Challenges and Potential Approaches in Wireless Sensor Network Security

A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and difficulties t...

Full description

Saved in:
Bibliographic Details
Published inJournal of electrical engineering & technology Vol. 19; no. 4; pp. 2693 - 2700
Main Authors Suhag, Sumit, Aarti
Format Journal Article
LanguageEnglish
Published Singapore Springer Nature Singapore 01.05.2024
대한전기학회
Subjects
Online AccessGet full text
ISSN1975-0102
2093-7423
DOI10.1007/s42835-023-01751-1

Cover

Abstract A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and difficulties that must be addressed to maintain Wireless Sensor Network security. The security of most networks is leveraged due to the use of shared key techniques to reduce communication overhead, but attacks like reverse impersonation and network compromise remain to put networks at risk. The primary purpose of this article is to present a thorough security requirement, provide information on security attacks in networks, and discuss current potential approaches for security measures. The insights are discussed, and the research comprehends that asymmetric cryptographic encryption has been identified as the recent most approachable method for preserving the security of transit data.
AbstractList A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and difficulties that must be addressed to maintain Wireless Sensor Network security. The security of most networks is leveraged due to the use of shared key techniques to reduce communication overhead, but attacks like reverse impersonation and network compromise remain to put networks at risk. The primary purpose of this article is to present a thorough security requirement, provide information on security attacks in networks, and discuss current potential approaches for security measures. The insights are discussed, and the research comprehends that asymmetric cryptographic encryption has been identified as the recent most approachable method for preserving the security of transit data.
A remarkable new technology called a wireless sensor network off ers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and diffi culties that must be addressed to maintain Wireless Sensor Network security. The security of most networks is leveraged due to the use of shared key techniques to reduce communication overhead, but attacks like reverse impersonation and network compromise remain to put networks at risk. The primary purpose of this article is to present a thorough security requirement, provide information on security attacks in networks, and discuss current potential approaches for security measures. The insights are discussed, and the research comprehends that asymmetric cryptographic encryption has been identifi ed as the recent most approachable method for preserving the security of transit data. KCI Citation Count: 0
Author Aarti
Suhag, Sumit
Author_xml – sequence: 1
  givenname: Sumit
  surname: Suhag
  fullname: Suhag, Sumit
  email: sumitsuthag@gmail.com
  organization: Department of Electronics and Communication Engineering, OPJS University
– sequence: 2
  surname: Aarti
  fullname: Aarti
  organization: Department of Computer Science & Engineering, Bharati Vidhyapeeth College of Engineering
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003073583$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNp9kE9LAzEQxYNUsK1-AU97FlbzP91jKdoWiopWPIbs7mybdk1KskX67Y1dz54ew7w3zPuN0MB5BwjdEnxPMFYPkdMJEzmmLMdECZKTCzSkuGC54pQN0JAUKq0JpldoFOMOY0mwYEM0n21N24LbQMyMq7NX34HrrGmz6eEQvKm2aWFd9mkDtBBj9g4u-pA9Q_ftwz6N1THY7nSNLhvTRrj50zH6eHpczxb56mW-nE1XeUWV6nIBjBOoZCEbwQs8aaQopYQaagMM14YIrkQl6kaCKMrUjGMKZXq24SVwVrIxuuvvutDofWW1N_asG6_3QU_f1ktNMKeKyEky095cBR9jgEYfgv0y4ZQs-peb7rnpxE2fuWmSQqwPxWROXILe-WNwqdR_qR9cz3HX
