Skip navigation

A survey of potential security issues in existing wireless sensor network protocols

A survey of potential security issues in existing wireless sensor network protocols

Tomic, Ivana ORCID: 0000-0003-3502-5980 and McCann, Julie A. (2017) A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal, 4 (6). pp. 1910-1923. ISSN 2327-4662 (Print), 2327-4662 (Online) (doi:https://doi.org/10.1109/JIOT.2017.2749883)

[img]
Preview
PDF (Author's Accepted Manuscript)
24335 TOMIC_Survey_Potential_Security_Issues_Wireless_Sensor_Network_Protocols_(AAM)_2017.pdf - Accepted Version

Download (2MB) | Preview

Abstract

The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low-power wireless personal area networks, outing protocol for routing protocol for low-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This paper culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems.

Item Type: Article
Uncontrolled Keywords: cps, wsn, security, communication protocols, rpl, network layer attacks, cooja
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / Department / Research Group: Faculty of Architecture, Computing & Humanities
Faculty of Architecture, Computing & Humanities > Department of Computing & Information Systems
Faculty of Architecture, Computing & Humanities > Internet of Things and Security (ISEC)
Last Modified: 18 Jul 2019 15:28
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: GREAT 5
URI: http://gala.gre.ac.uk/id/eprint/24335

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics