1) Wireless sensor networks (WSNs) consist of numerous low-cost sensors that monitor their environment and transmit data wirelessly. They have various applications but also face unique security challenges.
2) WSNs differ from wired networks in being easier and cheaper to install but having less reliable data transfer. They also have different hardware components than traditional networks due to power and size constraints.
3) The key elements of a WSN are sensor nodes that detect events and transmit data, and base stations that receive data from nodes and connect the WSN to external networks. Providing security against attacks is important but challenging given the limitations of sensor nodes.
1) Wireless sensor networks (WSNs) consist of numerous low-cost sensors that monitor their environment and transmit data wirelessly. They have various applications but also face unique security challenges.
2) WSNs differ from wired networks in being easier and cheaper to install but having less reliable data transfer. They also have different hardware components than traditional networks due to power and size constraints.
3) The key elements of a WSN are sensor nodes that detect events and transmit data, and base stations that receive data from nodes and connect the WSN to external networks. Providing security against attacks is important but challenging given the limitations of sensor nodes.
1) Wireless sensor networks (WSNs) consist of numerous low-cost sensors that monitor their environment and transmit data wirelessly. They have various applications but also face unique security challenges.
2) WSNs differ from wired networks in being easier and cheaper to install but having less reliable data transfer. They also have different hardware components than traditional networks due to power and size constraints.
3) The key elements of a WSN are sensor nodes that detect events and transmit data, and base stations that receive data from nodes and connect the WSN to external networks. Providing security against attacks is important but challenging given the limitations of sensor nodes.
Wireless sensor networks and their security challenges
Khaleel Ur Rehman, Shumila Hassan, Khadija Naveed, Rameesa Akhter
{19014119-(066,070,112,128)}@uog.edu.pk
Abstract: The significant advances of hardware Sensor networks can be wired or
manufacturing technology and the development wireless. Wired sensor networks use of efficient software algorithms make technically ethernet cables to connect and economically feasible a network composed of sensors. Wireless sensor networks numerous, small, low-cost sensors using wireless (WSNs) use technologies such as communications, that is, a wireless sensor Bluetooth, cellular, WIFI or near field network (WSN). Security is becoming a major communication (NFC) to connect concern for WSN protocol designers because of sensors. the wide security-critical applications of WSNs. In this article, how WSN differs from wired Sensor networks typically include sensor network and other wireless network and also nodes, actuator nodes, gateways, and basic information about the WSN and its security clients. Sensor nodes group inside the issues compared with wired network and other sensor field and form networks of wireless networks is discoursed. Summarization different topologies.[2] of typical attacks on sensor networks and survey about the literatures on several important security A sensor node monitors the issues relevant to the sensor networks are also data collected by the sensor and dissertated. transmits this to other sensor nodes. Keywords: Wireless Sensor Network, During the transmission Security, Vulnerabilities, Security process, data may be handled by Mechanism. multiple nodes as it reaches a gateway node. Introduction: Today sensors are everywhere. The data is then transferred to We take these for granted, but sensors are in the management node. our phones, workplaces, vehicles, and the The management node is environment. A sensor network comprises a managed by the user and group of small, powered devices, and a determines the monitoring required wireless or wired networked infrastructure. and collects the monitored data. The sensor network connects to the internet Wired & Wireless Networks: Wireless or computer networks to transfer data for sensors are becoming more common in analysis and use. Sensor network nodes the world of sensor-based applications. cooperatively sense and control the This is mainly because they are cheaper environment. [1]. to install and easy to maintain. In addition to this it should also be noted that wireless sensor networks allow for a greater level of flexibility. This makes it nodes detect the same event. In this easier to adapt a sensor system to the case, one of them generates a final needs of the user. Despite these benefits, report after collaborating with the other wireless sensors still have some nodes. The BS can process the report disadvantages. For example, they are and then forward it through either high- often limited by distance as the speed at quality wireless or wired links to the which the data is transferred depends on external world for further processing. the location of the receiving device The WSN authority can send commands relative to the sensor. Compared to this, wired sensors have a much more or queries to a BS, which spreads those predictable data transfer time. [3], [4]. commands or queries into the network. Hence, a BS acts as a gateway between In many situations wired sensors are among the the WSN and the external world. An most reliable systems as they directly link the example is illustrated in Figure. 1[5] sensor to the device that is receiving the input. This means that wired sensors are also the most durable systems which do not need to be replaced often. However, it should be noted that wired systems require a large amount of space and are much more complicated to maintain. This burden increases in size as more sensors are used based on the application that the sensor is designed for.
