Challenges and Potential Approaches in Wireless Sensor Network Security
A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and difficulties t...
Saved in:
Published in | Journal of electrical engineering & technology Vol. 19; no. 4; pp. 2693 - 2700 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Singapore
Springer Nature Singapore
01.05.2024
대한전기학회 |
Subjects | |
Online Access | Get full text |
ISSN | 1975-0102 2093-7423 |
DOI | 10.1007/s42835-023-01751-1 |
Cover
Abstract | A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and difficulties that must be addressed to maintain Wireless Sensor Network security. The security of most networks is leveraged due to the use of shared key techniques to reduce communication overhead, but attacks like reverse impersonation and network compromise remain to put networks at risk. The primary purpose of this article is to present a thorough security requirement, provide information on security attacks in networks, and discuss current potential approaches for security measures. The insights are discussed, and the research comprehends that asymmetric cryptographic encryption has been identified as the recent most approachable method for preserving the security of transit data. |
---|---|
AbstractList | A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and difficulties that must be addressed to maintain Wireless Sensor Network security. The security of most networks is leveraged due to the use of shared key techniques to reduce communication overhead, but attacks like reverse impersonation and network compromise remain to put networks at risk. The primary purpose of this article is to present a thorough security requirement, provide information on security attacks in networks, and discuss current potential approaches for security measures. The insights are discussed, and the research comprehends that asymmetric cryptographic encryption has been identified as the recent most approachable method for preserving the security of transit data. A remarkable new technology called a wireless sensor network off ers communication services for environmental monitoring and target tracking for the general population and the military. With the rise in popularity of smart networks sensor networks are now subject to several threats and diffi culties that must be addressed to maintain Wireless Sensor Network security. The security of most networks is leveraged due to the use of shared key techniques to reduce communication overhead, but attacks like reverse impersonation and network compromise remain to put networks at risk. The primary purpose of this article is to present a thorough security requirement, provide information on security attacks in networks, and discuss current potential approaches for security measures. The insights are discussed, and the research comprehends that asymmetric cryptographic encryption has been identifi ed as the recent most approachable method for preserving the security of transit data. KCI Citation Count: 0 |
Author | Aarti Suhag, Sumit |
Author_xml | – sequence: 1 givenname: Sumit surname: Suhag fullname: Suhag, Sumit email: sumitsuthag@gmail.com organization: Department of Electronics and Communication Engineering, OPJS University – sequence: 2 surname: Aarti fullname: Aarti organization: Department of Computer Science & Engineering, Bharati Vidhyapeeth College of Engineering |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003073583$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNp9kE9LAzEQxYNUsK1-AU97FlbzP91jKdoWiopWPIbs7mybdk1KskX67Y1dz54ew7w3zPuN0MB5BwjdEnxPMFYPkdMJEzmmLMdECZKTCzSkuGC54pQN0JAUKq0JpldoFOMOY0mwYEM0n21N24LbQMyMq7NX34HrrGmz6eEQvKm2aWFd9mkDtBBj9g4u-pA9Q_ftwz6N1THY7nSNLhvTRrj50zH6eHpczxb56mW-nE1XeUWV6nIBjBOoZCEbwQs8aaQopYQaagMM14YIrkQl6kaCKMrUjGMKZXq24SVwVrIxuuvvutDofWW1N_asG6_3QU_f1ktNMKeKyEky095cBR9jgEYfgv0y4ZQs-peb7rnpxE2fuWmSQqwPxWROXILe-WNwqdR_qR9cz3HX |
