Survey On Advanced Data Communication Using Protocol
Survey On Advanced Data Communication Using Protocol
https://doi.org/10.22214/ijraset.2021.33005
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 9 Issue II Feb 2021- Available at www.ijraset.com
Abstract: There are various remote sensor organization (WSN) applications being created day to day. These applications range
from straightforward natural checking, for example, gathering temperatures in an agrarian ranch to complex applications, for
example, observing front lines. As the applications increment so are the assaults. Subsequently, a few security conventions have
been acquainted with be utilized with the various applications which have changing security necessities; this infers that the
decision for the WSNs application ought to be very much thought of. This paper talks about the remote sensor organization
security prerequisites, the most well-known assaults and the most mainstream conventions utilized with WSNs. Center is likewise
given to the qualities and restrictions of WSN security conventions to empower planners of the WSNs pick the correct convention
for their applications.
Keywords: WSN, Access control, Framework, Private key, Cloud computing
I. INTRODUCTION
A wireless sensor network (WSNs) contains numerous indistinguishable hubs with restricted assets. Sensor hubs impart remotely
and they brilliantly measure flags and send information over the organizations. These hubs are typically spread over the entire
organization region for observing, information assortment, handling, and sending to a base station to handle further (Sharma, Chaba
and Singh, 2010). The Sensors are little in size, restricted in terms of intensity and their expense is regularly low.
Sensors have the accompanying capacities:
correspondence is over short distances, they can detect or peruse information from the climate, furthermore, their information
handling capacity is restricted. Regularly sensor works at 2.4 GHz recurrence, 250Kbps information rate, streak memory is 128KB,
memory of 512KB for reason for recording estimations, they communicate powers going from 100uW and 1mW, and
correspondence range is between 30m to 100m. Accordingly, the best plan thought ought to be energy proficiency of WSN
conventions (Uluagac et al., 2008). The best test for WSNs are security issues, and for certain sensor networks applications, similar
to medical care applications and military applications security turns out to be significantly more critical. These challenges are as per
the following;
I. It's hard to ensure remote correspondence since it is finished by broadcasting. Bundles can be infused, snoopping is a probability,
capture of moving information, and information sent can be modified effectively by enemies.
ii. The WSNs might be introduced in conditions that are possibly shaky; where there is a chance for enemies to take on the
appearance of approved hubs in the organization, and hubs taking can happen.
iii. The WSNs are vulnerable to assaults of utilization of assets. Aggressors can squander network data transmission and often send
bundles to debilitate a hub battery. Because of these elements, it's basic for the delicate computerized data to be safely sent over the
sensor organizations.
A. Accessibility
This is a security administration that verifies whether a given hub can use the assets and additionally if the organization is accessible
to impart messages. The WSN can be imperiled if the sink (base station) or group head comes up short. Accordingly accessibility is
significant for an organization to be operational (Padmavathi and Shanmugapriya, 2009). The accessibility security administration
for WSNs has been taken a gander at top to bottom from the Denialof-Service (DoS) type assaults measurement in expansion,
properties for interfacing WSNs as concerns accessibility has additionally been concentrated in extraordinary length (Uluagac et al.,
2008).
B. Approval/Access control
This guarantees that lone approved clients and gadgets approach the WSN.
C. Confirmation
This security necessity guarantees that there is legitimate correspondence from an offered hub to another hub; this implies an
untrusted hub can't imagine as a confided in hub (Rajkumar.et al., 2012.).
D. Secrecy
Secrecy is alluded to as the ability to conceal messages from any given foe (aggressor) to guarantee any message sent through the
WSN is secret (Padmavathi and Shanmugapriya, 2009). In case an adversary, gets to the substance, he ought to not have the option
to interpret the messages traded in the organization. To give a secret security administration to WSNs applications you require the
utilization of cryptographic instruments, for example, encryption strategies. By and large, two sorts of encryption approaches are
utilized;
1) Symmetric encryption
2) Unbalanced encryption.
Symmetric encryption utilizes the indistinguishable key at both the sender and collector hubs to encode and unscramble the data
from plain content to encode text and the other way around. While lopsided key based encryption, utilizes different keys, one public
and the other private which are utilized to change over and recuperate the data (Uluagac et al., 2008).
