Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Wireless sensor networks and their security challenges

Khaleel Ur Rehman, Shumila Hassan, Khadija Naveed, Rameesa Akhter


{19014119-(066,070,112,128)}@uog.edu.pk

Abstract: The significant advances of hardware Sensor networks can be wired or


manufacturing technology and the development wireless. Wired sensor networks use
of efficient software algorithms make technically ethernet cables to connect
and economically feasible a network composed of sensors. Wireless sensor networks
numerous, small, low-cost sensors using wireless (WSNs) use technologies such as
communications, that is, a wireless sensor Bluetooth, cellular, WIFI or near field
network (WSN). Security is becoming a major communication (NFC) to connect
concern for WSN protocol designers because of sensors.
the wide security-critical applications of WSNs.
In this article, how WSN differs from wired Sensor networks typically include sensor
network and other wireless network and also nodes, actuator nodes, gateways, and
basic information about the WSN and its security clients. Sensor nodes group inside the
issues compared with wired network and other sensor field and form networks of
wireless networks is discoursed. Summarization different topologies.[2]
of typical attacks on sensor networks and survey
about the literatures on several important security  A sensor node monitors the
issues relevant to the sensor networks are also data collected by the sensor and
dissertated. transmits this to other sensor nodes.
Keywords: Wireless Sensor Network,  During the transmission
Security, Vulnerabilities, Security process, data may be handled by
Mechanism. multiple nodes as it reaches a
gateway node.
Introduction: Today sensors are everywhere.  The data is then transferred to
We take these for granted, but sensors are in the management node.
our phones, workplaces, vehicles, and the  The management node is
environment. A sensor network comprises a managed by the user and
group of small, powered devices, and a determines the monitoring required
wireless or wired networked infrastructure. and collects the monitored data.
The sensor network connects to the internet Wired & Wireless Networks: Wireless
or computer networks to transfer data for sensors are becoming more common in
analysis and use. Sensor network nodes the world of sensor-based applications.
cooperatively sense and control the This is mainly because they are cheaper
environment. [1]. to install and easy to maintain. In
addition to this it should also be noted
that wireless sensor networks allow for a
greater level of flexibility. This makes it nodes detect the same event. In this
easier to adapt a sensor system to the case, one of them generates a final
needs of the user. Despite these benefits, report after collaborating with the other
wireless sensors still have some nodes. The BS can process the report
disadvantages. For example, they are and then forward it through either high-
often limited by distance as the speed at quality wireless or wired links to the
which the data is transferred depends on
external world for further processing.
the location of the receiving device
The WSN authority can send commands
relative to the sensor. Compared to this,
wired sensors have a much more or queries to a BS, which spreads those
predictable data transfer time. [3], [4]. commands or queries into the network.
Hence, a BS acts as a gateway between
In many situations wired sensors are among the the WSN and the external world. An
most reliable systems as they directly link the example is illustrated in Figure. 1[5]
sensor to the device that is receiving the input.
This means that wired sensors are also the most
durable systems which do not need to be replaced
often. However, it should be noted that wired
systems require a large amount of space and are
much more complicated to maintain. This burden
increases in size as more sensors are used based
on the application that the sensor is designed for.

Wireless Sensor Network: A WSN is a large


network of resource-constrained sensor nodes
with multiple preset functions, such as sensing
and processing, to fulfill different application
objectives. The major elements of WSN are the
sensor nodes and the base stations. In fact, they
can be abstracted as the “sensing cells” and the
“brain” of the network, respectively.
Sensor nodes keep monitoring the
network area after being deployed.
Hardware Components of Sensor Node:
After an event of interest occurs, one of
When choosing the hardware
the surrounding sensor nodes can detect
components for a wireless sensor node,
it, generate a report, and transmit the evidently the application’s requirements
report to a BS through multi hop play a decisive factor. A sensor node
wireless links. Collaboration can be integrates hardware and software for
carried out if multiple surrounding sensing, data processing, and
communication. They rely on wireless• Should provide real-time support.
channels for transmitting data to and
receiving data from other nodes. Figure 2 • Should provide efficient resource
illustrates the basic structure of a sensormanagement mechanisms.
node. The lifetime of a sensor node • Should support reliable and efficient
depends to a large extent on the battery code distribution.
lifetime; hence it is extremely important
to adopt energy-efficient strategies for • Should support power management.
• Should provide a generic
programming interface up to sensor
middleware or application software.
• Should support parallel
processing along with threading
when a sensor is deployed for
multiple purposes.[8][9]