Cites_doi | 10.1007/s42452-020-04089-9 10.1016/j.adhoc.2021.102448 10.1080/09540091.2021.1990212 10.1007/s00500-023-08395-3 10.3991/ijoe.v14i04.8590 10.1016/j.jnca.2021.103282 10.1109/TDSC.2021.3137403 10.1007/s11704-021-9460-6 10.1155/2022/9359135 10.3390/fi14050145 10.1007/978-981-13-0514-6_61 10.1166/jctn.2017.7008 10.1016/j.procs.2021.02.088 10.1109/ISDFS.2018.8355381 |
ContentType | Journal Article |
Copyright | The Author(s) under exclusive licence to The Korean Institute of Electrical Engineers 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
Copyright_xml | – notice: The Author(s) under exclusive licence to The Korean Institute of Electrical Engineers 2023. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law. |
DBID | AAYXX CITATION ACYCR |
DOI | 10.1007/s42835-023-01751-1 |
DatabaseName | CrossRef Korean Citation Index |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2093-7423 |
EndPage | 2700 |
ExternalDocumentID | oai_kci_go_kr_ARTI_10427168 10_1007_s42835_023_01751_1 |
GroupedDBID | -~X .UV 0R~ 2WC 406 9ZL AACDK AAHNG AAJBT AASML AATNV AAUYE AAYYP ABAKF ABECU ABFTV ABJNI ABKCH ABMQK ABTEG ABTKH ABTMW ACAOD ACDTI ACHSB ACOKC ACPIV ACZOJ ADKNI ADTPH ADURQ ADYFF AEFQL AEMSY AENEX AESKC AFBBN AFQWF AGDGC AGMZJ AGQEE AIGIU AILAN AITGF AJZVZ ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AXYYD BGNMA CSCUP DBRKI DPUIP EBLON EBS EJD FIGPU FNLPD FRJ GGCAI GW5 IKXTQ IWAJR JDI JZLTJ KOV KVFHK LLZTM M4Y NPVJJ NQJWS NU0 OK1 PT4 ROL RSV SJYHP SNE SNPRN SOHCF SOJ SRMVM SSLCW TDB UOJIU UTJUX VEKWB VFIZW ZMTXR AAYXX ABBRH ABDBE ABFSG ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION AAFGU ABFGW ABKAS ACBMV ACBRV ACBYP ACIGE ACIPQ ACTTH ACVWB ACWMK ACYCR ADMDM ADOXG AEFTE AESTI AEVTX AFNRJ AGGBP AIMYW AJDOV AKQUC |
ID | FETCH-LOGICAL-c277t-5e341ec696f54908f65b66ededae30da15475c5df6e59b007402eb061f4be43b3 |
ISSN | 1975-0102 |
IngestDate | Tue Apr 30 03:31:51 EDT 2024 Tue Jul 01 00:40:57 EDT 2025 Fri Feb 21 02:42:01 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Keywords | Wireless sensor network Network security Asymmetric cryptographic encryption Cryptography |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c277t-5e341ec696f54908f65b66ededae30da15475c5df6e59b007402eb061f4be43b3 |
PageCount | 8 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_10427168 crossref_primary_10_1007_s42835_023_01751_1 springer_journals_10_1007_s42835_023_01751_1 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20240500 2024-05-00 2024-05 |
PublicationDateYYYYMMDD | 2024-05-01 |
PublicationDate_xml | – month: 5 year: 2024 text: 20240500 |
PublicationDecade | 2020 |
PublicationPlace | Singapore |
PublicationPlace_xml | – name: Singapore |
PublicationTitle | Journal of electrical engineering & technology |
PublicationTitleAbbrev | J. Electr. Eng. Technol |
PublicationYear | 2024 |
Publisher | Springer Nature Singapore 대한전기학회 |
Publisher_xml | – name: Springer Nature Singapore – name: 대한전기학회 |
References | Rajaram, Palaniswami (CR6) 2010; 1 CR4 Ashok Babu, Kavisankar, Xavier, Senthilkumar, Kumar, Kavitha, Adigo (CR19) 2022 Mezrag, Bitam, Mellouk (CR12) 2022; 200 Tawalbeh, Hashish, Tawalbeh, Aldairi (CR9) 2017; 12 Zhang (CR13) 2021 Tropea, Spina, De Rango, Gentile (CR3) 2022; 14 Ganesh (CR5) 2022; 7 Harikrishnan, Rajaram (CR18) 2017; 14 Singh, Saurabh, Maitra, Giri (CR2) 2022 Thomas (CR15) 2023 Rathish, Rajaram (CR7) 2018; 3 Zhu (CR8) 2018; 14 Neelima, Karthik, Aravind John, Gowthami, Nayak (CR14) 2018; 758 Gautam, Kumar (CR17) 2021; 3 Huanan, Suping, Jiannan (CR1) 2021; 183 Shah, Jinwala (CR16) 2021; 15 Khashan, Ahmad, Khafajah (CR10) 2021; 115 Lin (CR11) 2022; 34 DE Ganesh (1751_CR5) 2022; 7 A Rajaram (1751_CR6) 2010; 1 P Ashok Babu (1751_CR19) 2022 S Singh (1751_CR2) 2022 OA Khashan (1751_CR10) 2021; 115 Z Huanan (1751_CR1) 2021; 183 AK Gautam (1751_CR17) 2021; 3 CR Rathish (1751_CR7) 2018; 3 HY Lin (1751_CR11) 2022; 34 M Tropea (1751_CR3) 2022; 14 H Tawalbeh (1751_CR9) 2017; 12 Z Zhang (1751_CR13) 2021 G Harikrishnan (1751_CR18) 2017; 14 M Thomas (1751_CR15) 2023 1751_CR4 F Mezrag (1751_CR12) 2022; 200 K Shah (1751_CR16) 2021; 15 J Zhu (1751_CR8) 2018; 14 D Neelima (1751_CR14) 2018; 758 |
