A Survey on Wireless Sensor Network (WSN): Security Issues, Challenges and Solutions
Exploring Security Issues and Solutions in Wireless Sensor Networks
by Jhujhar Singh*, Dr. Om Parkash,
- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540
Volume 14, Issue No. 1, Oct 2017, Pages 710 - 715 (6)
Published by: Ignited Minds Journals
ABSTRACT
The sensor network security architecture needs to integrate a number of security measures and technologies to protect the network and meet the above ideal requirements. This study describes the complete set of these components (and related technologies) currently under investigation in sensor networks. Wireless Sensor Network technology is combined with processing power wireless communication which makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology incurs various types of security threats. Security issues of sensor network are different from that of conventional network. The intent of this paper is to explore the security related issues, challenges and propose some solutions to secure the wireless sensor network (WSN) against security threats. Further, as security being vital to the acceptance and use of sensor network for many applications I have made an in depth threat analysis propose some security mechanism in wireless sensor network.
KEYWORD
sensor network, security issues, challenges, solutions, architecture, technology, processing power, wireless communication, security threats, conventional network
INTRODUCTION
Many lower level sensor network application / protocol designs assume that all nodes are cooperative and reliable. This does not occur in certain situations, but in most real deployments, the node faces many threats that can significantly disrupt normal network functionality. There are many attacks designed to take advantage of unreliable communication channels and unattended sensor nodes. Most sensor networks actively monitor their surroundings, and in many cases it is easy to guess information other than monitoring data. This type of information leakage often loses the privacy of people in the environment. In addition, the wireless communication used in the sensor network helps the other party to eavesdrop and packet inject. To combine these elements, the sensor network must be protected to ensure the operational safety of personnel in the sensor environment, the confidentiality and privacy of sensitive data. However, sensor networks cannot rely on manual intervention to confront the network or face attacker attempts to prevent the network from functioning properly. In addition, existing security mechanisms such as public key infrastructure with high computational costs cannot be adopted. Compared to the network's autonomous response that relies on built-in preprogramming strategies and coordination, joint action is the most effective way to get the most out of the other. This chapter provides an overview of sensor network security issues. First, research raises the limitations of sensor networks that make security of such networks difficult, suggests unique characteristics of sensors that can be used in fact models, and discusses the requirements that security protocols must meet It has been. Then select the first step to establish a comprehensive security challenge for the sensor network. This impression helps to identify research challenges and sets up the ―Sensor Network Security‖ scenario in the chapter that explains the contribution of individual, neutral, and objective research below. A Wireless Sensor Network can be defined as a group of independent nodes, which are communicate wirelessly. The basic idea of sensor network is to disperse tiny sensing devices; which are capable of sense some changes of communication with other devices for some specific purpose like target tracking, surveillance etc. Today sensor can monitor temperature, pressure, humidity, soil makeup, vehicle movement, noise level and other properties. Sensor networks are highly distributed networks of small lightweight wireless nodes deployed in large numbers to monitor the system. Build up sensors have been made possible by the recent advance in micro-electro-mechanical system (MEMS) technology. The sensor nodes are similar to that of a computer with a processing unit. A wireless sensor network is scattered in a region where it is meant to collect data through its sensor nodes. The applications of sensor networks are endless. This paper provides an
To design a complete secure wireless sensor network, security must be integrated in to every node of the system. Any component of a network implemented without any security could easily become a point of attacks. Security in wireless sensor networks can be defined as a method of protecting prospective applications against all known types of attacks. Attacks including Denial-of-Service, Traffic Analysis, Multiple identity/manipulation of routing information, cloning, hello flood, Sybil, Wormhole, Sinkhole etc. are all areas for concern within wireless sensor network security architecture design. It is extremely important to ensure that all known attacks are defended against when designing security system for a wireless sensor network.
ARCHITECTURE OF WIRELESS SENSOR NETWORK (WSN)
In a typical WSN we see following network components: • Network Manager - The responsibility of the network manager is to configure the network. • Security Manager - The overall responsibility of the security manager is to generate, store and manage keys. • Interfacing with the sensor and an energy source, usually a battery or an embedded from of energy harvesting. • Gateway Access Point – A gateway enable communication between host application and field devices.
