A Systematical Roadmap on Various Security Vulnerabilities and Countermeasures in Routing Algorithms upon WSNs
DOI:
https://doi.org/10.25007/ajnu.v10n4a957Keywords:
Attacks, vulnerability, countermeasures, OSI, wireless sensor network, secure routing protocols.Abstract
Wireless Sensor Networks (WSN) is now an evolving technology and has a broad range of applications, such as battlefield surveillance, traffic surveillance, detection of forest fires, detection of floods, etc. The communication nature of the wireless sensor network is unprotected and dangerous due to deployment in hostile environments, restricted resources, an automatic nature, and untrusted media for broadcast transmission. For wireless sensor networks, several routing protocols have been suggested, but none of them have been developed with protection as a target. The majority function in routing algorithms currently in place for sensor networks optimize a restricted capacities in sensor nodes and the application based design of WSNs. A WSNs, however, are exposed to a number of possible threats that impede the network's regular activity. Thus, there is a strong need to provide the routing protocols of the OSI structure layer with a safe mechanism to prevent an attacker from obstructing it.
The well-known attacks against all layers are discussed in this systematic roadmap, and debilitating attacks against routing protocols are analyzed and defined in particular. Several suggested attack countermeasures, design considerations and paper contributions are also included in the routing protocols. The assertion of the study is that WSN routing protocols must be built with protection in mind, and this is the only efficient solution in WSNs for safe routing. The aim of this paper is also to provide problems, attacks and countermeasures related to protection. Finally, it is hoped that this roadmap would inspire potential researchers to come up with smarter and better protection measures and make their network safer.
The first such research analysis of secure routing protocols in WSNs is this roadmap study.
Downloads
References
Farooqi A.H. & Khan F.A. (2012),”A survey of Intrusion Detection Systems for Wireless Sensor”. Int. J. Ad Hoc and Ubiquitous Computing, 9 (2), 69-83.
Vaishali P. & Sharda K. (2015),”Attacks and Challenges in Wireless Sensor Network. IJESRT, 4(6), 122-130, June 2015.
Idrees S. K. & Qusay I. S. (2017).”Classifying Routing Algorithms upon Clustered Based Wireless Sensor Networks: A Survey”. ZANCO Journal of Pure and Applied Science (ZJPAS), 29(2), 25-36 , Salahaddin University, Erbil, Iraq, 2017.
Aura T. Nikander P. & Leiwo J. (2001). DoS-resistant authentication with client puzzles. Proceedings of the 8th International Workshop on Security Protocols, 170-177, Springer-Verlag, Germany.
Deng H., Li H. & Agrawal D. (2002a). Routing security in wireless ad hoc networks. IEEE Communications Magazine, 40(10).
Deng J.,Han R. & Mishra S. (2004). Countermeasures against traffic analysis in wireless sensor networks. Technical Report : CU-CS-987-04, University of Colorado at Boulder.
Di P. R., Mancini L.V. , Law Y.W. , Etalle S. & Havinga P. (2003). LKHW : a direced diffusion-based secure multi-cast scheme for wireless sensor networks. Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPPW’03), pp. 397-406, IEEE Computer Society Press, 2003.
Syeda G. F., Syed A. S. & Mohammed S. (2018), Efficient Defense System for Jamming Attacks in Wireless Sensor Networks. International Journal of Electronics and Communication Engineering and Technology, 9(4), 2018, 22–35.
Estrin, D. ; Govindan, R. ; Heidemann, J.S. & Kumar. S. (1999). Next century challenges: scalable coordination in sensor networks. Mobile Computing and Networking, 263-270.
Eschenauer, L. & Gligor, V.D. (2002). A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Networking, 41-47.
Ganeriwal, S. ; Capkun, S. ; Han, C.-C. & Srivastava, M.B. (2005). Secure time synchronization service for sensor networks. Proceedings of the 4th ACM Workshop on Wireless Security, 97 – 106, New York, USA, ACM Press.