Sensor Node Types: Desirable


functionality of sensor nodes in a
information processing. A sensor node is WSN include: ease of installation,
made up of a sensing unit, a processing self-indication, self-diagnosis,
unit, a transceiver unit, and a power unit reliability, time awareness for
as shown in Figure.[6],[7] coordination with other nodes, some
software functions and DSP, and
standard control protocols and
network interfaces. There are many
Software Components of Sensor Node: sensor manufacturers and it is too
Traditional OS are not suitable for wireless sensor costly for them to make special
networks because WSNs have constrained
transducers for every network on the
resources and diverse datacentric applications, in
market. Different components made
addition to a variable topology. WSNs need a
new type of operating system, considering their by different manufacturers should be
special characteristics. compatible.
Sensor operating systems (SOS) should Security: Wireless mobile ad hoc
embody the following functions, bearing in networks (MANETs) and sensor
mind the limited resource of sensor nodes: networks have many applications in
• Should be compact and small in size. military, homeland security, and other
areas. In that many sensor networks .• Advanced anti-jamming techniques
have mission-critical tasks. Security is such as frequency hopping spread
critical for such networks deployed in spectrum and physical tamper
hostile environments, and security proofing of nodes are generally
concerns remain a serious impediment impossible in a sensor network due to
to widespread adoption of these the requirements of greater design
wireless networks. The security issues complexity and higher energy
in MANETs are more challenging consumption.
than those in traditional wired
• The use of radio transmission, along
computer networks and the Internet.
with the constraints of small size, low
Providing security in sensor networks
cost, and limited energy, make WSNs
is even more difficult than in
more susceptible to denial-of-service
MANETs due to the resource
attacks.
limitations of sensor nodes. Most
sensor networks actively monitor their •. Attacks on a WSN can come from
surroundings, and it is often easy to all directions and target at any node
deduce information other than the leading to leaking of secret
data monitored. Such unwanted information, interfering message etc.
information leakage often results in • Security also needs to scale to large-
privacy breaches of the people in the scale deployments. Most current
environment. The combination of standard security protocols were
these factors demands security for designed for two-party settings and do
sensor networks at design time to not scale to a large number of
ensure operation safety, secrecy of participants.
sensitive data, and privacy for people
in sensor environments. Significant • Since sensor nodes usually have
efforts and research have been severely constrained, asymmetric
undertaken to enhance security levels cryptography is often too expensive
of wireless networks. for many applications. Thus, a
promising approach is to use more
Why Security Complicated in WSN: efficient symmetric cryptographic
Security in sensor networks is alternatives.
complicated by the constrained
capabilities of sensor node hardware. • Instead, most security schemes
make use of symmetric key
• The overall cost of the WSN cryptography. One thing required in
should be as low as possible. either case is the use of keys for
secure communication. Managing key
distribution is not unique to WSNs, repudiation proves the source of a
but again constraints such as small packet. In authentication the source
memory capacity make centralized proves its identity. Non-repudiation
keying techniques impossible. prevents the source from denying that
it sent a packet. Freshness ensures that
Security Requirements: In short, the
a malicious node does not resend
goal of security is to provide security
previously captured packets.
services to defend against all the
Availability mainly targets DoS
kinds of threat. It provides the
attacks and is the ability to sustain the
analysis of security and survivability
networking functionalities without
requirements concern with the design
any interruption due to security
goals of scalability, efficiency, key
threats. Resilience to attacks required
connectivity and reliability.
to sustain the network functionalities
Authentication ensures that the other
when a portion of nodes is
end of a connection or the originator
compromised or destroyed. In
of a packet is the node that is claimed.
Forward secrecy a sensor should not
Access-control prevents unauthorized
be able to read any future messages
access to a resource. Confidentiality
after it leaves the network. In
protects overall content or a field in a
Backward secrecy a joining sensor
message. Confidentiality can also be
should not be able to read any
required to prevent an adversary from
previously transmitted message.
undertaking traffic analysis. Privacy
Survivability is the ability to provide
prevents from obtaining information
a minimum level of service in the
that may have private content. The
presence of power loss, failures or
private information may be obtained
attacks.
through the analysis of traffic
patterns, i.e., frequency, source node, Holistic Security in WSN: A holistic
routes, etc. Ensures that a packet is approach aims at improving the
not modified during transmission is performance of WSNs with respect to
known as Integrity. Authorization: security, longevity and connectivity
authorizes another node to update under changing environmental
information (import authorization) or conditions. The holistic approach of
to receive information (export security concerns about involving all
authorization). Anonymity hides the the layers for ensuring overall security
source of a packet or frame. It is a in a network. For such a network, a
service that can help with data single security solution for a single
confidentiality and privacy. Non- layer might not be an efficient
solution rather security is to be search space defined by the available
ensured for all the layers of the physical positions, frequencies,