WIRELESS SENSOR NETWORK SECURITY ANALYSIS
In order to protect sensed data and communication exchange between sensor nodes, it is important to guarantee the secrecy of message. In the sensor network all this is usually achieved by the use of symmetric cryptography as asymmetric or public key
ATTACKS ON SENSOR NETWORK
Wireless Sensor Networks are vulnerable to security attacks due to the broadcast nature of the transmission media. Therefore sensor networks are particularly vulnerable to several key types of attacks.The most popular attacks are:- Basically attacks are broadly classified in two categories i.e. active attacks and passive attacks.
A. Active attacks:
The unauthorized attacks monitors, listen to and modifies the data streams in the communication channel as known as active attacks. The following active attacks are: a) Routing Attacks in Sensor Networks: The attacks which act on the network layer are called routing attacks. The following are the attacks that happen while routing the message • Sybill Attack: A single node presents multiple identities to other nodes in the network. • Sinkhole Attack: Attracting traffic to a specific node. • Wormholes Attack: An attacker records packets at one location in the network, tunnels them to another location & transmit in to the network. • HELLO Flood Attack: This attack use HELLO packets as a weapon to convince the sensor in wsn (attacker routing protocol‘s HELLO packets from one node to another). • Selected Forwarding: A malicious node can selectively drop only certain packets. b) Denial of Service Attack: The simplest DoS attack tries to exhaust the resources available to the victim node, by sending extra unnecessary packets and thus prevent legitimate network users from accessing services or resources to which they are entitled. At physical layer the DoS attacks could be jamming and tempering, at link layer, collision, exhaustion, unfairness, at network layer, neglect and greed, homing, misdirection, black holes and at transport layer this attack could be performed by malicious flooding and desynchronization. The mechanism to prevent the DoS attacks includes payment for network resources,
c) Physical Attack: Physical attacks destroy sensors permanently, so the losses are irreversible. For instance attackers can extract cryptographic secrets, tamper with the associated circuitry, modify programming in the sensors or replace them with malicious sensors under the control of the attacker. d) Message Corruption: Any modification of the content of a message by an attacker compromises its integrity. e) False Node: A false node involves the addition of nodes by an adversary and causes the injection of malicious data. Insertion of malicious node is one of the most dangerous attacks that can occur. Malicious can injected in the network could spread to all nodes, potentially destroying the whole network. f) Node Replication Attack: An attacker seeks to add a node to an existing sensor network by copying the node ID of an existing sensor node. A node replicated in this approach can severely disrupt a sensor network‘s performance, packet can be corrupted or even misrouted. g) Node Subversion: Capture of a node may reveal its information including disclosure of cryptographic keys & thus compromise the whole sensor network. h) Node Malfunction: A malfunctioning node will generate inaccurate data that could expose the integrity of sensor network especially if it a data aggregating node such as a cluster leader. i. Node Outage: Node outage is the situation that occur when a node stop its function. In the case where a cluster leader stops functioning, the sensor network protocols should be robust enough to mitigate the effects of node outage by proving an alternate route.
B. Passive Attacks:
The monitoring and listening of communication channel by unauthorized attacks are known as passive attacks. The most popular types of attacks are: a) The main privacy problem is not that sensor networks enable the collection of information. In fact, much information from sensor network could probably collected through surveillance. They can gather information at low-risk in anonymous manner. Some of the more common attacks against sensor privacy are: • Monitor and Eavesdropping: This is the most common attack to privacy. By snooping to the data, the adversary could easily discover the communication contents. When the traffic conveys the control information about the sensor network configuration, which contain potentially more detailed information than accessible through the location server, the eavesdropping can act effectively against the privacy protection. • Traffic Analysis: Even when the messages transferred are encrypted, it still leaves a high possibilities analysis of the communication patterns. Sensor activities can potentially reveal enough information to enable an adversary to cause malicious harm to the sensor network. • Camouflage Adversaries: One can insert their node or compromise the node to hide in the sensor network. After that these nodes can copy as a normal node to attract the packets, then misroute the packets, conducting the privacy analysis.