Wireless Sensor Network: A WSN is a large
network of resource-constrained sensor nodes with multiple preset functions, such as sensing and processing, to fulfill different application objectives. The major elements of WSN are the sensor nodes and the base stations. In fact, they can be abstracted as the “sensing cells” and the “brain” of the network, respectively. Sensor nodes keep monitoring the network area after being deployed. Hardware Components of Sensor Node: After an event of interest occurs, one of When choosing the hardware the surrounding sensor nodes can detect components for a wireless sensor node, it, generate a report, and transmit the evidently the application’s requirements report to a BS through multi hop play a decisive factor. A sensor node wireless links. Collaboration can be integrates hardware and software for carried out if multiple surrounding sensing, data processing, and communication. They rely on wireless• Should provide real-time support. channels for transmitting data to and receiving data from other nodes. Figure 2 • Should provide efficient resource illustrates the basic structure of a sensormanagement mechanisms. node. The lifetime of a sensor node • Should support reliable and efficient depends to a large extent on the battery code distribution. lifetime; hence it is extremely important to adopt energy-efficient strategies for • Should support power management. • Should provide a generic programming interface up to sensor middleware or application software. • Should support parallel processing along with threading when a sensor is deployed for multiple purposes.[8][9]
Sensor Node Types: Desirable
functionality of sensor nodes in a information processing. A sensor node is WSN include: ease of installation, made up of a sensing unit, a processing self-indication, self-diagnosis, unit, a transceiver unit, and a power unit reliability, time awareness for as shown in Figure.[6],[7] coordination with other nodes, some software functions and DSP, and standard control protocols and network interfaces. There are many Software Components of Sensor Node: sensor manufacturers and it is too Traditional OS are not suitable for wireless sensor costly for them to make special networks because WSNs have constrained transducers for every network on the resources and diverse datacentric applications, in market. Different components made addition to a variable topology. WSNs need a new type of operating system, considering their by different manufacturers should be special characteristics. compatible. Sensor operating systems (SOS) should Security: Wireless mobile ad hoc embody the following functions, bearing in networks (MANETs) and sensor mind the limited resource of sensor nodes: networks have many applications in • Should be compact and small in size. military, homeland security, and other areas. In that many sensor networks .• Advanced anti-jamming techniques have mission-critical tasks. Security is such as frequency hopping spread critical for such networks deployed in spectrum and physical tamper hostile environments, and security proofing of nodes are generally concerns remain a serious impediment impossible in a sensor network due to to widespread adoption of these the requirements of greater design wireless networks. The security issues complexity and higher energy in MANETs are more challenging consumption. than those in traditional wired • The use of radio transmission, along computer networks and the Internet. with the constraints of small size, low Providing security in sensor networks cost, and limited energy, make WSNs is even more difficult than in more susceptible to denial-of-service MANETs due to the resource attacks. limitations of sensor nodes. Most sensor networks actively monitor their •. Attacks on a WSN can come from surroundings, and it is often easy to all directions and target at any node deduce information other than the leading to leaking of secret data monitored. Such unwanted information, interfering message etc. information leakage often results in • Security also needs to scale to large- privacy breaches of the people in the scale deployments. Most current environment. The combination of standard security protocols were these factors demands security for designed for two-party settings and do sensor networks at design time to not scale to a large number of ensure operation safety, secrecy of participants. sensitive data, and privacy for people in sensor environments. Significant • Since sensor nodes usually have efforts and research have been severely constrained, asymmetric undertaken to enhance security levels cryptography is often