A Survey of Recent Research Methodologies for the Security Provisioning in Wireless Sensor Networks

Authors

  • Vanita Verma Research Scholar, Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi-835215(JH), India
  • Vijay Kumar Jha Associate professor, Department of Computer Science and Engineering, Birla Institute of Technology, MesraRanchi-835215(JH), India

Keywords:

Wireless Sensor Network (WSN), WSN security, Authentication, Trust based WSN security, Cryptographic algorithms, Key management, secure routing

Abstract

Introduction: Wireless Sensor Network (WSN) is evolved as one amidst the supremely valuable technologies aimed at the forthcoming future. 

Objectives: Nodes prevalent inside a WSN are exposed to diverse attacks largely as a reason of their nature of utilizations, like restricted storage and as well less-power of sensor nodes (SNs).

Methods: Therefore, providing security aimed at the network becomes a big challenge. The active research areas aimed at WSN security comes with several topics, namely secure routing, secured authentication, key management (KM), intrusion detection (ID) frameworks, trust mechanisms, and secured data aggregation (cluster-centred routing). Diverse methodologies are established in the topics above aimed at providing WSN security. However, it is tough to choose which scheme is best in an explicit WSN application.

Results: So, this work proffers an assessment of current research methods developed for WSN security in the above-mentioned schemes. The latest research topics’ review for WSN’s security is presented with the methodologies utilized, advantages, and limitations that can facilitate the researchers to acquire the finest security solutions aimed at the particular application of WSN.

Conclusion: Finally, the study identifies diverse open research difficulties that should be examined in the forthcoming future.

Downloads

Download data is not yet available.

References

Vinita Daiya, Jemimah Ebenezer, R, Jehadeesan, Security implementation in wireless Sensor network by RF signal obfuscation, Wireless Personal Communications. 2019;106(2):805-827. https://link.springer.com/article/10.1007/s11277-019-06191-7

Alexey G. Finogeev, Anton A. Finogeev, Infor-mation attacks and security in wireless sensor net-works of industrial SCADA systems, Journal of In-dustrial Information Integration. 2017;5:6-16, https,//doi.org/10.1016/j.jii.2017.02.002.

Ghasem Farjamnia, Yusif Gasimov, Cavanshir Kazimov, Review of the techniques against the wormhole attacks on wireless sensor networks, Wireless Personal Communications. 2019;105(4):1561-1584. https://link.springer.com/article/10.1007/s11277-019-06160-0

S. Sathees Babu, K. Balasubadra, Revamping data access privacy preservation method against inside attacks in wireless sensor networks, Cluster Com-puting. 2019;22(1):65-75. https://link.springer.com/article/10.1007%2Fs10586-018-1706-1

Abdul Hamid Md, A.M. Jehad Sarkar, A group-based security scheme for wireless sensor networks, Annals of Telecommunications. 2012;67(9):455-469. http://dx.doi.org/10.1109/GLOCOM.2007.260

P. Ilango, Secure authentication and integrity tech-niques for randomized secured routing in WSN, Wireless Networks. 2015;21(2):443-451. http://dx.doi.org/10.1007/s11276-014-0792-0

Fan Wu, Lili Xu, Saru Kumari, Xiong Li, A privacy-preserving and provable user authentication scheme for wireless sensor networks based on in-ternet of things security, Journal of Ambient Intel-ligence and Humanized Computing, 2017;8(1):101-116. https://link.springer.com/article/10.1007/s12652-016-0345-8

Ashok Kumar Das, A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks, Peer-to-peer Networking and Applications. 2016;9(1):223-244. http://dx.doi.org/10.1007/s12083-014-0324-9

Deepak C. Mehetre, S. Emalda Roslin, Sanjeev J. Wagh, Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust, Cluster Computing. 2019;22(1):1313-1328. https://link.springer.com/article/10.1007%2Fs10586-017-1622-9

E. Suryaprabha, N.M. Saravana Kumar, Enhance-ment of security using optimized DoS (denial-of-service) detection algorithm for wireless sensor network, Soft Computing. 2020;24:10681–10691. https,//doi.org/10.1007/s00500-019-04573-4.

