Thesis on evaluating security in wsn

Chapter 15 Wireless Sensor Network Security

Thesis on evaluating security in wsn

This is an open access article distributed under the Creative Commons Attribution Licensewhich permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract Security in Wireless Sensor Network has become a hot research topic due to their wide deployment and the increasing new runtime attacks they are facing.

We observe that traditional security protocols address conventional security problems and cannot deal with dynamic attacks such as sinkhole dynamic behavior.

Moreover, they use resources, and limit the efficient use of sensor resources and inevitably the overall network efficiency is not guaranteed.

Therefore, the requirements of new security mechanisms must be addressed in a flexible manner. Indeed, there is a lack of generic security adaptation protocols to deal with extremely dynamic security conditions and performances in a context of Wireless Sensor Network where reliability is a critical criterion for many applications.

This paper proposes our Security Adaptation Reference Monitor for Wireless Sensor already validated in proximity-based wireless network. It is based on an autonomic computing security looped system, which fine-tunes security means based on the monitoring of the context.

Thesis on evaluating security in wsn simulations using agent-based approach have been conducted to verify the performance of our system in the case of sensor network in the presence of sinkhole attacks. The results clearly show that we are efficient in terms of survivability, overall network utilization, and power consumption.

Introduction A Wireless Sensor Network WSN consists of a large number of low-power, and multifunction sensor nodes that communicate as one hope, multihop, or cluster-based models to send data to one or many base stations BSs through wireless links [ 1 ].

These BSs are highly enriched with a large amount of energy. WSNs represent a challenging and an interesting research area due to the constraints involved.

The small size of the sensors and the networking capability increase the appeal of WSNs for use in daily life. Distributed computing and routing could be well applied in case of multihope and cluster-based models.

Updating Cart........ Please Wait........

These capabilities enable WSNs to provide significant advantages for many applications that were not possible in the past.

The WSN is built by deploying the sensing nodes in the area of interest to form a self-configured network and start acquiring the necessary information. The unique properties of WSNs increase flexibility and reduce user involvement in operational tasks. Battlefield surveillance, forest fire detection, and smart environments are some well-known applications.

Since the nodes in WSN are battery operated and have a limited lifetime to operate, there is a growing need of energy aware security algorithm performing low computational load to preserve the network lifetime. WSN involves a huge number of interactions with its environment where security is also difficult to ensure against dynamic changing attacks.

Indeed, it is highly challenging to maintain the overall security at the highest level due to the configuration complexity and the runtime changing context. In addition to the security challenge, data transfer in WSNs is more susceptible to loss due to the nature of sensors power and processing, etc.

Moreover, sinkhole attackers by means of dynamic changing behavior skyrocket the packet loss. Therefore, the most crucial constraint in WSN which is reliability is not at all guaranteed.

In general, most applications cannot operate in case of high packet loss. Thus, reliability, being a key issue in sensor networks, is definitely one of the important criteria to evaluate the quality of WSNs.

Accordingly, the concept that must cope with this new security challenge in terms of availability has to be based on dynamic adaptation security system to satisfy an overall performance such as network reliability and energy loss.

In this paper, we will apply it for WSN under sinkhole attacks. In Section 2we survey other related works. Section 3 gives the problem statement, highlighting the motivation of our work.

Section 5 explains our experiments and simulation implementation to validate SARM in the case of sensor network. Our simulation results and performance analysis are presented in Section 6 and Section 7 concludes our paper.

Related Work The concept of adaptive security in wireless network is used to mitigate the consequences of a substantial number of runtime threats, when it does not completely eliminate them. Many systems rated at the higher levels of security for data are implemented according to the reference monitor concept.

Thesis on evaluating security in wsn

First introduced by Anderson [ 3 ], a reference monitor is a concept that has proven to be a useful tool for computer security experts. It is the only effective tool known for describing the abstract requirements of secure system design and implementation.

Reference [ 4 ] has also proposed an adaptive security application in wireless ad hoc and sensor networks, where network conditions play a role in choosing relevant security mechanisms at runtime. Consequently, a suitable security service is must be provisioned in a progressive way to achieve the maximum overall security services against network performance services throughout the course of sensor networks operation.

Peer Reviewed Journal

Security in sensor networks is complicated by the constrained capabilities of the sensor node hardware and the deployment properties [ 6 — 8 ].Abstract The future Internet will be an IPv6 network interconnecting traditional computers and a large number of smart object or networks such as Wireless Sensor Networks (WSNs).

evaluation-of wireless-sensor-network-simulators application-driven-security-in-wireless-sensor-networks-thesis mobile-robots-using wireless-sensor-network wireless sensor networks soil monitoring Application of wireless sensor networks with GIS on the soil moisture distribution mapping.

The issues of performance in the wireless sensor networks in many literatures, yet more studies are being done on the performance because the user and application needs are keep increasing,to encounter the challenges of the performance issues are studied here by digging out the routing protocols performance in WSN.

Reliable Wireless Sensor Networks in Smart Homes Master of Science Thesis in Programme Computer Systems and Networks wireless sensor networks where sleep cycles are utilized in an e˛ort to keep the overall Moreover, evaluation and e˛orts on fault tolerance mechanisms for WSN standards IEEE and ZigBee have been presented [ DEF CON The Panel.

Mike Petruzzi (wiseacre), Senior Cyber Security Penetration Tester Nikita Kronenberg Not a Security Researcher, DEF CON PushPin Plug Russ Rogers Chief of Operations, DEF CON.

Performance Evaluation of Security Solutions for Wireless Sensor Networks - CORE

DEF CON has changed for the better since the days at the Alexis Park. Thesis/Starred Paper Committee: Susantha Herath, Chairperson Lynn Collen mechanisms to provide security in wireless sensor networks. In the case of distributed sensors, it is a challenging issue to assess the trustworthiness even though in many progressively utilized in numerous application areas, evaluating the trustworthiness of.

Wireless Sensor Network Thesis