too expensive of wireless networks. for many applications. Thus, a promising approach is to use more Why Security Complicated in WSN: efficient symmetric cryptographic Security in sensor networks is alternatives. complicated by the constrained capabilities of sensor node hardware. • Instead, most security schemes make use of symmetric key • The overall cost of the WSN cryptography. One thing required in should be as low as possible. either case is the use of keys for secure communication. Managing key distribution is not unique to WSNs, repudiation proves the source of a but again constraints such as small packet. In authentication the source memory capacity make centralized proves its identity. Non-repudiation keying techniques impossible. prevents the source from denying that it sent a packet. Freshness ensures that Security Requirements: In short, the a malicious node does not resend goal of security is to provide security previously captured packets. services to defend against all the Availability mainly targets DoS kinds of threat. It provides the attacks and is the ability to sustain the analysis of security and survivability networking functionalities without requirements concern with the design any interruption due to security goals of scalability, efficiency, key threats. Resilience to attacks required connectivity and reliability. to sustain the network functionalities Authentication ensures that the other when a portion of nodes is end of a connection or the originator compromised or destroyed. In of a packet is the node that is claimed. Forward secrecy a sensor should not Access-control prevents unauthorized be able to read any future messages access to a resource. Confidentiality after it leaves the network. In protects overall content or a field in a Backward secrecy a joining sensor message. Confidentiality can also be should not be able to read any required to prevent an adversary from previously transmitted message. undertaking traffic analysis. Privacy Survivability is the ability to provide prevents from obtaining information a minimum level of service in the that may have private content. The presence of power loss, failures or private information may be obtained attacks. through the analysis of traffic patterns, i.e., frequency, source node, Holistic Security in WSN: A holistic routes, etc. Ensures that a packet is approach aims at improving the not modified during transmission is performance of WSNs with respect to known as Integrity. Authorization: security, longevity and connectivity authorizes another node to update under changing environmental information (import authorization) or conditions. The holistic approach of to receive information (export security concerns about involving all authorization). Anonymity hides the the layers for ensuring overall security source of a packet or frame. It is a in a network. For such a network, a service that can help with data single security solution for a single confidentiality and privacy. Non- layer might not be an efficient solution rather security is to be search space defined by the available ensured for all the layers of the physical positions, frequencies, protocol stack that is employing a transmission power levels, etc. The holistic approach could be the best idea of security by wireless is to use option. wireless properties offered by the communication itself to design Using Wireless Properties to lightweight security mechanisms. Increase Security: Every cryptographic design is based on the Issues with High-Level Security principles of confusion and diffusion. Mechanisms Confusion refers to a relationship Cryptography & Key Management: between a secret key and a cipher To achieve security in WSNs, it is text; such a relationship should be important to be able to perform kept as complex and as possible. various cryptographic operations, Diffusion aims to reduce any including encryption, authentication, statistical relationship between the and so on. Selecting the appropriate plaintext and the cipher text as far as cryptography method for sensor nodes possible. Interestingly, such a diffuse is fundamental to providing security relationship between input and output services in WSNs. may also be found in wireless The process by which public key and communication. It is well investigated symmetric key cryptography schemes that even a small change in physical should be selected is based on the position, antenna orientation or subtle following: 1. Energy: how much changes of the physical environment energy is required to execute the strongly affect the signal strength encrypt/decryption functions 2. measured at a