Han, Y-J. ; Park, M-W. & Chung, T-M. (2010). SecDEACH : secure and resilient dynamic clustering protocol preserving data privacy in WSNs. Proceedings of the International Conference on Computational Science and its Applications (ICCSA’10), 142 – 157,
Hill, J. ; Szewczyk, R. ; Woo, A. ; Hollar, S. ; Culler, D.E. & Pister, K. (2000). System architecture directions for networked sensors. Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 93-104, ACM Press.
Hu, L. & Evans, D. (2003a). Secure aggregation for wireless sensor networks. Proceedings of the Symposium on Applications and the Internet Workshops, p. 384, IEEE Comp. Soc. Press.
Hu, L. & Evans, D. (2004a). Using directional antennas to prevent wormhole attacks. Proceedings of the 11th Annual Network and Distributed System Security Symposium.
Hu, Y. ; Perrig, A. & Johnson, D.B. (2003b). Rushing attacks and defense in wireless ad hoc network routing protocols. Proceedings of the ACM Workshop on Wireless Security, 30 – 40, 2003.
Hu, Y. ; Perrig, A. & Johnson, D.B. (2004b). Packet leashes: a defense against worm-hole attacks. Proceedings of the 11th Annual Network and Distributed System Security Symposium.
Karlof, C. & Wagner, D. (2003). Secure routing in wireless sensor networks : attacks and countermeasures. Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, 113-127.
Lazos, L. & Poovendran, R. (2002). Secure broadcast in energy-aware wireless sensor networks. Proceedings of the IEEE International Symposium on Advances in Wireless Communications (ISWC’02).
Lazos, L. & Poovendran, R. (2005). SERLOC : robust localization for wireless sensor networks. ACM Transactions on Sensor Networks, 1 (1), 73 -100.
Lazos, L. & Poovendran, R. (2003). Energy-aware secure multi-cast communication in adhoc networks using geographic location information. Proceedings of the IEEE International Conference on Acoustics Speech and Signal Processing.
Liu, D. & Ning, P. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. Proceedings of the 10th Annual Network and Distributed System Security Symposium, 263 – 273, San Diego, CA, USA.
Liu, D. & Ning, P. (2004). Multilevel μTESLA: broadcast authentication for distributed sensor networks. ACM Transactions on Embedded Computing Systems (ECS), 3(4), 800-836.
Newsome, J.; Shi, E. ; Song, D. & Perrig, A. (2004). The Sybil attack in sensor networks: analysis and defenses. Proceedings of the 3rd International Symposium on Information
Processing in Sensor Networks, 259-268, ACM Press.
Pecho, P.; Nagy, J.; Hanacke, P. & Drahansky, M. (2009). Secure collection tree protocol for tamper-resistant wireless sensors. Communications in Computer and Information Science, Vol. 58, 217 – 224, Springer-Verlag, Heidelberg, Germany.
Perrig, A. ; Szewczyk, R. ; Wen, V. ; Culler, D.E. & Tygar, J.D. (2002). SPINS: security protocols for sensor networks. Wireless Networks, 8( 5), 521-534.
Perrig, A. ; Stankovic, J. & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, Vol. 47, No. 6, pp. 53 – 57.
Sen, J ; Chandra, M.G. ; Harihara, S.G. ; Reddy, H. & Balamuralidhar, P. (2007b). A mechanism for detection of grayhole attack in mobile ad hoc networks. Proceedings of the 6th International Conference on Information, Communication, and Signal Processing (ICICS’07), 1 – 5, Singapore.
Sen, J. & Ukil, A. (2010). A secure routing protocol for wireless sensor networks. Proceedings of the International Conference on Computational Sciences and its Applications (ICCSA’10), 277 – 290, Fukuaka, Japan.
Wang, W. & Bhargava, B. (2004b). Visualization of wormholes in sensor networks. Proceedings of the 2004 ACM Workshop on Wireless Security, 51 – 60, New York, USA, ACM Press.
Wood, A.D. & Stankvic, J.A. (2002). Denial of service in sensor networks. IEEE Computer, 3510), 54-62.
Zhu, S. ; Setia, S. & Jajodia, S. (2004b). LEAP : efficient security mechanism for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security, 62 – 72, New York, USA, ACM Press.