References_xml | – volume: 1 start-page: 77 issue: 2 year: 2010 end-page: 85 ident: CR6 article-title: Malicious node detection system for mobile ad hoc networks publication-title: Int J Comput Sci Inf Technol – volume: 3 start-page: 1752 issue: 5 year: 2018 end-page: 1760 ident: CR7 article-title: Sweeping inclusive connectivity based routing in wireless sensor networks publication-title: ARPN J Eng Appl Sci – volume: 3 start-page: 50 issue: 1 year: 2021 ident: CR17 article-title: A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks publication-title: SN Appl Sci doi: 10.1007/s42452-020-04089-9 – year: 2022 ident: CR2 publication-title: Security in communication for intelligent wireless sensor networks : issues and challenges – volume: 115 start-page: 102448 year: 2021 ident: CR10 article-title: An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2021.102448 – volume: 34 start-page: 274 issue: 1 year: 2022 end-page: 300 ident: CR11 article-title: Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks publication-title: Conn Sci doi: 10.1080/09540091.2021.1990212 – year: 2023 ident: CR15 article-title: Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment publication-title: Soft Comput doi: 10.1007/s00500-023-08395-3 – ident: CR4 – volume: 7 start-page: 28 issue: 1 year: 2022 end-page: 35 ident: CR5 article-title: Analysis of wireless sensor networks through secure routing protocols using directed diffusion methods publication-title: Int J Wirel Netw Secur – volume: 14 start-page: 211 issue: 4 year: 2018 end-page: 226 ident: CR8 article-title: Wireless sensor network technology based on security trust evaluation model publication-title: Int J Online Eng doi: 10.3991/ijoe.v14i04.8590 – volume: 200 start-page: 103282 year: 2022 ident: CR12 article-title: An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2021.103282 – year: 2021 ident: CR13 article-title: QKPT: securing your private keys in cloud with performance, scalability and transparency publication-title: IEEE Trans Dependable Secur Comput doi: 10.1109/TDSC.2021.3137403 – volume: 15 start-page: 1 issue: 6 year: 2021 end-page: 9 ident: CR16 article-title: Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks publication-title: Front Comput Sci doi: 10.1007/s11704-021-9460-6 – year: 2022 ident: CR19 article-title: Selfish node detection for effective data transmission using modified incentive sorted pathway selection in wireless sensor networks publication-title: Wirel Commun Mobile Comput doi: 10.1155/2022/9359135 – volume: 14 start-page: 145 issue: 5 year: 2022 ident: CR3 article-title: Security in wireless sensor networks: a cryptography performance analysis at MAC layer publication-title: Futur Internet doi: 10.3390/fi14050145 – volume: 12 start-page: 118 issue: 4 year: 2017 end-page: 123 ident: CR9 article-title: Security in wireless sensor networks using lightweight cryptography publication-title: J Inf Assur Secur – volume: 758 start-page: 635 year: 2018 end-page: 651 ident: CR14 article-title: Soft computing-based intrusion detection approaches: an analytical study publication-title: Adv Intell Syst Comput doi: 10.1007/978-981-13-0514-6_61 – volume: 14 start-page: 5748 issue: 12 year: 2017 end-page: 5755 ident: CR18 article-title: Improved throughput based recognition connection denies for aggressive node in wireless sensor network publication-title: J Comput Theor Nanosci doi: 10.1166/jctn.2017.7008 – volume: 183 start-page: 486 year: 2021 end-page: 492 ident: CR1 article-title: Security and application of wireless sensor network publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2021.02.088 – volume: 183 start-page: 486 year: 2021 ident: 1751_CR1 publication-title: Procedia Comput Sci doi: 10.1016/j.procs.2021.02.088 – volume: 34 start-page: 274 issue: 1 year: 2022 ident: 1751_CR11 publication-title: Conn Sci doi: 10.1080/09540091.2021.1990212 – ident: 1751_CR4 doi: 10.1109/ISDFS.2018.8355381 – volume: 1 start-page: 77 issue: 2 year: 2010 ident: 1751_CR6 publication-title: Int J Comput Sci Inf Technol – year: 2023 ident: 1751_CR15 publication-title: Soft Comput doi: 10.1007/s00500-023-08395-3 – year: 2021 ident: 1751_CR13 publication-title: IEEE Trans Dependable