protocol stack that is employing a transmission power levels, etc. The
holistic approach could be the best idea of security by wireless is to use
option. wireless properties offered by the
communication itself to design
Using Wireless Properties to
lightweight security mechanisms.
Increase Security: Every
cryptographic design is based on the Issues with High-Level Security
principles of confusion and diffusion. Mechanisms
Confusion refers to a relationship
Cryptography & Key Management:
between a secret key and a cipher
To achieve security in WSNs, it is
text; such a relationship should be
important to be able to perform
kept as complex and as possible.
various cryptographic operations,
Diffusion aims to reduce any including encryption, authentication,
statistical relationship between the and so on. Selecting the appropriate
plaintext and the cipher text as far as cryptography method for sensor nodes
possible. Interestingly, such a diffuse is fundamental to providing security
relationship between input and output services in WSNs.
may also be found in wireless
The process by which public key and
communication. It is well investigated
symmetric key cryptography schemes
that even a small change in physical
should be selected is based on the
position, antenna orientation or subtle
following: 1. Energy: how much
changes of the physical environment
energy is required to execute the
strongly affect the signal strength
encrypt/decryption functions 2.
measured at a receiver, especially in
Program memory: the memory
transmissions lacking Line-Of-Sight
required to store the
(LOS). physical phenomena of wave
encryption/decryption program 3.
propagation such as reflection,
Temporary memory: the required
diffraction, scattering and fading
RAM size or number of registers
account for properties similar to
required temporarily when the
confusion and diffusion. In a security
encryption/decryption code is being
context, this means that determining
executed 4. Execution time: the time
the exact physical configuration that
required to execute the
produces a specific set of signal
encryption/decryption code. 5.
properties at the receiver may equal
Program parameters memory: the
an exhaustive brute-force attack on a
required memory size to save the
required number of keys used by the expensive tamper-resistant hardware.
encryption/decryption function. Besides the exposure of secret
information (e.g., cryptographic
Secure Group Management: In-
keys), compromised sensors may be
network processing of the raw data is
reprogrammed with malicious code to
performed in WSNs by dividing the
launch all kinds of insider attacks.
network into small groups and
Very desirably, if we can identify and
analyzing the data aggregated at the
further revoke those corrupted nodes
group leaders. So the group leader has
in a timely manner, the potential
to authenticate the data it is receiving
damages caused by them could be
from other nodes in the group. This
minimized. To address this problem, a
requires group key management.
promising direction is to use code
However, addition or deletion of
attestation to validate the code
nodes from the group leads to more
running on each sensor node. Because
problems.
the code running on a malicious node
Secure Location Discovery: A sensor must be different from that on a
locations play a critical role in many legitimate node, we can detect
sensor network applications, such as compromised nodes by verifying their
environment monitoring and target memory content.
tracking. Without protection, an
Conclusions: Security concerns
attacker may easily mislead the
constitute a potential stumbling block
location estimation at sensor nodes
to the impending wide deployment of
and subvert the normal operation of
sensor networks. WSNs are still under
sensor networks. For example, an
development, and many protocols
attacker may provide incorrect
designed so far for WSNs have not
location references by replaying the
taken security into consideration. On
beacon packets intercepted in
the other hand, the salient features of
different locations. Moreover, an
WSNs make it very challenging to
attacker may compromise a beacon
design strong security protocols while
node and distribute malicious location
still maintaining low overheads. In
references by lying about the location
this article, we summarize typical
or manipulating the beacon signals.
attacks on sensor networks and
Code Attestation: Sensors that surveyed the literatures on several
operate in an unattended, harsh or important security issues relevant to
hostile environment often suffer from the sensor networks, including key
break-in compromises, because their management, secure location
low costs do not allow the use of
discovery, code attestation and etc. [6] Tanveer Zia and Albert Zomaya,
Many security issues in WSNs remain “Security Issues in
open and we expect to see more
Wireless Sensor Networks”, IEEE.
research activities on these exciting
topics in the future. [7] Yong Wang, Garhan Attebury,
And Byrav Ramamurthy,
References:
“A Survey Of Security Issues In
[1]Yang, H; Ricciato, F.;Lu,
Wireless Sensor Networks” , IEEE
S.;Zhang.L, “Securing a Wireless
Communications Surveys & Tutorials,
World”, Proceedings of the IEEE,
Vol:94, Issue 2, PP: 442 –454, Feb Volume 8, No. 2, 2nd Quarter 2006.
2006. [8] Javier Lopez, Jianying Zhou,
[2] Yong Wang, Garhan Attebury, “Wireless Sensor Network Security”,
And Byrav Ramamurthy, IOS Press, 2008.
“A Survey Of Security Issues In [9] John Paul Walters, Zhengqiang
Wireless Sensor Networks” , IEEE Liang, Weisong Shi, and Vipin
Communications Surveys & Tutorials, Chaudhary, “Wireless Sensor
Network Security: A Survey”,
Volume 8, No. 2, 2nd Quarter 2006.
Auerbach Publications, CRC Press,
[3] Robert M. Crovella, “Sensor
2006.
Networks and Communication”, CRC
Press LLC, 2000.
[4] Mohammad Ilyas And Imad
Mahgoub, “Handbook Of Sensor
Networks: Compact Wireless And
Wired
Sensing Systems”, CRC Press LLC,
2005.
[5] Yun Zhou; Yuguang Fang;
Yanchao Zhang, “Securing Wireless
Sensor Networks: A Survey”, IEEE
Communications Surveys & Tutorials,
Vol:10, Issue 3, PP: 6 –28, Third
Quarter 2008

You might also like