Wireless sensor network security: A recent review based on state-of-the-art works

Mohammed Faris, M. N. Mahmud, Mohd Syafiq Mohd Salleh, Alhamzah Alnoor
{"title":"Wireless sensor network security: A recent review based on state-of-the-art works","authors":"Mohammed Faris, M. N. Mahmud, Mohd Syafiq Mohd Salleh, Alhamzah Alnoor","doi":"10.1177/18479790231157220","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is applied in many aspects, including surveillance battlefields, patient medical monitoring, building automation, traffic control, environmental monitoring, and building intrusion monitoring. The WSN is made up of a vast number of sensor nodes, which are interconnected through a network. However, despite the growing usage of applications that rely on WSNs, they continue to suffer from restrictions, such as security issues and limited characteristics due to low memory and calculation power. Security issues lead to a lack of communication between sensors, wasting more energy. The need for efficient solutions has increased, especially with the rise of the Internet of Things, which relies on the effectiveness of WSNs. This review focuses on security issues by reviewing and addressing diverse types of WSN assaults that happened on each layer of the WSN that were published in security issues in the previous 3 years. As a consequence, this paper gives a taxonomy of security threats for each layer and different algorithmic solutions that numerous researchers who seek to counter this attack have explored. This study also presents a framework for constructing an intrusion detection system in the WSN by emphasising the drawbacks of each approach suggested by researchers to defend against specific forms of assault. In order to diminish the impact of this attack, this summary shows which attacks the majority of researchers have dealt with as well as which ones they have not yet addressed in their academic work.","PeriodicalId":45882,"journal":{"name":"International Journal of Engineering Business Management","volume":null,"pages":null},"PeriodicalIF":4.9000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Business Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/18479790231157220","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"BUSINESS","Score":null,"Total":0}
引用次数: 5

Abstract

Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is applied in many aspects, including surveillance battlefields, patient medical monitoring, building automation, traffic control, environmental monitoring, and building intrusion monitoring. The WSN is made up of a vast number of sensor nodes, which are interconnected through a network. However, despite the growing usage of applications that rely on WSNs, they continue to suffer from restrictions, such as security issues and limited characteristics due to low memory and calculation power. Security issues lead to a lack of communication between sensors, wasting more energy. The need for efficient solutions has increased, especially with the rise of the Internet of Things, which relies on the effectiveness of WSNs. This review focuses on security issues by reviewing and addressing diverse types of WSN assaults that happened on each layer of the WSN that were published in security issues in the previous 3 years. As a consequence, this paper gives a taxonomy of security threats for each layer and different algorithmic solutions that numerous researchers who seek to counter this attack have explored. This study also presents a framework for constructing an intrusion detection system in the WSN by emphasising the drawbacks of each approach suggested by researchers to defend against specific forms of assault. In order to diminish the impact of this attack, this summary shows which attacks the majority of researchers have dealt with as well as which ones they have not yet addressed in their academic work.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络安全:基于最新研究的最新综述
无线传感器网络(wsn)是电信领域的重要组成部分。WSN的应用领域非常广泛,包括监控战场、患者医疗监控、楼宇自动化、交通控制、环境监控、楼宇入侵监控等。无线传感器网络由大量的传感器节点组成,这些节点通过网络相互连接。然而,尽管越来越多的应用程序依赖于wsn,但它们仍然受到限制,例如由于低内存和计算能力而导致的安全问题和有限的特性。安全问题导致传感器之间缺乏通信,浪费更多的能量。对高效解决方案的需求已经增加,特别是随着物联网的兴起,这依赖于无线传感器网络的有效性。本综述通过回顾和解决过去3年发表在安全问题上的WSN各层发生的各种类型的WSN攻击,重点关注安全问题。因此,本文给出了每个层的安全威胁的分类,以及许多研究人员寻求对抗这种攻击的不同算法解决方案。本研究还提出了一个在WSN中构建入侵检测系统的框架,强调了研究人员提出的防御特定形式攻击的每种方法的缺点。为了减少这种攻击的影响,本摘要显示了大多数研究人员在其学术工作中已经处理过的攻击以及尚未解决的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
7.50
自引率
6.10%
发文量
17
审稿时长
15 weeks
期刊介绍: The International Journal of Engineering Business Management (IJEBM) is an international, peer-reviewed, open access scientific journal that aims to promote an integrated and multidisciplinary approach to engineering, business and management. The journal focuses on issues related to the design, development and implementation of new methodologies and technologies that contribute to strategic and operational improvements of organizations within the contemporary global business environment. IJEBM encourages a systematic and holistic view in order to ensure an integrated and economically, socially and environmentally friendly approach to management of new technologies in business. It aims to be a world-class research platform for academics, managers, and professionals to publish scholarly research in the global arena. All submitted articles considered suitable for the International Journal of Engineering Business Management are subjected to rigorous peer review to ensure the highest levels of quality. The review process is carried out as quickly as possible to minimize any delays in the online publication of articles. Topics of interest include, but are not limited to: -Competitive product design and innovation -Operations and manufacturing strategy -Knowledge management and knowledge innovation -Information and decision support systems -Radio Frequency Identification -Wireless Sensor Networks -Industrial engineering for business improvement -Logistics engineering and transportation -Modeling and simulation of industrial and business systems -Quality management and Six Sigma -Automation of industrial processes and systems -Manufacturing performance and productivity measurement -Supply Chain Management and the virtual enterprise network -Environmental, legal and social aspects -Technology Capital and Financial Modelling -Engineering Economics and Investment Theory -Behavioural, Social and Political factors in Engineering
期刊最新文献
Configurational risks and innovation performance of complex product systems development: A fsQCA lens Entrepreneurship environments and entrepreneurial intention- the role of self efficacy and role model Integrating human factors into the distribution model of goods and fast-moving consumer goods for effective inventory control Towards a framework for successful metaverse adoption in Small and Medium-sized Enterprises: An exploratory study Digital supply chain transformation: The role of smart technologies on operational performance in manufacturing industry
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1