Asian Journal of Information Technology

Year: 2021
Volume: 20
Issue: 1
Page No. 1 - 13

Wireless Sensor Networks: A Survey on Recent Developments in Sensors Security

Authors : A. Kathirvel and M. Subramaniam

References

Abduvaliyev, A., A.S.K. Pathan, J. Zhou, R. Roman and W.C. Wong, 2013. On the vital areas of intrusion detection systems in wireless sensor networks. Commun. Surv. Tutorials IEEE., 15: 1223-1237.
CrossRef  |  Direct Link  |  

Alsaedi, N., F. Hashim, A. Sali and F.Z. Rokhani, 2017. Detecting sybil attacks in clustered wireless sensor networks based on Energy Trust System (ETS). Comput. Commun., 110: 75-82.
CrossRef  |  Direct Link  |  

Amicarelli, A., G. Leuzzi and P. Monti, 2012. Lagrangian micromixing models for concentration fluctuations: An overview. Am. J. Environ. Sci., 8: 577-590.
Direct Link  |  

Arockiasamy, J.P., L.E. Benjamin and R.U. Vaidyanathan, 2012. Performance evaluation of multicrypt encryption mechanism. Am. J. Applied Sci., 9: 1849-1861.
CrossRef  |  Direct Link  |  

Bai, R. and M. Sighal, 2006. DOA: DSR over AODV routing for mobile ad hoc networks. IEEE Trans. Mobile Comput., 5: 1403-1416.
CrossRef  |  Direct Link  |  

Bai, R. and M. Singhal, 2005. Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks. Proceedings of the 8th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 2005, ACM, New York, USA., pp: 53-62.

Bleda, A.L., F.J. Fernandez-Luque, A. Rosa, J. Zapata and R. Maestre, 2017. Smart sensory furniture based on WSN for ambient assisted living. IEEE. Sens. J., 17: 5626-5636.
CrossRef  |  Direct Link  |  

Bo, S., X. Shan, K. Wu and Y. Xiao, 2013. Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Syst. J., 7: 13-25.
CrossRef  |  Direct Link  |  

Briesemeister, L. and G. Hommel, 2000. Role-based multicast in highly mobile but sparsely connected ad hoc networks. Proceedings of the 2000 1st Annual Workshop on Mobile and Ad Hoc Networking and Computing MobiHOC (Cat. No. 00EX444), August 11, 2000, IEEE, Boston, Massachusetts, pp: 45-50.

Broch, J., D.A. Maltz, D.B. Johnson, Y.C. Hu and J. Jetcheva, 1998. A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, October 1998, ACM, Dallas, Texas, USA., pp: 85-97.

Bu, S., F.R. Yu, X.P. Liu and H. Tang, 2011. Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE. Trans. Wirel. Commun., 10: 3064-3073.
CrossRef  |  Direct Link  |  

Chen, J., J. Li and T.H. Lai, 2013. Energy-efficient intrusion detection with a barrier of probabilistic sensors: Global and local. IEEE. Trans. Wirel. Commun., 12: 4742-4755.
CrossRef  |  Direct Link  |  

Chen, T.W. and M. Gerla, 1998. Global state routing: A new routing scheme for ad-hoc wireless networks. Proceedings of the International Conference on Communications, Volume 1, Jun 7-11, 1998, Atlanta, GA., pp: 171-175.

Chiang, C.C., M. Gerla and L. Zhang, 1998. Forwarding Group Multicast Protocol (FGMP) for multihop, mobile wireless networks. Cluster Comput., 1: 187-196.
CrossRef  |  Direct Link  |  

Deif, D.S. and Y. Gadallah, 2017. An ant colony optimization approach for the deployment of reliable wireless sensor networks. IEEE. Access, 5: 10744-10756.
CrossRef  |  Direct Link  |  

Feng-Yu, L., C. Guo-Hua and L. Xiao-Ding, 2007. Ad hoc networks security mechanism based on CPK. Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007), December 15-19, 2007, IEEE, Heilongjiang, China, pp: 522-525.

Guo, Q., X. Li, G. Xu and Z. Feng, 2017. MP-MID: Multi-protocol oriented middleware-level intrusion detection method for wireless sensor networks. Future Gener. Comput. Syst., 70: 42-47.
CrossRef  |  Direct Link  |  

Hamela, K. and A. Kathirvel, 2018. EIMO-ESOLSR: Energy efficient and security based model for OLSR routing protocol in mobile Ad Hoc network. IET Commun., 5: 1-9.

