Sensor Network Security: A Survey

被引:305
作者
Chen, Xiangqian [1 ,2 ]
Makki, Kia [1 ]
Yen, Kang [1 ,2 ]
Pissinou, Niki [1 ]
机构
[1] Florida Int Univ, Telecommun & Informat Technol Inst, Miami, FL 33199 USA
[2] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33199 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2009年 / 11卷 / 02期
基金
美国国家科学基金会;
关键词
Sensor networks; Security; Ad hoc networks; Survey; key management; Attack detections and preventions; Secure routing; Secure location; Secure data aggregation; Node compromise; MOBILE AD HOC; INJECTED FALSE DATA; ATTACKS; SCHEME; ISSUES; MODEL;
D O I
10.1109/SURV.2009.090205
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As sensor networks become wide-spread, security issues become a central concern, especially in mission-critical tasks. In this paper, we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analysis first. Then we give a holistic overview of security issues. These issues are divided into seven categories: cryptography, key management, attack detections and preventions, secure routing, secure location security, secure data fusion, and other security issues. Along the way we analyze the advantages and disadvantages of current secure schemes in each category. In addition, we also summarize the techniques and methods used in these categories, and point out the open research issues and directions in each area.
引用
收藏
页码:52 / 73
页数:22
相关论文
共 153 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
Al-Wakeel SS, 2007, IEEE WCNC, P4159
[3]  
An D, 2007, IEEE WCNC, P2497
[4]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[5]  
Anjum F., 2006, Proc. 5th ACM workshop on Wireless Security, Los Angeles, P21, DOI DOI 10.1145/1161289.1161293
[6]  
[Anonymous], TR0507 RPI COMP SCI
[7]  
[Anonymous], 2003, Computer Networks
[8]  
[Anonymous], P 12 IEEE INT C NETW
[9]  
[Anonymous], P 6 INF SEC C ISC
[10]  
[Anonymous], 2003, P 1 ACM WORKSHOP SEC, DOI DOI 10.1145/986858.986868