Sensor networks have been regarded as one of the emerging technologies of the 21 st century and have great future scope. They have been widely used in mission critical applications like military, health as well as civilian applications. The focus of this paper is on a security of sensor networks in various fields. Security is the major concern of a wireless sensor network especially in unattended areas. You will get a general introduction about wireless sensor networks in section I, section II explains the need for security in Wireless sensor networks, section III gives security challenges followed by section IV &V that give security and survivability requirements for a Wireless sensor network which follows attack categorization in section VI, followed by the security management schemes in section VII and finally conclusion in the last section VIII.
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic from penetrating networks and systems. Recently, these systems have been enhancing their detection ability using machine learning algorithms. This development also forces attackers to look for new methods for evading these advanced Intrusion Detection Systemss. Polymorphic attacks are among potential candidates that can bypass the pattern matching detection systems. To alleviate the danger of polymorphic attacks, the IDS must be trained with datasets that include these attacks. Generative Adversarial Network (GAN) is a method proven in generating adversarial data in the domain of multimedia processing, text, and voice, and can produce a high volume of test data that is indistinguishable from the original training data. In this paper, we propose a model to generate adversarial attacks using Wasserstein GAN (WGAN). The attack data synthesized using the proposed model can be used to train an IDS. To evaluate the trained IDS, we study several techniques for updating the attack feature profile for the generation of polymorphic data. Our results show that by continuously changing the attack profiles, defensive systems that use incremental learning will still be vulnerable to new attacks; meanwhile, their detection rates improve incrementally until the polymorphic attack exhausts its profile variables.
Smart wireless home security technique is one of the emerging technologies for intelligent building surveillance. Many wireless technologies like Bluetooth and Wi-Fi have been used in this regard. In this paper we have proposed a Smart and Contemporary Home security system using low cost, low power Zigbee (802.15.4) standard. The Zigbee uses multi-hop communication for data transfer. The architecture consists of many Zigbee modules that have been configured as end devices, routers and one coordinator respectively. The end devices communicate with each other and with the coordinator using the intermediate nodes (routers). This multi-hop architecture provides it an unlimited range of communication thus giving it an edge over the other wireless technologies. The Hardware has been implemented successfully using XBEE Pro series1 (XBP24-AWI-001) radios for communication, Passive InfraRed sensor (DYP-ME003) and Magnetic Reed Switch (ORD221) based door sensor that have been tested for validation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.