Cites_doi 10.1007/s42452-020-04089-9
10.1016/j.adhoc.2021.102448
10.1080/09540091.2021.1990212
10.1007/s00500-023-08395-3
10.3991/ijoe.v14i04.8590
10.1016/j.jnca.2021.103282
10.1109/TDSC.2021.3137403
10.1007/s11704-021-9460-6
10.1155/2022/9359135
10.3390/fi14050145
10.1007/978-981-13-0514-6_61
10.1166/jctn.2017.7008
10.1016/j.procs.2021.02.088
10.1109/ISDFS.2018.8355381
ContentType Journal Article
Copyright The Author(s) under exclusive licence to The Korean Institute of Electrical Engineers 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
Copyright_xml – notice: The Author(s) under exclusive licence to The Korean Institute of Electrical Engineers 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
DBID AAYXX
CITATION
ACYCR
DOI 10.1007/s42835-023-01751-1
DatabaseName CrossRef
Korean Citation Index
DatabaseTitle CrossRef
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2093-7423
EndPage 2700
ExternalDocumentID oai_kci_go_kr_ARTI_10427168
10_1007_s42835_023_01751_1
GroupedDBID -~X
.UV
0R~
2WC
406
9ZL
AACDK
AAHNG
AAJBT
AASML
AATNV
AAUYE
AAYYP
ABAKF
ABECU
ABFTV
ABJNI
ABKCH
ABMQK
ABTEG
ABTKH
ABTMW
ACAOD
ACDTI
ACHSB
ACOKC
ACPIV
ACZOJ
ADKNI
ADTPH
ADURQ
ADYFF
AEFQL
AEMSY
AENEX
AESKC
AFBBN
AFQWF
AGDGC
AGMZJ
AGQEE
AIGIU
AILAN
AITGF
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AXYYD
BGNMA
CSCUP
DBRKI
DPUIP
EBLON
EBS
EJD
FIGPU
FNLPD
FRJ
GGCAI
GW5
IKXTQ
IWAJR
JDI
JZLTJ
KOV
KVFHK
LLZTM
M4Y
NPVJJ
NQJWS
NU0
OK1
PT4
ROL
RSV
SJYHP
SNE
SNPRN
SOHCF
SOJ
SRMVM
SSLCW
TDB
UOJIU
UTJUX
VEKWB
VFIZW
ZMTXR
AAYXX
ABBRH
ABDBE
ABFSG
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
AAFGU
ABFGW
ABKAS
ACBMV
ACBRV
ACBYP
ACIGE
ACIPQ
ACTTH
ACVWB
ACWMK
ACYCR
ADMDM
ADOXG
AEFTE
AESTI
AEVTX
AFNRJ
AGGBP
AIMYW
AJDOV
AKQUC
ID FETCH-LOGICAL-c277t-5e341ec696f54908f65b66ededae30da15475c5df6e59b007402eb061f4be43b3
ISSN 1975-0102
IngestDate Tue Apr 30 03:31:51 EDT 2024
Tue Jul 01 00:40:57 EDT 2025
Fri Feb 21 02:42:01 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Wireless sensor network
Network security
Asymmetric cryptographic encryption
Cryptography
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c277t-5e341ec696f54908f65b66ededae30da15475c5df6e59b007402eb061f4be43b3
PageCount 8
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_10427168
crossref_primary_10_1007_s42835_023_01751_1
springer_journals_10_1007_s42835_023_01751_1
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20240500
2024-05-00
2024-05
PublicationDateYYYYMMDD 2024-05-01
PublicationDate_xml – month: 5
  year: 2024
  text: 20240500
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
PublicationTitle Journal of electrical engineering & technology
PublicationTitleAbbrev J. Electr. Eng. Technol
PublicationYear 2024
Publisher Springer Nature Singapore
대한전기학회
Publisher_xml – name: Springer Nature Singapore
– name: 대한전기학회
References Rajaram, Palaniswami (CR6) 2010; 1
CR4
Ashok Babu, Kavisankar, Xavier, Senthilkumar, Kumar, Kavitha, Adigo (CR19) 2022
Mezrag, Bitam, Mellouk (CR12) 2022; 200
Tawalbeh, Hashish, Tawalbeh, Aldairi (CR9) 2017; 12
Zhang (CR13) 2021
Tropea, Spina, De Rango, Gentile (CR3) 2022; 14
Ganesh (CR5) 2022; 7
Harikrishnan, Rajaram (CR18) 2017; 14
Singh, Saurabh, Maitra, Giri (CR2) 2022
Thomas (CR15) 2023
Rathish, Rajaram (CR7) 2018; 3
Zhu (CR8) 2018; 14
Neelima, Karthik, Aravind John, Gowthami, Nayak (CR14) 2018; 758
Gautam, Kumar (CR17) 2021; 3
Huanan, Suping, Jiannan (CR1) 2021; 183
Shah, Jinwala (CR16) 2021; 15
Khashan, Ahmad, Khafajah (CR10) 2021; 115
Lin (CR11) 2022; 34
DE Ganesh (1751_CR5) 2022; 7
A Rajaram (1751_CR6) 2010; 1
P Ashok Babu (1751_CR19) 2022
S Singh (1751_CR2) 2022
OA Khashan (1751_CR10) 2021; 115
Z Huanan (1751_CR1) 2021; 183
AK Gautam (1751_CR17) 2021; 3
CR Rathish (1751_CR7) 2018; 3
HY Lin (1751_CR11) 2022; 34
M Tropea (1751_CR3) 2022; 14
H Tawalbeh (1751_CR9) 2017; 12
Z Zhang (1751_CR13) 2021
G Harikrishnan (1751_CR18) 2017; 14
M Thomas (1751_CR15) 2023
1751_CR4
F Mezrag (1751_CR12) 2022; 200
K Shah (1751_CR16) 2021; 15
J Zhu (1751_CR8) 2018; 14
D Neelima (1751_CR14) 2018; 758
References_xml – volume: 1
  start-page: 77
  issue: 2
  year: 2010
  end-page: 85
  ident: CR6
  article-title: Malicious node detection system for mobile ad hoc networks
  publication-title: Int J Comput Sci Inf Technol
– volume: 3
  start-page: 1752
  issue: 5
  year: 2018
  end-page: 1760
  ident: CR7
  article-title: Sweeping inclusive connectivity based routing in wireless sensor networks
  publication-title: ARPN J Eng Appl Sci
– volume: 3
  start-page: 50
  issue: 1
  year: 2021
  ident: CR17
  article-title: A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
  publication-title: SN Appl Sci
  doi: 10.1007/s42452-020-04089-9
– year: 2022
  ident: CR2
  publication-title: Security in communication for intelligent wireless sensor networks : issues and challenges
– volume: 115
  start-page: 102448
  year: 2021
  ident: CR10
  article-title: An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2021.102448
– volume: 34
  start-page: 274
  issue: 1
  year: 2022
  end-page: 300
  ident: CR11
  article-title: Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks
  publication-title: Conn Sci
  doi: 10.1080/09540091.2021.1990212
– year: 2023
  ident: CR15
  article-title: Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment
  publication-title: Soft Comput
  doi: 10.1007/s00500-023-08395-3
– ident: CR4
– volume: 7
  start-page: 28
  issue: 1
  year: 2022
  end-page: 35
  ident: CR5
  article-title: Analysis of wireless sensor networks through secure routing protocols using directed diffusion methods
  publication-title: Int J Wirel Netw Secur
– volume: 14
  start-page: 211
  issue: 4
  year: 2018
  end-page: 226
  ident: CR8
  article-title: Wireless sensor network technology based on security trust evaluation model
  publication-title: Int J Online Eng
  doi: 10.3991/ijoe.v14i04.8590
– volume: 200
  start-page: 103282
  year: 2022
  ident: CR12
  article-title: An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2021.103282
– year: 2021
  ident: CR13
  article-title: QKPT: securing your private keys in cloud with performance, scalability and transparency
  publication-title: IEEE Trans Dependable Secur Comput
  doi: 10.1109/TDSC.2021.3137403
– volume: 15
  start-page: 1
  issue: 6
  year: 2021
  end-page: 9
  ident: CR16
  article-title: Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks
  publication-title: Front Comput Sci
  doi: 10.1007/s11704-021-9460-6
– year: 2022
  ident: CR19
  article-title: Selfish node detection for effective data transmission using modified incentive sorted pathway selection in wireless sensor networks
  publication-title: Wirel Commun Mobile Comput
  doi: 10.1155/2022/9359135
– volume: 14
  start-page: 145
  issue: 5
  year: 2022
  ident: CR3
  article-title: Security in wireless sensor networks: a cryptography performance analysis at MAC layer
