Affiliation:
1. Institute of Information and Communication Technology, University of Sindh, Jamshoro, Pakistan
2. Institute of Mathematics and Computer Science, University of Sindh, Jamshoro, Pakistan
3. Department of Information Technology, University of Sindh, Dadu Campus, Pakistan
Abstract
Wireless sensor networks (WSNs) are comprised of large collections of small devices having low operating power, low memory space, and limited processing capabilities referred to as sensor nodes. The nodes in WSNs are capable of sensing, recording, and monitoring environmental conditions. Nowadays, a variety of WSNs applications can be found in many areas such as in healthcare, agriculture, industries, military, homes, offices, hospitals, smart transportation, and smart buildings. Though WSNs offer many useful applications, they suffer from many deployment issues. The security issue is one of them. The security of WSNs is considerable because of the use of unguided medium and their deployment in harsh, physically unprotected, and unattended environments. This chapter aims to discuss various security objectives and security attacks on WSNs and summarizes the discussed attacks according to their categories. The chapter also discusses different security protocols presented to prevent, detect, and recover the WSNs from various security attacks.
Reference66 articles.
1. Almulhim, M., & Zaman, N. (2018). Proposing secure and lightweight authentication scheme for IoT based E-health applications. Paper presented at the 2018 20th International Conference on Advanced Communication Technology (ICACT).
2. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT)
3. Alsoufi, D., Elleithy, K. M., Abuzaghleh, T., & Nassar, A. (2012). Security in wireless sensor networks-Improving the leap protocol. Academic Press.
4. Security Issues and Attacks in Wireless Sensor Network.;Anwar;World Applied Sciences Journal,2014
5. Bekara, C., & Laurent, M. (2007). Defending against nodes replication attacks on wireless sensor networks. Paper presented at the SAR-SSI 2007: 2nd Conference on Security in Network Architectures and Information Systems.