Open Access Open Access  Restricted Access Subscription or Fee Access

Security Aspects in Wireless Sensor Network

Pratibhadevi Tapashetti, Dr. A S. Umesh, Dr. Ashalatha Kulshrestha


A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensor monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. The more modern networks are bi-directional, enabling also to control the activity of the sensors. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and civilian application areas, including industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation, and traffic control. The purpose of this paper is to provide a brief technical introduction to wireless sensor networks and discusses security aspects of wireless sensor network.


Monitoring, Group pumping, Environment, WSN-Wireless Sensor Network, MAC-Message Authentication Code, IC- Integrated Circuit.

Full Text:



Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In The Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001), 2001.

Sasha Slijepcevic, Miodrag Potkonjak, Vlasios Tsiatsis, Scott Zimbeck, Mani B. Srivastava. On Communication Security in Wireless Ad-Hoc Sensor Networks. In The Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’02), 2002.

Y.C. Hu, A. Perrig, and D. B. Johnson, “Wormhole detection in wireless ad hoc networks,” Department of Computer Science, Rice University, Tech. Rep. TR01-384, June 2002.

Jeffery Undercoffer, Sasikanth Avancha, Anupam Joshi and John Pinkston. In Security for Sensor Networks.

Chris Karlof David Wagner. In Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures.

Wadaa, S. Olariu, L. Wilson, M. Eltoweissy, K. Jones. On Providing Anonymity in Wireless Sensor Networks. In Proceedings of the Tenth International Conference on Parallel and Distributed Systems (ICPADS’04).

Chris Karlof, Naveen Sastry, David Wagner. TinySec: Link Layer Security Architecture for Wireless Sensor Networks. ACM SenSys 2004, November 3-5, 2004.

Sencun Zhu, Sanjeev Setia, Sushil Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In The Proceedings of the 10th ACM conference on Computer and communications security, 2003.

Alan Mainwaring, Joseph Polastre, Robert Szewczyk, and David Culler. Wireless sensor networks for habitat monitoring. In First ACM International Workshop on Wireless Sensor Networks and Applications, 2002.

Robert Szewczyk, Joseph Polastre, Alan Mainwaring, and David Culler. Lessons from a sensor network expedition. In First European Workshop on Wireless Sensor Networks (EWSN '04), January 2004.

Matt Welsh, Dan Myung, Mark Gaynor, and Steve Moulton. Resuscitation monitoring with a wireless sensor network. In Supplement to Circulation: Journal of the American Heart Association, October 2003.

G.L. Duckworth, D.C. Gilbert, and J.E. Barger. Acoustic counter-sniper system. In SPIE International Symposium on Enabling Technologies for Law Enforcement and Security, 1996.

J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler and K. Pister. System architecture directions for networked sensors. In Proceedings of ACM ASPLOS IX, November 2000.

C.Intanagonwiwat, R.Govindan and D. Estrin. Directed diffusion: A scalable and robust communication paradigm for sensor networks In Proc. Of MobiCOM’00, Boston, Massachussetts, August 2000.

C. Karlof, Y. Li, and J. Polastre. ARRIVE: Architecture for Robust Routing In Volatile Environments. Technical Report UCB/ CSD-03-1233, University of California at Berkeley, Mar.2003.

S. Madden, R. Szewczyk, M. Franklin, and D. Culler. Supporting Aggregate Queries Over Ad-Hoc Wireless Sensor Networks. In 4th IEEE Workshop on Mobile Computing Systems and Applications, June 2002.

F. Stajano, R. Anderson. “The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks”, 3rd AT&T Software Symposium, Middletown, NJ, October 1999.

J. R. Douceur, “The Sybil Attack,” in 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), March 2002.

R. L. Rivest, M.J.B . Robshaw, R. Sidney, and Y.L. Yin, “The RC6 Block Cipher”, AES submission, Jun 1998. u/~rivest/rc6.pdf

Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole detection in wireless ad hoc networks,” Department of Computer Science, Rice University, Tech. Rep. TR01-384, June 2002.

Shafi Goldwasser and Silvio Micali. Probabilistic encryption. Journal of Computer Security, 28:270–299, 1984.

Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium, NDSS ’01, February 2001.

Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, May 2000.

Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. TAG: A tiny aggregation service for ad-hoc sensor networks. In The Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002), 2002.

Samuel R. Madden, Robert Szewczyk, Michael J. Franklin, and David Culler. Supporting aggregate queries over ad-hoc wireless sensor

networks. In Workshop on Mobile Computing and Systems Applications, 2002.

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation. In Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), 1997.

Bruce Schneier. Applied Cryptography, Second Edition. John Wiley & Sons, 1996.

Mihir Bellare, Joe Kilian, and Phillip Rogaway. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 61(3):362-399, December 2000.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.