Han, G., J. Jiang, W. Shen, L. Shu and J. Rodrigues, 2013. IDSEP: A novel intrusion detection scheme based on energy prediction in cluster-based wireless sensor networks. Inf. Secur. IET., 7: 97-105.
CrossRef  |  Direct Link  |  

Han, G., X. Li, J. Jiang, L. Shu and J. Lloret, 2015. Intrusion detection algorithm based on neighbor information against sinkhole attack in wireless sensor networks. Comput. J., 58: 1280-1292.
CrossRef  |  Direct Link  |  

Harno, H.G. and I.R. Petersen, 2014. Synthesis of linear coherent quantum control systems using a differential evolution algorithm. IEEE. Trans. Automatic Control, 60: 799-805.
CrossRef  |  Direct Link  |  

Hoyle, B., M.M. Rau, K. Paech, C. Bonnett, S. Seitz and J. Weller, 2015. Anomaly detection for machine learning redshifts applied to SDSS galaxies. Monthly Notices Royal Astron. Soc., 452: 4183-4194.
CrossRef  |  Direct Link  |  

Huang, K., Q. Zhang, C. Zhou, N. Xiong and Y. Qin, 2017. An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE. Trans. Syst. Man Cybern. Syst., 47: 2704-2713.
CrossRef  |  Direct Link  |  

Jin, X., J. Liang, W. Tong, L. Lu and Z. Li, 2017. Multi-agent trust-based intrusion detection scheme for wireless sensor networks. Comput. Electr. Eng., 59: 262-273.
CrossRef  |  Direct Link  |  

Joa-Ng, M. and I.T. Lu, 1999. A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks. IEEE J. Selected Areas Commun., 17: 1415-1425.
CrossRef  |  

Johnson, D.B. and D.A. Maltz, 1996. Dynamic source routing in Ad hoc wireless networks. Mobile Comput., 353: 153-181.
CrossRef  |  Direct Link  |  

Jokhio, S.H., I.A. Jokhio and A.H. Kemp, 2012. Node capture attack detection and defence in wireless sensor networks. IET. Wirel. Sensor Syst., 2: 161-169.
CrossRef  |  Direct Link  |  

Jokhio, S.H., I.A. Jokhio and A.H. Kemp, 2013. Light-weight framework for security-sensitive wireless sensor networks applications. IET Wirel. Sens. Syst., 3: 298-306.
CrossRef  |  Direct Link  |  

Kalkha, H., H. Satori and K. Satori, 2016. Performance evaluation of AODV and LEACH routing protocol. Adv. Inf. Technol. Theory Appl., 1: 112-118.
Direct Link  |  

Kathirvel, A. and R. Srinivasan, 2011. Double umpiring system for security of mobile Ad Hoc network. Int. J. Wireless Network Applic., 1: 151-162.

Kathirvel, A. and R. Srinivasan, 2011. ETUS: An enhanced triple umpiring system for security and performance improvement of mobile Ad hoc networks. Int. J. Network Manage., 21: 341-359.
CrossRef  |  Direct Link  |  

Kathirvel, A. and R. Srinivasan, 2011. ETUS: Enhanced triple umpiring system for security and robustness of wireless mobile Ad hoc networks. Int. J. Commun. Networks Distrib. Syst., 7: 153-187.
CrossRef  |  Direct Link  |  

Kathirvel, A., 2011. Single umpiring system for security and performance improvement in mobile Ad Hoc networks. IASMS J. Bus. Spectrum, 4: 30-41.

Kumar, A.V., S.K. Mohideen and A. Kathirvel, 2015. Performance enhanced reverse AODV routing protocol for MANETs. Middle-East J. Scient. Res., 23: 1720-1726.
Direct Link  |  

Kumar, J.J. and A. Kathirvel, 2018. Optimum power management in mobile ad-hoc networks. J. Eng. Sci. Technol., 13: 1805-1815.
Direct Link  |  

Kumar, J.M.S.P.J., A. Kathirvel, N. Kirubakaran, P. Sivaraman and M. Subramaniam, 2015. A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP J. Wireless Commun. Networking, Vol. 2015. 10.1186/s13638-015-0370-x

Li, J., J. Jannotti, J.D. Couto, D.R. Karger and R. Morris, 2000. A scalable location service for geographic Ad hoc routing. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, Massachusetts, United States, pp: 120-130.

Lin, K., T. Xu, J. Song, Y. Qian and Y. Sun, 2016. Node scheduling for all-directional intrusion detection in SDR-based 3D WSNs. IEEE. Sens. J., 16: 7332-7341.
CrossRef  |  Direct Link  |  

Liu, W., C.C. Chiang, H. Wu and C. Gerla, 1997. Routing in clustered multihop, mobile wireless networks with fading channel. Proc. IEEE Sicon., 97: 197-212.
Direct Link  |  

Matyas, V. and J. Kur, 2013. Conflicts between intrusion detection and privacy mechanisms for wireless sensor networks. IEEE. Secur. Privacy, 11: 73-76.
CrossRef  |  Direct Link  |  

Megha, A. and Y.K. Jain, 2011. Grayhole attack and prevention in mobile Ad hoc network. Int. J. Comput. Appl., 27: 21-26.
CrossRef  |  Direct Link  |  

Mrugala, K., N. Tuptuk and S. Hailes, 2017. Evolving attackers against wireless sensor networks using genetic programming. IET Wirel. Sens. Syst., 7: 113-122.
CrossRef  |  Direct Link  |  

Peng, J., T. Liu, H. Li and B. Guo, 2013. Energy-efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks. Intl. J. Distrib. Sens. Netw., Vol. 2013.