receiver, especially in Program memory: the memory transmissions lacking Line-Of-Sight required to store the (LOS). physical phenomena of wave encryption/decryption program 3. propagation such as reflection, Temporary memory: the required diffraction, scattering and fading RAM size or number of registers account for properties similar to required temporarily when the confusion and diffusion. In a security encryption/decryption code is being context, this means that determining executed 4. Execution time: the time the exact physical configuration that required to execute the produces a specific set of signal encryption/decryption code. 5. properties at the receiver may equal Program parameters memory: the an exhaustive brute-force attack on a required memory size to save the required number of keys used by the expensive tamper-resistant hardware. encryption/decryption function. Besides the exposure of secret information (e.g., cryptographic Secure Group Management: In- keys), compromised sensors may be network processing of the raw data is reprogrammed with malicious code to performed in WSNs by dividing the launch all kinds of insider attacks. network into small groups and Very desirably, if we can identify and analyzing the data aggregated at the further revoke those corrupted nodes group leaders. So the group leader has in a timely manner, the potential to authenticate the data it is receiving damages caused by them could be from other nodes in the group. This minimized. To address this problem, a requires group key management. promising direction is to use code However, addition or deletion of attestation to validate the code nodes from the group leads to more running on each sensor node. Because problems. the code running on a malicious node Secure Location Discovery: A sensor must be different from that on a locations play a critical role in many legitimate node, we can detect sensor network applications, such as compromised nodes by verifying their environment monitoring and target memory content. tracking. Without protection, an Conclusions: Security concerns attacker may easily mislead the constitute a potential stumbling block location estimation at sensor nodes to the impending wide deployment of and subvert the normal operation of sensor networks. WSNs are still under sensor networks. For example, an development, and many protocols attacker may provide incorrect designed so far for WSNs have not location references by replaying the taken security into consideration. On beacon packets intercepted in the other hand, the salient features of different locations. Moreover, an WSNs make it very challenging to attacker may compromise a beacon design strong security protocols while node and distribute malicious location still maintaining low overheads. In references by lying about the location this article, we summarize typical or manipulating the beacon signals. attacks on sensor networks and Code Attestation: Sensors that surveyed the literatures on several operate in an unattended, harsh or important security issues relevant to hostile environment often suffer from the sensor networks, including key break-in compromises, because their management, secure location low costs do not allow the use of discovery, code attestation and etc. [6] Tanveer Zia and Albert Zomaya, Many security issues in WSNs remain “Security Issues in open and we expect to see more Wireless Sensor Networks”, IEEE. research activities on these exciting topics in the future. [7] Yong Wang, Garhan Attebury, And Byrav Ramamurthy, References: “A Survey Of Security Issues In [1]Yang, H; Ricciato, F.;Lu, Wireless Sensor Networks” , IEEE S.;Zhang.L, “Securing a Wireless Communications Surveys & Tutorials, World”, Proceedings of the IEEE, Vol:94, Issue 2, PP: 442 –454, Feb Volume 8, No. 2, 2nd Quarter 2006. 2006. [8] Javier Lopez, Jianying Zhou, [2] Yong Wang, Garhan Attebury, “Wireless Sensor Network Security”, And Byrav Ramamurthy, IOS Press, 2008. “A Survey Of Security Issues In [9] John Paul Walters, Zhengqiang Wireless Sensor Networks” , IEEE Liang, Weisong Shi, and Vipin Communications Surveys & Tutorials, Chaudhary, “Wireless Sensor Network Security: A Survey”, Volume 8, No. 2, 2nd Quarter 2006. Auerbach Publications, CRC Press, [3] Robert M. Crovella, “Sensor 2006. Networks and Communication”, CRC Press LLC, 2000. [4] Mohammad Ilyas And Imad Mahgoub, “Handbook Of Sensor Networks: Compact Wireless And Wired Sensing Systems”, CRC Press LLC, 2005. [5] Yun Zhou; Yuguang Fang; Yanchao Zhang, “Securing Wireless Sensor Networks: A Survey”, IEEE Communications Surveys & Tutorials, Vol:10, Issue 3, PP: 6 –28, Third Quarter 2008