[10] Mingbo Xiao, Xudong Wang, Guangsong Yang,” Cross-Layer Design for the Security of Wireless Sensor Networks”, Proceedings of the 6th World Congress on Intelligent Control and Automation, June 21 - 23, 2006, Dalian, China, pp(104-108).
[11]Kalpana S, Ghose (2011). Cross Layer Security Framework for Wireless Sensor Networks. IJSA, 5(1): 39
[12]M. C. Vuran and I. F. Akyildiz, “Cross-Layer Analysis of Error Control in Wireless Sensor Networks,” in Proc. IEEE SECON ’06, Reston, VA, September 25-28, 2006.
[13]Slijepcevic S, Potkonjak M (2002). On Communication Security in Wireless Ad-Hoc Sensor Networks. Eleventh IEEE International WETICE, 1(1): 139-144.
[14]Ergun, M. ; Levi, A. ; Savas, E., “A resilient key pre-distribution scheme for multiphase wireless sensor networks”, Computer and Information Sciences, 2009.
[15]M Healy, T Newe and E Lewis,”Resources Implications for Data Security in Wireless Sensor Network Nodes” in Sensor Comm 2007,pp(170-175).
[16]C. Karlof, D. Wagner, Secure routing in sensor networks: attacks and countermeasures, in: Proceedings of the 1st IEEE Workshop on Sensor Network Protocols and Applications, May 2003, pp. 1–15.
[17]Ozgur, D., T. Murat, et al. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems and Applications 29(4):pp. 713-722
[18]L. van Hoesel, T. Nieberg, J. Wu, and P. J. M. Havinga, “Prolonging the lifetime of wireless sensor networks by cross-layer interaction,” IEEE Wireless Communications, vol. 11, no. 6, 78 - 86, Dec. 2004.