Sunil Gupta, Harsh K. Verma, A.L. Sangal, Effi-cient security mechanism to counter the malicious attack in wireless sensor networks, CSI transactions on ICT. 2014;2(1):35-41. http://dx.doi.org/10.1007/s40012-014-0042-8

Xiang Gu, Jin Wang, Jianlin Qiu, Zhengzheng Jiang, Self-recommendation mechanism in trust calculation among nodes in WSN, Wireless Personal Communications. 2017;97(3):3705-3723. https://link.springer.com/article/10.1007/s11277-017-4694-1

Gautam M. Borkar, Leena H. Patil, Dilip Dalgade, Ankush Hutke, A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN a data mining concept, Sustainable Compu-ting: Informatics and Systems. 2019;23:120-135, https,//doi.org/10.1016/j.suscom.2019.06.002.

Aykut Karakaya, Sedat Akleylek, A survey on se-curity threats and authentication approaches in wireless sensor networks, In 6th international sym-posium on digital forensic and security (ISDFS), IEEE. 2018. https://doi.org/10.1109/ISDFS.2018.8355381

Bhawna Narwal, Amar Kumar Mohapatra, A Sur-vey on security and authentication in wireless body area networks. Journal of Systems Architecture. 2020;113:1-57. https://doi.org/10.1016/j.sysarc.2020.101883

Rosheen Qazi, Kashif Naseer Qureshi, Faisal Bashir, Najam Ul Islam, Saleem Iqbal, Arsalan Ar-shad, Security protocol using elliptic curve cryptog-raphy algorithm for wireless sensor networks, Jour-nal of Ambient Intelligence and Humanized Com-puting. 2021;12:547-566. https://link.springer.com/article/10.1007/s12652-020-02020-z

A. Vaniprabha, P. Poongodi, Augmented light-weight security scheme with access control model for wireless medical sensor networks, Cluster Computing. 2019;22(5):12495-12505. https://link.springer.com/article/10.1007%2Fs10586-017-1669-7

Chandra Sekhar Vorugunti, Bharavi Mishra, Ruhul Amin, Rakesh P. Badoni, Mrudula Sarvabhatla, Dheerendra Mishra, Improving security of light-weight authentication technique for heterogeneous wireless sensor networks, Wireless Personal Com-munications. 2017;95(3):3141-3166. https://link.springer.com/article/10.1007/s11277-017-3988-7

Huei-Wen Ferng, Nguyen Minh Khoa, On security of wireless sensor networks, a data authentication protocol using digital signature, Wireless Networks. 2017;23(4): 1113-1131. https://link.springer.com/article/10.1007/s11276-016-1208-0

Dheerendra Mishra, Pandi Vijayakumar, Venka-tasamy Sureshkumar, Ruhul Amin, S.K. Hafizul Is-lam, Prosanta Gope, Efficient authentication proto-col for secure multimedia communications in IoT-enabled wireless sensor networks, Multimedia Tools and Applications. 2018;77(14):18295-18325. https://link.springer.com/article/10.1007/s11042-017-5376-4

Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian, An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks, Peer-to-peer Networking and Applications. 2019;8(6):1070-1081. http://dx.doi.org/10.1007/s12083-014-0285-z

Mostafa H. Dahshan, Robust data authentication for unattended wireless sensor networks, Telecommunication Systems. 2019;66(2):181-196. https://link.springer.com/article/10.1007/s11235-017-0281-8

Lina Yang, Shining Li, Zenggang Xiong, Meikang Qiu, HHT-based security enhancement approach with low overhead for coding-based reprogramming protocols in wireless sensor networks, Journal of Signal Processing Systems. 2019;89(1):13-25. https://link.springer.com/article/10.1007/s11265-016-1149-y

Haitao Yu, Liejun Wang, A security-enhanced mu-tual authentication scheme with privacy protected in wireless sensor networks, Cluster Computing. 2019;22(3):7389-7399. https://link.springer.com/article/10.1007%2Fs10586-017-1575-z

Fan Wu, Lili Xu, Saru Kumari, Xiong Li, A privacy-preserving and provable user authentication scheme for wireless sensor networks based on in-ternet of things security, Journal of Ambient Intel-ligence and Humanized Computing. 2017;8(1):101-116. https://link.springer.com/article/10.1007/s12652-016-0345-8