Perkins, C.E. and E.M. Royer, 1999. Ad-hoc on-demand distance vector routing. Proceedings 2nd IEEE Workshop on Mobile Computing Systems and Applications WMCSA’99, February 25-26, 1999, IEEE, New Orleans, Louisiana, pp: 90-100.

Pintea, C.M., P.C. Pop and I. Zelina, 2016. Denial jamming attacks on wireless sensor network using sensitive agents. Logic J. IGPL., 24: 92-103.
CrossRef  |  Direct Link  |  

Rassam, M.A., A. Zainal and M.A. Maarof, 2013. Advancements of data anomaly detection research in wireless sensor networks: A survey and open issues. Sens., 13: 10087-10122.
CrossRef  |  PubMed  |  Direct Link  |  

Raza, F., S. Bashir, K. Tauseef and S.I. Shah, 2015. Optimizing nodes proportion for intrusion detection in uniform and Gaussian distributed heterogeneous WSN. Proceedings of the 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), January 13-17, 2015, IEEE, Islamabad, Pakistan, ISBN:978-1-4799-6369-0, pp: 623-628.

Riecker, M., A. Barroso, M. Hollick and S. Biedermann, 2012. On data-centric intrusion detection in wireless sensor networks. Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, November 20-23, 2012, IEEE, Besancon, France, pp: 325-334.

Royer, E.M. and C.E. Perkins, 1999. Multicast operation of the ad-hoc on-demand distance vector routing protocol. Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 15-20, 1999, ACM, Seattle, Washington, pp: 207-218.

Santoro, D., G. Escudero-Andreu, K.G. Kyriakopoulos, F.J. Aparicio-Navarro, D.J. Parish and M. Vadursi, 2017. A hybrid intrusion detection system for virtual jamming attacks on wireless networks. Measurement, 109: 79-87.
CrossRef  |  Direct Link  |  

Sedjelmaci, H., S.M. Senouci and N. Ansari, 2016. Intrusion detection and ejection framework against lethal attacks in UAV-aided networks: A bayesian game-theoretic methodology. IEEE. Trans. Intell. Transp. Syst., 18: 1143-1153.
CrossRef  |  Direct Link  |  

Shafiei, H., A. Khonsari, H. Derakhshi and P. Mousavi, 2014. Detection and mitigation of sinkhole attacks in wireless sensor networks. J. Comput. Syst. Sci., 80: 644-653.
Direct Link  |  

Sundar, R. and A. Kathirvel, 2015. Enhanced routing algorithm to reduce number of transmission in manet. Aust. J. Basic Applied Sci., 9: 142-146.

Sundar, R. and A. Kathirvel, 2015. Enhanced trust based delegation for load balancing in manets. Int. J. Applied Eng. Res., 10: 104-109.

Varshney, S. and R. Kuma, 2018. Variants of LEACH routing protocol in WSN: A comparative analysis. Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), January 11-12, 2018, IEEE, Noida, India, pp: 199-204.

Wei, M. and K. Kim, 2012. Intrusion detection scheme using traffic prediction for wireless industrial networks. J. Commun. Networks, 14: 310-318.
CrossRef  |  Direct Link  |  

Wu, J., K. Ota, M. Dong and C. Li, 2016. A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities. IEEE. Access, 4: 416-424.
CrossRef  |  Direct Link  |  

Xie, M., J. Hu and S. Guo, 2014. Segment-based anomaly detection with approximated sample covariance matrix in wireless sensor networks. IEEE. Trans. Parallel Distrib. Syst., 26: 574-583.
CrossRef  |  Direct Link  |  

Zhang, Z., H. Zhu, S. Luo, Y. Xin and X. Liu, 2017. Intrusion detection based on state context and hierarchical trust in wireless sensor networks. IEEE. Access, 5: 12088-12102.
CrossRef  |  Direct Link  |  

Zhou, P., S. Jiang, A. Irissappane, J. Zhang, J. Zhou and J.C.M. Teo, 2015. Toward energy-efficient trust system through watchdog optimization for WSNs. IEEE Trans. Inform. Forensics Security, 10: 613-625.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved