Académique Documents
Professionnel Documents
Culture Documents
Abstract: The wireless sensor networks (WSN) are the network made of various types of sensors for the purpose of various
specific applications. The WSNs are deployed in the various environment, healthcare, pollution-monitoring, traffic-monitoring,
etc purposes. The WSN suffers from various security concerns, which involves the denial of service (DoS), replication attack,
man-in-the-middle attack, selective jamming attacks, etc. The protection of WSN depends upon various factors, which involves
the robustness of the security scheme, which suffers in the various functionalities due to limitation of computational capacity.
An idle security model involves the end to end authentication, data encryption, etc, which must be incorporated to ensure the
prospective security of the sensor network. This paper consists of WSN security issues, security solutions and other related
techniques are discussed in detail. In this work includes the comparison of various techniques. So it has been analyzed that Role-
based access control is better in terms of security than Discretionary access control and Mandatory access control.
Keywords: WSN, Security, Authentication, Security mechanism, Discretionary access control, Mandatory access control, Role-
based access control.
I. INTRODUCTION
Remote Sensor Networks (WSNs) comprise of thousands of small hubs having the ability of detecting, calculation, and remote
correspondences. Many directing, control administration, and information spread conventions have been particularly intended for
WSNs where vitality utilization is a fundamental outline issues. Since remote sensor organize conventions are application particular,
so the concentration has been given to the steering conventions that may vary contingent upon the application and system design.
The investigation of different directing conventions for sensor systems displays a grouping for the different methodologies sought
after. The three principle classes investigated are information driven, various leveled and area based. Each of the directing plans and
calculations has the normal target of attempting to improve throughput and to broaden the lifetime of the sensor organize. To start
with directing calculations for remote sensor systems took after the customary approach of topology based steering. Deadlocks can't
forward the bundles they create or get. These parcels will never achieve their goal and will inevitably be disposed of. There are
multiple geographic (location-oriented) routing mechanisms for the purpose of wireless network security, which is enabled with the
access control protocol:
A. The access control models helps to avoid the connectivity holes, which verifies the security of routing protocol.
B. An efficient routing model must offer resilience to variety of connectivity or localization errors.
C. Also, the routing mechanism must be efficient for the purpose of data forwarding (channel relay) mechanism.
The principle objective is to give stack adjusting among the hubs and to defeat the parcel misfortune and deadlock. Along these
lines, ALBA component performs stack adjusting in view of part of bundles, key era and mark on information. The part of parcels
depends on number of data sources. The typical topology of remote sensor systems includes having many system hubs scattered all
through a particular physical region. There is typically no particular engineering or chain of command set up and along these lines,
the remote sensor systems are thought to be specially appointed systems. An impromptu remote sensor system may work in an
independent form, or it might be associated with different systems, for example, the bigger Internet through a base station. Base
stations are generally more unpredictable than more system hubs and ordinarily have a boundless power supply. With respect to
constrained power supply of remote sensor hubs, spatial reuse of remote data transfer capacity, and the idea of radio correspondence
cost which is a component of the separation transmitted squared, it is perfect to send data in a few littler jumps as opposed to one
transmission over a long correspondence remove.
The latest advancements in the routing models are contained in the various domains related to the information propagation among
the wireless cluster. The efficiency of the routing mechanism is based upon the variety of factors altogether, where the routing
targets are evolved or analyzed for the construction or selection of the routing paths among the given network segment. The
maximum usefulness of the routing mechanism must based upon the handling of multiple aspects, which includes the link quality,
security perspective, link failures, network density, available bandwidth, node energy, etc. The reasons of link failure and security
perspectives of the security models require the layered approach to resolve the issues related to the path failure, connectivity hole,
blackhole, etc on the network, which can be the major reasons behind the data drop in the wireless network. Various network attacks
on the resource availability, like DDoS, DoS, SJ (selective jamming), are the major causes behind the jamming of the networks.
These network attacks are required to be analyzed by the network input data rate analysis, pattern analysis, etc for the incorporation
of the wireless network security.
and TinySec. There are three major factors behind the security of the information and data security, which involves the integrity,
confidentiality and authentication. The security protocols for sensor networks (SPINS) are the schemes for security models, which
includes all required security implications for the implementation of security among the wireless network. Cyclic block cipher
(CBC) models are used to secure the data during the transmissions among the network links. The CBC models are used in the
layered or repetitive architecture to conceal the information in the secure blocks by using the security keys, which secures the data
during the transmissions once they are acquired by the means of sniffing, masquerading or man-in-the-middle (MITM) attacks.