Secur Comput doi: 10.1109/TDSC.2021.3137403 – volume: 3 start-page: 1752 issue: 5 year: 2018 ident: 1751_CR7 publication-title: ARPN J Eng Appl Sci – volume-title: Security in communication for intelligent wireless sensor networks : issues and challenges year: 2022 ident: 1751_CR2 – volume: 14 start-page: 5748 issue: 12 year: 2017 ident: 1751_CR18 publication-title: J Comput Theor Nanosci doi: 10.1166/jctn.2017.7008 – volume: 14 start-page: 211 issue: 4 year: 2018 ident: 1751_CR8 publication-title: Int J Online Eng doi: 10.3991/ijoe.v14i04.8590 – volume: 200 start-page: 103282 year: 2022 ident: 1751_CR12 publication-title: J Netw Comput Appl doi: 10.1016/j.jnca.2021.103282 – volume: 758 start-page: 635 year: 2018 ident: 1751_CR14 publication-title: Adv Intell Syst Comput doi: 10.1007/978-981-13-0514-6_61 – year: 2022 ident: 1751_CR19 publication-title: Wirel Commun Mobile Comput doi: 10.1155/2022/9359135 – volume: 14 start-page: 145 issue: 5 year: 2022 ident: 1751_CR3 publication-title: Futur Internet doi: 10.3390/fi14050145 – volume: 15 start-page: 1 issue: 6 year: 2021 ident: 1751_CR16 publication-title: Front Comput Sci doi: 10.1007/s11704-021-9460-6 – volume: 7 start-page: 28 issue: 1 year: 2022 ident: 1751_CR5 publication-title: Int J Wirel Netw Secur – volume: 3 start-page: 50 issue: 1 year: 2021 ident: 1751_CR17 publication-title: SN Appl Sci doi: 10.1007/s42452-020-04089-9 – volume: 115 start-page: 102448 year: 2021 ident: 1751_CR10 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2021.102448 – volume: 12 start-page: 118 issue: 4 year: 2017 ident: 1751_CR9 publication-title: J Inf Assur Secur |
SSID | ssj0061053 |
Score | 2.3242526 |
Snippet | A remarkable new technology called a wireless sensor network offers communication services for environmental monitoring and target tracking for the general... A remarkable new technology called a wireless sensor network off ers communication services for environmental monitoring and target tracking for the general... |
SourceID | nrf crossref springer |
SourceType | Open Website Index Database Publisher |
StartPage | 2693 |
SubjectTerms | Electrical Engineering Electrical Machines and Networks Electronics and Microelectronics Engineering Instrumentation Original Article Power Electronics 전기공학 |
Title | Challenges and Potential Approaches in Wireless Sensor Network Security |
URI | https://link.springer.com/article/10.1007/s42835-023-01751-1 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART003073583 |
Volume | 19 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | Journal of Electrical Engineering & Technology, 2024, 19(4), , pp.2693-2700 |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LbxMxELYgvZQDoqWIUECWyo0abbx-rI9pRVuQqJDSSr1Z-7AhatmgdHPpr2f82EeUFlEum2jl3U08344_e2Y-I_RBZWlOmU0IvDuCOEElkotKkSrnpQICnRkvVv3tXJxdsq9X_KpPG_PVJU3xqby7t67kf6wK58Curkr2EZbtbgon4DvYF45gYTj-k42P251QgtDy90Xjcn9cp0elcJ9t5TNcb5xHm8GcdeGLfF06Vlxrb9YCuwOCGnbI8UY0vWqhx0qzsSA_W_3Mw8Lz6te8S6WZuh89XFigrE_jW1tYdFnTLpYxc1t0w5zADLylku6SJLhT48_RRKXEhX_XXKwaQIkN_aUI-yPGsddFwe_16yGV49arwxGgGfBUySdk0o9iXW5hp8PsG2torH1jDXPkLSqBYY3Q1vTk6Oi8HbGBQXq10u7vxOIqX2K58cg1AvO0XtqNGLqnJhcv0PNoMjwNANlBT0y9i54NlCZfotMeKhiggjuo4B4qeF7jFio4QAVHqOAWKnvo8uTzxfEZiXtokJJK2RBugKaYUihhuYvxWsELIUxlqtykSZUDg5a85JUVhjt5TMkSagroEssKw9IifYVG9aI2rxFmmeATYamVVjJDeZarsioKnqoyE8Drx-hj2zH6d5BK0Q8bY4wOoO_0dTnXTuHcff5Y6OulhnncF7iIUZjJZ2N02Patji_e7V9u-uZxzffRdg_8t2jULFfmHXDMpngfIfIHaid3Eg |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Challenges+and+Potential+Approaches+in+Wireless+Sensor+Network+Security&rft.jtitle=Journal+of+electrical+engineering+%26+technology&rft.au=Suhag%2C+Sumit&rft.au=Aarti&rft.date=2024-05-01&rft.pub=Springer+Nature+Singapore&rft.issn=1975-0102&rft.eissn=2093-7423&rft.volume=19&rft.issue=4&rft.spage=2693&rft.epage=2700&rft_id=info:doi/10.1007%2Fs42835-023-01751-1&rft.externalDocID=10_1007_s42835_023_01751_1 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1975-0102&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1975-0102&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1975-0102&client=summon |