  publication-title: Futur Internet
  doi: 10.3390/fi14050145
– volume: 12
  start-page: 118
  issue: 4
  year: 2017
  end-page: 123
  ident: CR9
  article-title: Security in wireless sensor networks using lightweight cryptography
  publication-title: J Inf Assur Secur
– volume: 758
  start-page: 635
  year: 2018
  end-page: 651
  ident: CR14
  article-title: Soft computing-based intrusion detection approaches: an analytical study
  publication-title: Adv Intell Syst Comput
  doi: 10.1007/978-981-13-0514-6_61
– volume: 14
  start-page: 5748
  issue: 12
  year: 2017
  end-page: 5755
  ident: CR18
  article-title: Improved throughput based recognition connection denies for aggressive node in wireless sensor network
  publication-title: J Comput Theor Nanosci
  doi: 10.1166/jctn.2017.7008
– volume: 183
  start-page: 486
  year: 2021
  end-page: 492
  ident: CR1
  article-title: Security and application of wireless sensor network
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2021.02.088
– volume: 183
  start-page: 486
  year: 2021
  ident: 1751_CR1
  publication-title: Procedia Comput Sci
  doi: 10.1016/j.procs.2021.02.088
– volume: 34
  start-page: 274
  issue: 1
  year: 2022
  ident: 1751_CR11
  publication-title: Conn Sci
  doi: 10.1080/09540091.2021.1990212
– ident: 1751_CR4
  doi: 10.1109/ISDFS.2018.8355381
– volume: 1
  start-page: 77
  issue: 2
  year: 2010
  ident: 1751_CR6
  publication-title: Int J Comput Sci Inf Technol
– year: 2023
  ident: 1751_CR15
  publication-title: Soft Comput
  doi: 10.1007/s00500-023-08395-3
– year: 2021
  ident: 1751_CR13
  publication-title: IEEE Trans Dependable Secur Comput
  doi: 10.1109/TDSC.2021.3137403
– volume: 3
  start-page: 1752
  issue: 5
  year: 2018
  ident: 1751_CR7
  publication-title: ARPN J Eng Appl Sci
– volume-title: Security in communication for intelligent wireless sensor networks : issues and challenges
  year: 2022
  ident: 1751_CR2
– volume: 14
  start-page: 5748
  issue: 12
  year: 2017
  ident: 1751_CR18
  publication-title: J Comput Theor Nanosci
  doi: 10.1166/jctn.2017.7008
– volume: 14
  start-page: 211
  issue: 4
  year: 2018
  ident: 1751_CR8
  publication-title: Int J Online Eng
  doi: 10.3991/ijoe.v14i04.8590
– volume: 200
  start-page: 103282
  year: 2022
  ident: 1751_CR12
  publication-title: J Netw Comput Appl
  doi: 10.1016/j.jnca.2021.103282
– volume: 758
  start-page: 635
  year: 2018
  ident: 1751_CR14
  publication-title: Adv Intell Syst Comput
  doi: 10.1007/978-981-13-0514-6_61
– year: 2022
  ident: 1751_CR19
  publication-title: Wirel Commun Mobile Comput
  doi: 10.1155/2022/9359135
– volume: 14
  start-page: 145
  issue: 5
  year: 2022
  ident: 1751_CR3
  publication-title: Futur Internet
  doi: 10.3390/fi14050145
– volume: 15
  start-page: 1
  issue: 6
  year: 2021
  ident: 1751_CR16
  publication-title: Front Comput Sci
  doi: 10.1007/s11704-021-9460-6
– volume: 7
  start-page: 28
  issue: 1
  year: 2022
  ident: 1751_CR5
  publication-title: Int J Wirel Netw Secur
– volume: 3
  start-page: 50
  issue: 1
  year: 2021
  ident: 1751_CR17
  publication-title: SN Appl Sci
  doi: 10.1007/s42452-020-04089-9
– volume: 115
  start-page: 102448
  year: 2021
  ident: 1751_CR10
  publication-title: Ad Hoc Netw
  doi: 10.1016/j.adhoc.2021.102448
– volume: 12
  start-page: 118
  issue: 4
  year: 2017
  ident: 1751_CR9
  publication-title: J Inf Assur Secur
SSID ssj0061053
Score 2.3242526
Snippet A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general...