There is no single encryption component that one can guarantee is superior to another as it is essentially an issue to do with size of
the key and the computational exertion that can be used to break the encryption calculation.
Another feature to privacy research in WSNs is on issue of planning effective key the board plans. The keys must continuously be
accessible to all the hubs imparting and this guarantees security of channels is kept up (Uluagac et al., 2008). The way toward
overseeing keys includes two essential advances;
a) Key age
b) Keys appropriation
This cycle is set off by keying occasions like organization assault. Nonetheless, it is anything but a straightforward undertaking and
in various applications it very well might be overpowering activity to go toeach and every sensor considering their numerous
numbers and updating of their keys, for-example underwater sensor applications. Therefore, management of keys intelligently is
essential for WSNs (Uluagac et al., 2008).
E. Integrity
Trustworthiness is essentially affirmation of a message not being changed, altered or then again changed (Padmavathi and
Shanmugapriya, 2009). On the message content a substance digest is added to give uprightness of content traded. On receipt of
message by the getting hub content condensation is checked to affirm that substance digest processed and gotten digest are
equivalent. When affirmed to be equivalent or same at that point it's treated as a genuine message.
Hashing calculations are utilized to make content condensations (Uluagac et al., 2008). There are a few calculations for hashing
accessible and these calculations don't as a rule require the keys presence except if planned explicitly to work with keyed-hashing
forexample Keyed-Hashing for message Validation Code (HMAC) and Cipherbased Message Authentication Code (CMAC)
(Uluagac et al., 2008). Respectability administration checks information lifelessness since a few choices for certain applications
relies upon whether the information is later or it's not. For-instance, waters of a given region can be ensured with sinks exploded
mines. Message newness and its exact planning from the sensor hubs in this sort of application are basic (Uluagac et al., 2008).
Honesty administration likewise is intended to give a component for recuperation from any substance that has been changed
(Uluagac et al., 2008).
F. Non-repudiation
Non-repudiation security service ensuresthat a node cannot deny the messages it hassent (Rajkumar et al., 2012). To offer
nonrepudiation service digital signature scheme (DSS), which utilizes encryption methods,can be used. DSS can use either
symmetricor asymmetric encryptions (Uluagac et al., 2008).
When you use symmetric encryption theWSN may be in danger of another sensormasquerading as the sensor’s originalsignature.
On the other hand, using asymmetric encryption may be expensive. Basically non-repudiation service facilitatesthe approval by
another entity for messagesent or received in WSNs. Therefore, alegitimate node, such as the base station(sink) can offer the service
(Uluagac et al.,2008).
G. Data Freshness
This guarantees that the data over the WSNis current and not replicated
H. Robustness
This guarantees that in the event of somenodes being compromised, the WSNcontinues to operate.
I. Self-organization
This ensures that the sensor nodes areindependent and can be flexible in the eventof adding new nodes or some nodes fail.WSNs are
basically ad hoc networks; thischaracteristic makes it prone to securityissues. Therefore, in the circumstance self-organization and
self-healing is impossiblethen the damage could be overwhelming.
J. Time Synchronization
WSNs applications rely on timesynchronization for purposes such as; powerconservation, packets end-to-end delaycomputation, and
group synchronization fortracking applications.
K. Secure Localization
This is a requirement for the sensor nodes tobe able to securely identify its location(Pathak &Quaz, 2017)3. Attacks on Wireless
Sensor Networks Wireless sensor networks attacks are categorized by different authors as follows;
1) Active attacks and passive attacks. The active attacks modify data and include Blackhole, Sybil, HELLO Flood attack, denial of
service and wormhole attack. The passive attacks are such as; attacks against privacy, eavesdropping and traffic analysis
(Padmavathi&Shanmugapriya, 2009).
2) According to Sunitha&Chandrakanth (2012), wireless sensor networks attacks are in three categories;
a) Secrecy and authentication attacks –These attacks are such as spoofing, eavesdropping, and packet replay attacks.
b) Attacks on network availabilityThese attacks are also known as denial-of-service (DoS) attacks.
c) Stealthy attack against service integrity-The attacker makes the WSN acknowledge a false data value. E.g. through injection of
false data value.
