Open Access   Article Go Back

A Literature Survey on Security Issues in Next Gen WSN

Beant Kaur1 , Ramanjot Kaur2

Section:Survey Paper, Product Type: Journal Paper
Volume-9 , Issue-4 , Page no. 56-59, Apr-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i4.5659

Online published on Apr 30, 2021

Copyright © Beant Kaur, Ramanjot Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Beant Kaur, Ramanjot Kaur, “A Literature Survey on Security Issues in Next Gen WSN,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.4, pp.56-59, 2021.

MLA Style Citation: Beant Kaur, Ramanjot Kaur "A Literature Survey on Security Issues in Next Gen WSN." International Journal of Computer Sciences and Engineering 9.4 (2021): 56-59.

APA Style Citation: Beant Kaur, Ramanjot Kaur, (2021). A Literature Survey on Security Issues in Next Gen WSN. International Journal of Computer Sciences and Engineering, 9(4), 56-59.

BibTex Style Citation:
@article{Kaur_2021,
author = {Beant Kaur, Ramanjot Kaur},
title = {A Literature Survey on Security Issues in Next Gen WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2021},
volume = {9},
Issue = {4},
month = {4},
year = {2021},
issn = {2347-2693},
pages = {56-59},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5325},
doi = {https://doi.org/10.26438/ijcse/v9i4.5659}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i4.5659}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5325
TI - A Literature Survey on Security Issues in Next Gen WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Beant Kaur, Ramanjot Kaur
PY - 2021
DA - 2021/04/30
PB - IJCSE, Indore, INDIA
SP - 56-59
IS - 4
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
341 338 downloads 201 downloads
  
  
           

Abstract

Next Gen WSN plays an important role in many fields like environment monitoring, transportation security, military, catastrophic area, health, medical, industry so on. However, the most noticeable feature of Next Gen WSN propagates various types of data such as text, image , videos. There are a lot of papers about Next Gen WSN and maximum papers have focused on how to save the energy of WSN. Saving energy in the form of batteries is challenging when integrating security mechanisms. For efficient secure mechanisms we conducted a survey in this paper and tried to find a solution through which we can propose an approach in which secure communication performs with low battery consumption.

Key-Words / Index Term

WSN; Security; Authentication; Attacks, Next Gen WSN

References

[1] Akyildiz, Ian F., et al. "A survey on sensor networks." Communications magazine, IEEE 40.8 : 102-114, 2002.
[2] Ling, Chung-Huei, et al. "A Secure and Efficient One-time Password Authentication Scheme for WSN." International Journal of Network Security19.2 : 177-181, 2017.
[3] Tsuji, Takasuke, and Akihiro Shimizu. "One-time password authentication protocol against theft attacks." IEICE transactions on communications 87.3 : 523-529, 2004.
[4] Arampatzis, Th, John Lygeros, and Stamatis Manesis. "A survey of applications of wireless sensors and wireless sensor networks." Intelligent Control, 2005. Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation. IEEE, 2005.
[5] Tsudik, Gene. "Message authentication with one-way hash functions." INFOCOM`92. Eleventh Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE. IEEE, 1992.
[6] Wang, Yong, Garhan Attebury, and Byrav Ramamurthy. "A survey of security issues in wireless sensor networks." (2006).
[7] Dogra, Heena, and Jyoti Kohli. "Secure Data Transmission using Cryptography Techniques in Wireless Sensor Networks: A Survey." Indian Journal of Science and Technology 9.47 (2016).
[8] Lamport, Leslie. "Password authentication with insecure communication."Communications of the ACM 24.11 (1981): 770-772.
[9] SHABANA, K., FIDA, N., KHAN, F., JAN, S., REHMAN, M.. Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), North America, 5, jul. 2016.
[10] F. Büsching and L. Wolf, "The Rebirth of One-Time Pads—Secure Data Transmission from BAN to Sink," in IEEE Internet of Things Journal, vol. 2, no. 1, pp. 63-71, Feb. 2015.
[11] V. P. Singh, M. Hussain and C. K. Raina, "Authentication of base station by HDFS using trust based model in WSN," 2016 International Conference on Communication and Electronics Systems (ICCES), Coimbatore, pp. 1-5, 2016.
[12] G. W. Choi and I. Y. Lee, "A key distribution system for user authentication using pairing-based in a WSN," 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-4.
[13] S. S. Abd El dayem, M. R. M. Rizk and M. A. Mokhtar, "An efficient authentication protocol and key establishment in dynamic WSN," 2016 6th International Conference on Information Communication and Management (ICICM), Hatfield, 2016, pp. 178-182.
[14] A. H. Moon, U. Iqbal and G. M. Bhat, "Light weight Authentication Framework for WSN," 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, 2016, pp. 3099-3105.
[15] P. Joshi, M. Verma and P. R. Verma, "Secure authentication approach using Diffie-Hellman key exchange algorithm for WSN," 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), Kumaracoil, 2015, pp. 527-532.
[16] P. Banerjee, T. Chatterjee and S. DasBit, "LoENA: Low-overhead encryption based node authentication in WSN," 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Kochi, 2015, pp. 2126-2132.
[17] Mohamed Hammi, Erwan Livolant, Patrick Bellot, Ahmed Serhrouchni, Pascale Minet. A Lightweight IoT Security Protocol. 1st Cyber Security in Networking Conference (CSNet2017), Oct 2017, Rio de Janeiro, Brazil.
[18] Armando, Alessandro, et al. "The AVISPA tool for the automated validation of internet security protocols and applications." International conference on computer aided verification. Springer, Berlin, Heidelberg, 2005.