Security of Wireless Sensor Networks for Monitoring System
[1]
Salah Talha Babiker, Computer Engineering Department, University of Taif, College of Computers & IT, Taif City, Kindom of Saudi Arabia.
[2]
Abdel Fatah M. Bashir, Computer Engineering Department, University of Taif, College of Computers & IT, Taif City, Kindom of Saudi Arabia.
Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors needed to be considered are the coverage area, mobility, power consumption, communication capabilities etc. These networks are likely to be composed of hundreds, and potentially thousands of tiny sesor nodes, functioning autonomously, and in many cases, witnhout access to renewable energy resources. Cost constraints and the need for ubiquitous, invisible deployments will result in small sized, resource-constrained sensor nodes. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. We propose some of the security goal for Wireless Sensor Network. Further, security being vital to the acceptance and use of sensor networks for many applications.
Wireless Sensor Network, Applications, Design Issues, Routing Protocols, Simulator Tool and Security
[1]
V. Arnaudov, “Unified Management of Heterogeneous Sensor Networks In the Atlantis Framework”, Department of Computer Science, Brown University. S. Tilak, N. Abu-Ghazaleh, and W. Heinzelman, A taxonomy of Wireless Micro-senor Network Models, ACM SIGMOBILE, Mobile Computing and Communications Review, vol.6, issue: 2, pp. 28-36, April, 2002. [Available from the World Wide Web (WWW): http://www.cs.binghamton.edu/ nael/research/papers/taxonomy.pdf].
[2]
J. N. Al-Kamal, and A. E. Kamal, Routing Techniques in Wireless Sensor Networks, A survey, Wireless Communications, IEEE, vol. 11, pp. 6-28, 2004. [See also IEEE Personal Communications].
[3]
D. Puccinelli and M. Haenggi, “Wireless sensor networks: applications and challenges of ubiquitous sensing,” IEEE Circuits and Systems Magazine, vol. 5, no. 3, pp. 19–31, 2005.K. Akkaya, and M. Younis, A survey on Routing Protocols for Wireless Sensor Networks, Elsevier Ad Hoc network Journal, vol.3, pp.325-349, 2005.
[4]
K. Holger, W. Andreas,A short Survey of Wireless Sensor Networks, Technical Report [TKN Technical Report TKN-03-018], Berlin, October, 2003. [Available: http://www.tkn.tu-berlin.de/publications/papers/ TechReport03018.pdf].
[5]
A.A. Ahmed, H. Shi, Y. Shang, A Survey on Network Protocols for Wireless Sensor Networks, In Proc. of International Conference on Information Technology: Research and Education (ITRE03), pp. 301 - 305, 11-13 Aug. 2003.
[6]
D. Braginsky, D. Estrin, “Rumor Routing Algorithm for Sensor Networks”, Proceedings of the First Workshop on Sensor Networks and Applications (WSNA), Atlanta, GA, October 2002.
[7]
S. C. Ergen and P. Varaiya, “TDMA scheduling algorithms for wireless sensor networks,” Wireless Networks, vol. 16, no. 4, pp. 985–997, 2010.
[8]
Sharma and S K Jena, "A Survey on Secure Hierarchical Routing Protocols in Wireless Sensor Networks", ICCCS’11 February 2011.
[9]
Fan, S., Zhang, L., Ren, Y.: Approximation algorithms for link scheduling with physical interference model in ireless multi-hop networks. CoRR abs/0910.5215 (2009).
[10]
Raymond, R.C. Marchany, M.I. Brownfield, and S.F. Midkiff. Effects of Denial-of-Sleep Attacks on Wireless Sensor Network MAC Protocols. IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 367-380, 2009.