3) Attacks against security mechanism and attacks against routing mechanisms (Pathan, Lee & Hong, 2006)
thisensures LEDS reports are authenticated byseveral next-hop nodes separately. Thismeans that no reports disappear due to
beingdropped by a single node. (Devi et al., 2011) LEDS ensures a very high level of securitywithout considering the costs
forcommunication and computing in additionLEDS provides data confidentiality andnode capture attacks to a reasonable level
(Ahmed, 2009).
IV. CONCLUSION
In the face of myriad of challenges facing WSNs architects of WSNs are confronted with hard decision of security convention to
actualize. This paper has summed up the distinctive security prerequisites for WSNs, the security conventions and the security
prerequisites they accomplish and of significance a outline has been given to show the qualities and constraints of every one of the
security convention. This will go in convenient to help facilitate the cycle of decision of security convention to be actualized in
different applications.
REFERENCES
[1] Aseri, T. C., &Singla, N. (2011).Enhanced Security Protocol in Wireless Sensor Networks. International Journal of Computers Communications & Control,
6(2), 214-221.
[2] Bhalla, M., Pandey, N., & Kumar, B. (2015, October). Security protocols for wireless sensor networks. In Green Computing and Internet of Things (ICGCIoT),
2015 International Conference on (pp. 1005-1009). IEEE.
[3] Boyle, D., &Newe, T. (2007, March). Security protocols for use with wireless sensor networks: A survey of security architectures. In Wireless and Mobile
Communications, 2007.ICWMC'07. Third International Conference on (pp. 54-54). IEEE.
[4] Devi, S. A., Babu, R. V., & Rao, B. S. (2011).A new approach for evolution of end to end security in wireless sensor network.International Journal on
Computer Science and Engineering, 3(6), 2531-2543.
[5] Dutta, R., Gupta, S., & Paul, D. (2014, December). Energy efficient modified spin protocol with high security in wireless sensor networks using tossim. In
Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on (pp. 290- 294). IEEE.
[6] Karlof, C., Sastry, N., & Wagner, D. (2004, November).TinySec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd
international conference on Embedded networked sensor systems (pp. 162-175). ACM.
[7] Lighfoot, L.E., Jian R. &Tongtong L.(2009). An Energy Efficient Link-Layer Security Protocol for Wireless Sensor Networks. IEEE EIT Proceedings (pp 233-
238).
[8] Padmavathi, D. G., &Shanmugapriya, M. (2009).A survey of attacks, security mechanisms and challenges in wireless sensor networks.arXiv preprint arXiv:
0909.0576.
[9] Park, T., & Shin, K. G. (2004).LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded Computing Systems
(TECS), 3(3), 634-660.
[10] Pathak, P. &Quaz, M,A. (2017), Issues, Challenges and Solution for Security in Wireless Sensor Networks: A Review International Journal of Electrical,
Electronics ISSN No. (Online): 2277-2626 and Computer Engineering 6(1).
[11] Pathan, A. S. K., Lee, H. W., & Hong, C. S. (2006, February). Security in wireless sensor networks: issues and challenges. In Advanced Communication
Technology, 2006.ICACT 2006.The 8th International Conference (Vol. 2, pp. 6-pp).IEEE.
[12] Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless networks, 8(5), 521-534.
[13] Ren, K., Lou, W., & Zhang, Y. (2008). LEDS: Providing locationaware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile
Computing, 7(5), 585-598.
[14] Sharma, R., Chaba, Y., & Singh, Y. (2010). Analysis of security protocols in wireless sensor network. International journal of advanced networking and
applications, 2(3), 707-713.
[15] Sunitha, K., &Chandrakanth, H. (2012). A survey on security attacks in wireless sensor network. International Journal of Engineering Research and
Applications (IJERA), 2(4), 1684-1691.
[16] Uluagac, A. S., Lee, C. P., Beyah, R. A., & Copeland, J. A. (2008, October).Designing Secure Protocols for Wireless Sensor Networks.In WASA (pp. 503-
514).
[17] Zhu, S., Setia, S., &Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor
Networks (TOSN), 2(4), 500-528.