Hong Yu, Jingsha He, Ting Zhang, Peng Xiao, Yuqiang Zhang, Enabling end-to-end secure com-munication between wireless sensor networks and the Internet, World Wide Web. 2013;16(4):515-540. http://dx.doi.org/10.1007/s11280-012-0194-0

Bo Sung Kim, Joo Seok Song,. Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks, EURASIP Journal on Wireless Communications and Networking. 2019;1:1-16. https://jwcn-eurasipjour-nals.springeropen.com/articles/10.1186/s13638-019-1470-9

Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Provably secure bi-ometric based authentication and key agreement protocol for wireless sensor networks, Journal of Ambient Intelligence and Humanized Computing. 2018;9(4):875-895. https://link.springer.com/article/10.1007/s12652-017-0474-8

Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, A mutual authentication frame-work for wireless medical sensor networks, Journal of medical systems. 2017;41(5) ()1-19. https://link.springer.com/article/10.1007/s10916-017-0720-9

Amir Hosein Adavoudi-Jolfaei, Maede Ashouri-Talouki, Seyed Farhad Aghili, Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks, Peer-to-Peer Networking and Applications. 2019;12(1):43-59. https://link.springer.com/article/10.1007/s12083-017-0627-8

Jian-Jun Yuan, An enhanced two-factor user au-thentication in wireless sensor networks, Telecom-munication Systems. 2014;55(1),:105-113. https://link.springer.com/article/10.1007/s11235-013-9755-5

Alma E Guerrero-Sanchez, Edgar A. Rivas-Araiza, Jose Luis Gonzalez-Cordoba, Manuel Toledano-Ayala, Andras Takacs, Blockchain mechanism and symmetric encryption in a wireless sensor network, Sensors. 2020;20(10):1-20. https://www.mdpi.com/1424-8220/20/10/2798#

T. Lalitha, S. Jayaprabha, Mobility based key man-agement security scheme for wireless sensor net-works, Wireless Personal Communications. 2016;87(2):349-367. https://link.springer.com/article/10.1007/s11277-015-2872-6

Simone Soderi, Acoustic-based security a key ena-bling technology for wireless sensor networks, In-ternational Journal of Wireless Information Net-works. 2020;27(1):45-59. https://link.springer.com/article/10.1007/s10776-019-00473-4

Khaled Hamouid, Salwa Othmen, Amine Barkat, LSTR, lightweight and secure tree-based routing for wireless sensor networks, Wireless Personal Communications. 2020;112:1479-15011. https://link.springer.com/article/10.1007/s11277-020-07111-w

Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang, Anonymous three-factor authenticated key agreement for wireless sensor networks, Wireless Networks. 2019;25(4):1461-1475. https://link.springer.com/article/10.1007/s11276-017-1604-0

Mohammad Sadegh Yousefpoor, Hamid Barati, DSKMS, A dynamic smart key management sys-tem based on fuzzy logic in wireless sensor net-works, Wireless Networks. 2020;26(4):2515-2535. https://link.springer.com/article/10.1007/s11276-019-01980-1

Tianshu Wang, Kongfa Hu, Xichen Yang, Gongxuan Zhang, Yongli Wang, A trust enhance-ment scheme for cluster-based wireless sensor net-works, The Journal of Supercomputing. 2019;75(5):2761-2788. https://link.springer.com/article/10.1007/s11227-018-2693-y

Tong Zhang, Lisha Yan, Yuan Yang, Trust evalua-tion method for clustered wireless sensor networks based on cloud model, Wireless Networks. 2018;24(3):777-797. https://link.springer.com/article/10.1007/s11276-016-1368-y

Xueqiang Yin, Shining Li, Trust evaluation model with entropy-based weight assignment for mali-cious node’s detection in wireless sensor networks, EURASIP Journal on Wireless Communications and Networking. 2019;1:1-10. https://jwcn-eurasipjour-nals.springeropen.com/articles/10.1186/s13638-019-1524-z

Swaminathan Ramesh, C. Yaashuwanth. Enhanced approach using trust based decision making for secured wireless streaming video sensor networks, Multimedia tools and applications. 2020;79(15):10157-10176. https://link.springer.com/article/10.1007/s11042-019-7585-5

Osama Al Farraj, Ahmad AlZubi, Amr Tolba, Trust-based neighbor selection using activation function for secure routing in wireless sensor net-works, Journal of Ambient Intelligence and Hu-manized Computing. 2018. https,//doi.org/10.1007/s12652-018-0885-1.