SECURITY MECHANISM IN WSN
The security mechanisms are actually used to detect, prevent and recover from the security attacks. A wide variety of security schemes can be invented to counter malicious attacks and these can be categorized as high-level and low-level. a) Low-level security mechanism primitive for security sensor network include: • Key Establishment and trust setup: one important of sensor network security is programmable and controlled group communication. The primary requirement of setting up the sensor network is the establishment of cryptographic keys. Key-establishment technique to scale the network with hundreds of nodes. • Secrecy and Authentication: Most of the sensor network applications require protection against eavesdropping, injection and modification of packets. Cryptography is the standard defense. The earlier sensor networks are likely to use link layer cryptography, because this approach provides the greatest ease of deployment among currently available network cryptographic approaches.
protocol suffers from many security vulnerabilities. • Privacy: Like other traditional network, the sensor networks have also force privacy concerns. Initially the sensor networks are deploying for legitimate purpose might subsequently be used in unanticipated ways. Providing awareness of the presence of sensor nodes and data acquisition is particularly important. b) High-level security mechanism for securing sensor networks includes secure group management, intrusion detection and secures data aggregation. • Secure Group Management: Each and every node in a wireless sensor network is limited in its computing and communication capabilities. However, interesting in-network data aggregation and analysis can be performed by groups of nodes. Secure protocol fro group management is required, securely admitting new group members and supporting secure group communication. • Intrusion Detection: WSNs are susceptible to many forms of intrusion. Wireless sensor network require a solution that is fully distributed and memory requirements. The use of secure groups may be a promising approach for decentralized intrusion detection. • Secure Data Aggregation: One advantage of wsn is the fine-grain sensing that large and dense sets of nodes can provide. The sensed values must be aggregated to avoid overwhelming amount of traffic back to the base station.
CHALLENGES OF SENSOR NETWORKS
The nature of large, ad-hoc, wireless sensor networks presents significant challenges in designing security schemes. A wsn is a special network which has many constraint compared to a traditional computer network. a) Wireless Medium: The wireless medium is inherently less secure because its broadcast nature makes eavesdropping simple. Any transmission can easily be intercepted, altered or replayed by an adversary. The wireless medium allows an attacker to easily intercept valid packets and easily inject malicious ones. always subject to change due to node failure, addition or mobility. Nodes may be deployed by airdrop, so nothing os known of the topology prior to deployment. c) Hostile Environment: The next challenging factor is the hostile environment in which sensor nodes function notes the possibility of destruction or capture by attackers. Since nodes may be in a hostile environment, attackers can easily gain physical access to the device.
Summary of various security schemes for wireless sensor networks
CONCLUSION
Wireless sensor networks are increasingly being used in military, environment, health and commercial applications. Sensor networks inherently different from traditional wired network as well as wireless ad-hoc networks. Security is an important feature for the deployment of Wireless Sensor Networks. This paper summarized the attacks and their classifications in wireless sensor networks. And also an attempt has been made to explore the security mechanism widely used to handle those attacks. However, developing such a detection mechanism and making it efficient represents a great research challenge. Again, ensuring holistic security in wireless sensor network is a major research issue. The challenges of wireless sensor network are also briefly discussed.
1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci (2002). ―A survey on sensor networks,‖ IEEE Communications Magazine, vol. 40, no. 8, pp.102-114. 2. D. W. Carman, P. S. Krus, and B. J. Matt (2000). ―Constraints and approaches for distributed sensor network security,‖ Technical Report 00-010, NAI Labs, Network Associates, Inc., Glenwood, MD.
3. Idrees S. Kocher, Chee-Onn Chow, Hiroshi Ishii, and Tanveer A. Zia (2013). ―Threat Models and Security Issues in Wireless Sensor Networks‖, International Journal of Computer Theory and Engineering, Vol. 5, No. 5, October 2013
4. I.F. Akyildiz, E.P. Stuntebeck (2006). ―Wireless underground sensor networks: research challenges‖, Ad-Hoc Networks 4, pp. 669–686. 5. Kriti Jain, Upasana Bahuguna (2012). ―Survey on Wireless Sensor Network‖, IJSTM, Vol. 3 Issue 2, pp. 83-90. 6. Jaydip Sen (2012). Security and Privacy Challenges in Cognitive Wireless Sensor Networks. 7. Shio Kumar Singh, M. P. Singh, D. K. Singh (2011). ―A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks‖, International Journal of Computer Trends and Technology-, May to June Issue 2011, ISSN: 2231-2803 8. Dr. Manoj Kumar Jain (2011). ―Wireless Sensor Networks: Security Issues and Challenges‖, IJCIT, vol. 2, issue 1, pp. 62-67. 9. Snehlata Yadav, Kamlesh Gupta, Sanjay Silakari (2010). ―Security issues in wireless sensor networks‖, Journal of Information Systems and Communication, vol. 1, issue 2, pp. 01-06 10. Pooja, Manisha, Dr. Yudhvir Singh (2013). ―Security Issues and Sybil Attack in Wireless Sensor Networks‖, International Journal of P2P Network Trends and Technology, vol. 3, issue 1, pp. 7-13.
