Research and classification of information security mechanisms in sensor networks
DOI:
https://doi.org/10.18372/2410-7840.18.10112Keywords:
wireless sensor network, protocol, ZigBee technology, IEEE 802.15.4 standard, routingAbstract
The paper analyzed the modern wireless sensor networks characteristics and prospects of development. Considered the most popular standards used for their construction. The basic requirements for the devices that make up the modern architecture of wireless sensor networks, including high energy efficiency, portability, autonomy, ware shown.It was considered the basic types of existing network protocols used in sensor networks according to the reference open systems interconnection model, including physical, data link, network, transport and application levels, related the problems of information security. Were identified problem areas of protection and classification systematically various types of attacks in sensor networks. It is shown that the main objectives of information security in wireless sensor networks can be divided into primary (confidentiality, integrity, authentication and data availability) and minor (fresh data, self-organization, time synchronization, localization protected). This in turn has provided an opportunity to offer enhanced security classification mech-anisms in them, which minimizes potential damage from various types of attacks.References
Dunkels, A. Distributed TCP caching for wireless sensor networks / A. Dunkels, J.Alonso , T.Voigt , and H.Ritter // In Proceedings of the 3rd AnnualMediterranean Ad Hoc Networking Workshop (MedHoc-Net). - 2004.
Xiang, L. Design Of Household Control System Based On ZigBee, GSM and TCP/IP Protocol / L. Xiang // 10th IEEE International Conference on Control and Automation (ICCA). - 2013. - 1372-1375 pp.
Heinzelman, W.R. Energy-Efficient Communication Protocol for Wireless Microsensor Networks / W.R. Heinzelman, A.Chandrakasan , and H.Balakrishnan // IEEE Proceedings of the 33rd Hawaii International Conference on System Sciences. - 2000. - 1–10 pp.
Akl, A. An investigation of self-organization in wireless sensor networks / A. Akl, T.Gayraud , and P.Berthou // IEEE International Conference on Networking, Sensing and Control (ICNSC). - 2001. - 1-6 pp.
Sohrabi, K. Protocols for Self-Organization of a Wireless Sensor Network / K. Sohrabi, J.Gao , V.Ailawadhi and G.J. Pottie // Personal Communications, IEEE. - October 2000. - Vol. 7. - N5. - 16–27 pp.
"IEEE 802.15.4a: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)" – Institute of Electrical and Electronics Engineers, 2007
Баскаков С. С. Исследование способов повышения эффективности маршрутизации по виртуальным координатам в беспроводных сенсорных сетях // Вестник МГТУ им. Баумана. Сер. Приборостроение. 2009. № 2. С. 112–124.
ZigBee Alliance [Электронный ресурс] URL: http://www.zigbee.org/
Chris Karlof, David Wagner, “Secure Rout-ing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks (elsevier), Page: 299 – 302, year 2003.
Culpepper B.J., Tseng H.C. Sinkhole intrusion indicators in DSR MANETs // Proc. First International Conference on Broad band Net-works. 2004. – Pp. 681–688.
Hu Y., C. Perrig, Johson D.B. Packet leashes: a defense against wormhole attacks in wireless net-works // Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, – Voume 3. – 3 April 2003. – Pp. 1976–1986.
Blackert W.J., Gregg D.M., Castner A.K., Kyle E.M., Hom R.L., and Jokerst R.M. Analyzing interaction between distributed denial of service attacks and mitigation tech-nologies // Proc. DARPA Information Surviva-bility Conference and Exposition, – Volume 1. – 24 April, – 2003. – Pp. 26–36.
Pathan A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication ech-nology (ICACT), Page(s):6, 2006.
Zia T.; Zomaya A., “Security Issues in Wireless Sensor Networks”, Systems and Networks Communications (ICSNC) Page(s): 40 – 40 , year 2006.
Adrian Perrig, John Stankovic, David Wag-ner, “Security in Wireless Sensor Networks” Communications of the ACM, Page 53 – 57, year 2004.
[Электронный ресурс] URL: http://sibac.info/stud-conf/tech/xxxii/42203
15.4 IEEE Standard for Information technology – Telecommunications and information exchange be-tween systems – Local and metropolitan area networks – Specific requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs). Published by The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016-5997, USA.
Скуснов А.. ZigBee: взгляд вглубь // Компоненты и технологи. – 2005. – № 4.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).