2018
DOI: 10.14716/ijtech.v9i4.1526
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Resilience of Wireless Sensor Networks Against Security Threats: A Survey and Open Research Issues

Abstract: Wireless Sensor Network (WSN) technology has gained importance in recent years due to its various benefits, practicability and extensive utilization in diverse applications. The innovation helps to make real-time automation, monitoring, detecting and tracking much easier and more effective than previous technologies. However, as well as their benefits and enormous potential, WSNs are vulnerable to cyber-attacks. This paper is a systematic literature review of the security-related threats and vulnerabilities in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 36 publications
(53 reference statements)
0
5
0
Order By: Relevance
“…The use of antivirus and firewalls has been widely implemented, but in reality networks are still being attacked, causing global losses of up to $6 trillion in 2021, and is estimated to increase to $10.5 trillion in 2025 [1]. The spread of cyber attacks even extends to the wireless sensor network (WSN), which causes the need for an intrusion detection system [2], [3]. Intrusion detection systems (IDS) are divided into two types based on attack detection, namely signature-based methods and anomaly-based methods [4].…”
Section: Introductionmentioning
confidence: 99%
“…The use of antivirus and firewalls has been widely implemented, but in reality networks are still being attacked, causing global losses of up to $6 trillion in 2021, and is estimated to increase to $10.5 trillion in 2025 [1]. The spread of cyber attacks even extends to the wireless sensor network (WSN), which causes the need for an intrusion detection system [2], [3]. Intrusion detection systems (IDS) are divided into two types based on attack detection, namely signature-based methods and anomaly-based methods [4].…”
Section: Introductionmentioning
confidence: 99%
“…Many corrective measures were introduced to mitigate the inherent weaknesses of the discussed systems. Hempstead, Tripathi, Mauro, Wei, and Brooks (), Sinha and Chandrakasan (), Onibonoje (), and Ottman, Hofmann, and Lesieutre () had reported the use of power management techniques, while Ye, Heidemann, and Estrin () and Ali, Al Bulushi, Nadir, and Hussain () reported the use of medium access control protocols. Heinzelman, Kulik, and Balakrishnan (), Zhang and Arora (), Di Pietro, Mancini, and Jajodia (), Cheng, Gao, Zhang, and Yang (), and Di Pietro, Ma, Soriente, and Tsudik () also discussed the use of routing (self‐healing) protocols to mitigate the problems.…”
Section: Introductionmentioning
confidence: 99%
“…Due to many WSN characteristics, such as it is a wireless medium and the limited resources of sensors (low battery, storage, and computing speed), security is one of the most important design factors of WSNs. WSNs are considered more unsafe than other types of networks, and are especially vulnerable to insider threats [7][8][9]. In addition, energy-efficiency is another critical design factor to maximize the lifetime of WSNs [10,11].…”
Section: Introductionmentioning
confidence: 99%