The wireless network of sensors is usually designed for the incorporation of the standalone security atmosphere. The in-depth
testing of the security methods among the networks along with the routing schemes, clustering methods, etc is very important in
order to build the foolproof security models. The wireless networks suffer from the limited battery or energy, which limits the
lifetime of the sensor nodes. The authentication and cryptographic algorithm are the major sources of energy consumption other
than the authentication models, hence there are several types of security models, which require the multi-directional data for the
incorporation of the security models. The access control models are build to verify the integrity of the nodes up to various levels in
order to offer the layered or conditional access of the network. The following sections define the various access control models,
which are popularly used among the wireless networks:
2) The “*-property”, or “no write down” property, allows a subject to write an object only if λ(s) ≤ λ(o). This property addresses
information leakage by malicious programs. It does not allow programs to write information to objects that can be read by
subjects with a less privileged security clearance. A variation on this property called the “strict *-property” requires that
information can be written at, but not above, the subject’s clearance level, formally λ(s) = λ(o).
There is another popular MAC model other than BLP, known as Biba model, which uses the integral information to consider the
authenticity of the users or nodes before assigning the required access to the network resources or services.
Role-based Applied over all 1. Applied over the organizational 1. Role based access control must be very
access control of the users or networks with multiple hierarchies flexible to handle the complex role
connections and versatile departments. combinations.
requesting the 2. Role based access is provided to the 2. Role based access control mechanism
network for different users, which ensures the are required to collect the pre-assigned
versatile access. access to different kinds of data database to map the users and their
varying from user to user according roles.
to the role.
3. Multiple roles can be applied to
some of the users in the special
cases.
IV. CONCLUSION
In this work we analyses of various techniques in the existing algorithm to select the best security technique. We analyzed the three
mechanism Discretionary access control, Mandatory access control and Role-based Access control. Discretionary access Control is
applied over the selected users or connections requesting the network for uniform access, and Mandatory access control is applied
over the highly sensitive networks like, military, space agencies, intelligence agencies, etc., and Role-based access control multiple
roles control is applied over all of the users or connections requesting the network for versatile access. So It has been analyzed that
Role-based access control is better in terms of Security than Discretionary access control and Mandatory access control.
REFERENCES
[1] Bagajewicz, M. J., & Sanchez, M. C. (1999). Design and upgrade of nonredundant and redundant linear sensor networks. AIChE journal, 45(9), 1927-1938.
[2] Bojkovic, Z., & Bakmaz, B. (2008). A survey on wireless sensor networks deployment. WSEAS Transactions on Communications, 7(12), 1172-1181.
[3] Curiac, D. I., Banias, O., Dragan, F., Volosencu, C., & Dranga, O. (2007). Malicious Node Detection in Wireless Sensor Networks Using an Autoregression
Technique. ICNS, 7, 83-88
[4] Curiac, D. I., Volosencu, C., Doboli, A., Dranga, O., & Bednarz, T. (2007). Discovery of malicious nodes in wireless sensor networks using neural
predictors. WSEAS Transactions on Computers Research, 2, 38-43.
[5] DeMers, M. N. (2008). Fundamentals of geographic information systems. John Wiley & Sons.
[6] Petrioli, C., Nati, M., Casari, P., Zorzi, M., & Basagni, S. (2014). ALBA-R: load-balancing geographic routing around connectivity holes in wireless sensor
networks. Parallel and Distributed Systems, IEEE Transactions on, 25(3), 529-539.
[7] Shim, D. S., & Yang, C. K. (2012). U.S. Patent No. 8,122,333. Washington, DC: U.S. Patent and Trademark Office.
[8] Singh, M. P., & Gore, M. M. (2005, January). A solution to sensor network coverage problem. In Personal Wireless Communications, 2005. ICPWC 2005.
2005 IEEE International Conference on (pp. 77-80). IEEE.
[9] Zhang, F., Zhang, W., & Ling, Q. (2012). Non-cooperative game for capacity offload. Wireless Communications, IEEE Transactions on, 11(4), 1565-1575.
[10] Si, Weisheng, Albert Y. Zomaya, and Selvadurai Selvakennedy. "A geometric deployment and routing scheme for directional wireless mesh
networks." Computers, IEEE Transactions on 63, no. 6 (2014): 1323-1335.