Zhang, K. ; Wang, C. & Wang, C. (2008). A secure routing protocol for cluster-based wireless sensor networks using group key management. Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM’08), 1-5,
Zhan, G.; Shi, W. & Deng, J. (2010). TARF: a trust-aware routing framework for wireless sensor networks. Proceedings of the 7th European Conference on Wireless Sensor Networks (EWSN’10), 65 – 80, Coimbra, Portugal.
Idrees S. K. (2020). Software Engineering Methods To Improve The Design Of Software Reliability Systems: Roadmap. Journal Of Southwest Jiaotong University 55 (3), 1-9, June 2020, DOI:10.35741/issn.0258-2724.55.3.27, 2020.
Idrees G. & Qusay I. S. (2016) “Performance Evaluation of Novel Secure Key Management Scheme Over BAN Wireless Sensor Networks”. Journal of University of Duhok, 19(1) (Pure and Eng. Sciences), 179-188, 2016.
Idrees S. G., Chee-On C., Tanveer A. Z. & Qusay I. G. (2011a) Cross-layer based security solutions for wireless sensor networks, International Journal of the Physical Sciences (IJPS), 2011, 6(17), 4245-4254, 2011.
Idrees S. G., Chee-On C., Tanveer A. Z. & Qusay I. G. (2011b). A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks, 3rd International Conference on Computational Intelligence, Modeling and Simulation (CIMSim 2011). Langkawi, Malaysia.2011.
Idrees S. K., Chee-Onn C., Hiroshi I., & Tanveer A. Z. (2013). Threat Models and Security Issues in Wireless Sensor Networks, International Journal of Computer Theory and Engineering, 5(5), 830-835.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Idrees Sarhan Kocher

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors retain copyright
The use of a Creative Commons License enables authors/editors to retain copyright to their work. Publications can be reused and redistributed as long as the original author is correctly attributed.
- Copyright
- The researcher(s), whether a single or joint research paper, must sell and transfer to the publisher (the Academic Journal of Nawroz University) through all the duration of the publication which starts from the date of entering this Agreement into force, the exclusive rights of the research paper/article. These rights include the translation, reuse of papers/articles, transmit or distribute, or use the material or parts(s) contained therein to be published in scientific, academic, technical, professional journals or any other periodicals including any other works derived from them, all over the world, in English and Arabic, whether in print or in electronic edition of such journals and periodicals in all types of media or formats now or that may exist in the future. Rights also include giving license (or granting permission) to a third party to use the materials and any other works derived from them and publish them in such journals and periodicals all over the world. Transfer right under this Agreement includes the right to modify such materials to be used with computer systems and software, or to reproduce or publish it in e-formats and also to incorporate them into retrieval systems.
- Reproduction, reference, transmission, distribution or any other use of the content, or any parts of the subjects included in that content in any manner permitted by this Agreement, must be accompanied by mentioning the source which is (the Academic Journal of Nawroz University) and the publisher in addition to the title of the article, the name of the author (or co-authors), journal’s name, volume or issue, publisher's copyright, and publication year.
- The Academic Journal of Nawroz University reserves all rights to publish research papers/articles issued under a “Creative Commons License (CC BY-NC-ND 4.0) which permits unrestricted use, distribution, and reproduction of the paper/article by any means, provided that the original work is correctly cited.
- Reservation of Rights
The researcher(s) preserves all intellectual property rights (except for the one transferred to the publisher under this Agreement).
- Researcher’s guarantee
The researcher(s) hereby guarantees that the content of the paper/article is original. It has been submitted only to the Academic Journal of Nawroz University and has not been previously published by any other party.
In the event that the paper/article is written jointly with other researchers, the researcher guarantees that he/she has informed the other co-authors about the terms of this agreement, as well as obtaining their signature or written permission to sign on their behalf.
The author further guarantees:
- The research paper/article does not contain any defamatory statements or illegal comments.
- The research paper/article does not violate other's rights (including but not limited to copyright, patent, and trademark rights).
This research paper/article does not contain any facts or instructions that could cause damages or harm to others, and publishing it does not lead to disclosure of any confidential information.