A remarkable new technology called a wireless sensor network off ers communication services for environmental monitoring and target tracking for the general...
SourceID nrf
crossref
springer
SourceType Open Website
Index Database
Publisher
StartPage 2693
SubjectTerms Electrical Engineering
Electrical Machines and Networks
Electronics and Microelectronics
Engineering
Instrumentation
Original Article
Power Electronics
전기공학
Title Challenges and Potential Approaches in Wireless Sensor Network Security
URI https://link.springer.com/article/10.1007/s42835-023-01751-1
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003073583
Volume 19
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX Journal of Electrical Engineering & Technology, 2024, 19(4), , pp.2693-2700
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LbxMxELYgvZQDoqWIUECWyo0abbx-rI9pRVuQqJDSSr1Z-7AhatmgdHPpr2f82EeUFlEum2jl3U08344_e2Y-I_RBZWlOmU0IvDuCOEElkotKkSrnpQICnRkvVv3tXJxdsq9X_KpPG_PVJU3xqby7t67kf6wK58Curkr2EZbtbgon4DvYF45gYTj-k42P251QgtDy90Xjcn9cp0elcJ9t5TNcb5xHm8GcdeGLfF06Vlxrb9YCuwOCGnbI8UY0vWqhx0qzsSA_W_3Mw8Lz6te8S6WZuh89XFigrE_jW1tYdFnTLpYxc1t0w5zADLylku6SJLhT48_RRKXEhX_XXKwaQIkN_aUI-yPGsddFwe_16yGV49arwxGgGfBUySdk0o9iXW5hp8PsG2torH1jDXPkLSqBYY3Q1vTk6Oi8HbGBQXq10u7vxOIqX2K58cg1AvO0XtqNGLqnJhcv0PNoMjwNANlBT0y9i54NlCZfotMeKhiggjuo4B4qeF7jFio4QAVHqOAWKnvo8uTzxfEZiXtokJJK2RBugKaYUihhuYvxWsELIUxlqtykSZUDg5a85JUVhjt5TMkSagroEssKw9IifYVG9aI2rxFmmeATYamVVjJDeZarsioKnqoyE8Drx-hj2zH6d5BK0Q8bY4wOoO_0dTnXTuHcff5Y6OulhnncF7iIUZjJZ2N02Patji_e7V9u-uZxzffRdg_8t2jULFfmHXDMpngfIfIHaid3Eg
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Challenges+and+Potential+Approaches+in+Wireless+Sensor+Network+Security&rft.jtitle=Journal+of+electrical+engineering+%26+technology&rft.au=Suhag%2C+Sumit&rft.au=Aarti&rft.date=2024-05-01&rft.pub=Springer+Nature+Singapore&rft.issn=1975-0102&rft.eissn=2093-7423&rft.volume=19&rft.issue=4&rft.spage=2693&rft.epage=2700&rft_id=info:doi/10.1007%2Fs42835-023-01751-1&rft.externalDocID=10_1007_s42835_023_01751_1
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1975-0102&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1975-0102&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1975-0102&client=summon