Publication | Closed Access
Sensor network security: a survey
602
Citations
136
References
2009
Year
Sensor NetworksEngineeringWireless SecurityInformation SecurityWireless Sensor NetworksSecure RoutingSecurityIot SecurityInternet Of ThingsSecurity IssuesSecure ProtocolSensor Network SecurityData SecurityCryptographyNetwork Security
Wireless sensor networks rely on resource‑constrained nodes to sense, collect, and disseminate data, and their growing ubiquity has made security a critical concern, especially for mission‑critical applications. The paper aims to identify WSN threats and vulnerabilities and to provide a comprehensive overview of security issues. The authors classify security concerns into seven categories—cryptography, key management, attack detection and prevention, secure routing, secure location, secure data fusion, and other issues—and analyze the strengths and weaknesses of existing schemes in each. They summarize current techniques, highlight their limitations, and identify open research directions in each category.
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks. In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first. Then we give a holistic overview of security issues. These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues. Along the way we analyze the advantages and disadvantages of current secure schemes in each category. In addition, we also summarize the techniques and methods used in these categories, and point out the open research issues and directions in each area.
| Year | Citations | |
|---|---|---|
Page 1
Page 1