M.S. Sumalatha, V. Nandalal, An intelligent cross layer security based fuzzy trust calculation mecha-nism (CLS-FTCM) for securing wireless sensor network (WSN), Journal of Ambient Intelligence and Humanized Computing. 2020;12:1-15. https://link.springer.com/article/10.1007/s12652-020-01834-1

A. Ranjith Kumar, A. Sivagami, Fuzzy based mali-cious node detection and security-aware multipath routing for wireless multimedia sensor network, Multimedia Tools and Applications. 2020;79:14031-14051. https://link.springer.com/article/10.1007/s11042-020-08631-0

V.R. Sarma Dhulipala, N. Karthik, R.M. Chandra-sekaran, A novel heuristic approach based trust worthy architecture for wireless sensor networks, Wireless personal communications. 2013;70(1):189-205. https://link.springer.com/article/10.1007/s11277-012-0688-1

P.N. Renjith, Towards secure data forwarding with ANFIS and trust evaluation in wireless sensor net-works, Wireless Personal Communications. 2020;114(1):765-781. https://link.springer.com/article/10.1007/s11277-020-07392-1

S. Vidhya, T. Sasilatha, Secure data transfer using multilayer security protocol with energy power consumption AODV in wireless sensor networks, Wireless Personal Communications. 2018;103(4):3055-3077. https://link.springer.com/article/10.1007/s11277-018-5994-9

M. Yuvaraju, K.A. Pranesh, Energy proficient hy-brid secure scheme for wireless sensor networks, Wireless Personal Communications. 2020;117:747–767. https,//doi.org/10.1007/s11277-020-07895-x.

Jie Cui, Lili Shao, Hong Zhong, Yan Xu, Lu Liu, Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor net-works, Peer-to-Peer Networking and Applications. 2018;11(5):1022-1037. https://link.springer.com/article/10.1007/s12083-017-0581-5

Hiren Kumar Deva Sarma, Avijit Kar, Rajib Mall, A hierarchical and role based secure routing proto-col for mobile wireless sensor networks, Wireless Personal Communications. 2016;90(3):1067-1103. https://link.springer.com/article/10.1007/s11277-016-3379-5

R.S. Raghav, Kalaipriyan Thirugnansambandam, Dinesh Kumar Anguraj, Beeware routing scheme for detecting network layer attacks in wireless sen-sor networks, Wireless Personal Communications. 2020;112(4):2439-2459. https://link.springer.com/article/10.1007/s11277-020-07158-9

Michele Tortelli, Alessandra Rizzardi, Sabrina Sicari, Luigi Alfredo Grieco, Gennaro Boggia, Alberto Coen-Porisini, S2 DCC, Secure selective dropping congestion control in hybrid wireless multimedia sensor networks, Wireless Networks. 2018;24(1):309-328. http://dx.doi.org/10.1007/s11276-016-1332-x

Jayanthi Ramasamy, John Singh Kumaresan, Image encryption and cluster based framework for secured image transmission in wireless sensor networks, Wireless Personal Communications. 2020;112:355-1368. https,//doi.org/10.1007/s11277-020-07106-7.

P. Brindha, A. Senthilkumar, Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks, Peer-to-Peer Networking and Applications. 2019;13:1142-1151. https,//doi.org/10.1007/s12083-019-00813-4.

Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee, A novel intrusion detection framework for wireless sensor networks, Personal and ubiquitous computing. 2013;17(5):907-919. https://link.springer.com/article/10.1007/s00779-012-0529-y

Xin Xiao, Ruirui Zhang, Study of immune-based intrusion detection technology in wireless sensor networks, Arabian Journal for Science and Engi-neering. 2017;42(8):3159-3174. https://link.springer.com/article/10.1007/s13369-017-2426-1

Somnath Sinha, Aditi Paul, Neuro-fuzzy based in-trusion detection system for wireless sensor net-work, Wireless Personal Communications. 2020;114(1):835-851. https://link.springer.com/article/10.1007/s11277-020-07395-y

C. Umarani, S. Kannan, Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network, Peer-to-Peer Networking and Ap-plications. 2020;13(3):752-761. https://link.springer.com/article/10.1007/s12083-019-00781-9

Turki Ali Alghamdi, Convolutional technique for enhancing security in wireless sensor networks against malicious nodes, Human-centric Computing and Information Sciences. 2019;9(1):1-10. http://dx.doi.org/10.1186/s13673-019-0198-1

Majid Alotaibi, Security to wireless sensor networks against malicious attacks using Hamming residue method, EURASIP Journal on Wireless Communications and Networking. 2019. https://doi.org/10.1186/s13638-018-1337-5

T.D. Ovasapyan, Denis V. Ivanov, Security provi-sion in wireless sensor networks on the basis of the trust model, Automatic Control and Computer Sci-ences. 2018;52(8):1042-1048. https://link.springer.com/article/10.3103/S0146411618080205

Shi Dong, Xin-gang Zhang, Wen-gang Zhou, A security localization algorithm based on DV-hop against sybil attack in wireless sensor networks, Journal of Electrical Engineering & Technology. 2020;15(2):919-926. https://link.springer.com/article/10.1007/s42835-020-00361-5

Ashwinth Janarthanan, Dhananjay Kumar, R. Remo Antony, C.B. Divya Parvathe, IADF security, Insider attack detection using fuzzy logic in wireless multimedia sensor networks, Soft Computing. 2020;24(4):1-10. https://link.springer.com/article/10.1007/s00500-020-04764-4

K. Nirmal Raja, M. Marsaline Beno, On securing wireless sensor network-novel authentication scheme against DOS attacks, Journal of medical systems. 2014;38(10):1-5. https://link.springer.com/article/10.1007/s10916-014-0084-3

Yuping Zhou, Zhenjie Huang, Juan Wang, Rufeng Huang, Dongmei Yu, An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks, EURASIP Journal on Wireless Communications and Network-ing. 2014;1:1-12. http://dx.doi.org/10.1186/1687-1499-2014-163

Sujesh P. Lal, P.M. Joe Prathap, A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks, Journal of Ambient Intelligence and Humanized Computing. 2020;12(5):5589–5597 https://link.springer.com/article/10.1007/s12652-020-02079-8

Rudra Pratap Ojha, Pramod Kumar Srivastava, GoutamSanyal, Nishu Gupta, Improved model for the stability analysis of wireless sensor network against malware attacks, Wireless Personal Com-munications. 2021;116(3):2525-2548. https://link.springer.com/article/10.1007/s11277-020-07809-x

Mojtaba Jamshidi, Ehsan Zangeneh, Mehdi Esnaashari, Aso Mohammad Darwesh, Mohammad Reza Meybodi, A novel model of sybil attack in cluster-based wireless sensor networks and propose a distributed algorithm to defend it, Wireless Personal Communications. 2019;105(1):145-173. https://doi.org/10.1007/S11277-018-6107-5

G. Keerthana, P. Anandan, N. Nandhagopal, En-hancing the robustness and security against various attacks in a scale, free network, Wireless Personal Communications, 2020;117:3029–3050. https://link.springer.com/article/10.1007/s11277-020-07356-5

Shailendra Aswale, Vijay R. Ghorpade, LQEAR, link quality and energy-aware routing for wireless multimedia sensor networks, Wireless Personal Communications. 2017;97(1):1291-1304. https://doi.org/10.1007/s11277-017-4566-8

Daojing He, Sammy Chan, Shaohua Tang, Mohsen Guizani, Secure data discovery and dissemination based on hash tree for wireless sensor networks, IEEE transactions on wireless communications. 2013;12(9):4638-4646. https://doi.org/10.1109/TWC.2013.090413.130072

Downloads

Published

24.03.2024

How to Cite

Verma, V. ., & Jha, V. K. . (2024). A Survey of Recent Research Methodologies for the Security Provisioning in Wireless Sensor Networks. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 412–426. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5265

Issue

Section

Research Article