11. Mona Sharifnejad, Mohsen Sharifi, Mansoureh Ghiasabadi, Sareh Beheshti (2007). “A Survey on Wireless Sensor Networks Security‖, SETIT 2007, 4th International Conference: Sciences of
12. C. Karlof, D. Wagner (2003). ―Secure routing in wireless sensor networks: Attacks and countermeasures‖, In Proc. of the 1st IEEE Int. Workshop on Sensor Network Protocols and Applications (SNPA’03), pp. 113-127, May 2003 13. X. Wang, W. Gu, K. Schosek, S. Chellappan, D. Xuan (2009). ―Sensor network configuration under physical attacks‖, International Journal of Ad Hoc and Ubiquitous Computing, Vol 4, Issue 3/4, pp. 174-182. 14. A.D. Wood, J.A. Stankovic (2002). ―Denial of service in sensor networks‖, IEEE Computer, Vol. 35, Issue 10, pp. 54-62. 15. Adrian Perrig, John Stankovic, David Wagner (2004). ―Security in Wireless Sensor Networks‖ Communications of the ACM, Page53-57. 16. Chris Karlof, David Wagner (2003). ―Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures‖, AdHoc Networks (elsevier), Page: 299-302. 17. Ian F. Akykildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci (2002). ―A Survey on Sensor Networks‖, IEEE Communication Magazine. 18. John Paul Walters, Zhengqiang Liang, Weisong Shi, Vipin Chaudhaiy (2006). ―Wireless Sensor Network Security: A Survey‖, Security in Distributed, Grid and Pervasive Computing Yang Xiao (Eds), Page3-5. 19. Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong (2006). ―Security in wireless sensor networks: issues and challenges‖ Advanced Communication Technology (ICACT), Page(s):6. 20. Tahir Naeem, Kok-Keong Loo (2009). Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, International Journal of Digital Content Technology and its Applications, Page 89-90 Volume 3, Number 1. 21. Undercoffer, J., Avancha, S., Joshi, A. and Pinkston, J. (2002). ―Security for sensor networks‖. In Proceedings of the CADIP Research Symposium, University of Maryland, Baltimore County, USA,
22. Zia, T.; Zomaya, A. (2006). ―Security Issues in Wireless Sensor Networks‖, Systems and Networks Communications (ICSNC) Page(s):40–40. 23. Xiangqian Chen, Kia Makki, Kang Yen, and Niki Pissinou (2009). Sensor Network Security: A Survey, IEEE Communications Surveys & Tutorials, vol. 11, no. 2,page(s): 52-62. 24. Culler, D. E and Hong, W. (2004). ―Wireless Sensor Networks‖, Communication of the ACM, Vol. 47, No. 6, pp. 30-33. 25. D. Djenouri, L. Khelladi, and N. Badache (2005). ―A Survey of Security Issues in Mobile ad hoc and Sensor Networks,‖ IEEE Commun. Surveys Tutorials, vol. 7, pp. 2-28. 26. S. Schmidt, H. Krahn, S. Fischer, and D. Watjen (2004). ―A Security Architecture for Mobile Wireless Sensor Networks,‖ in Proc. 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS). 27. G. Padmavathi, D. Shanmugapriya (2009). ―A Survey of Attacks, Security Mechanisms and Challenges in WSNs‖, IJCSIS, Vol.4, No. 1 &2, 2009. 28. Eschenaur, L. and Gligor, V.D. (2002). ―A Key-Management Scheme for distributed sensor network‖, Proc. ACM CCS‘02, pp. 41-47.
Corresponding Author Jhujhar Singh*
Research Scholar, Department of Computer Science, OPJS University, Churu, Rajasthan jujharsingh13@gmail.com