Skip to main content

Wireless Sensor Network Security for Cyber-Physical Systems

  • Chapter
  • First Online:
Cyber Security for Cyber Physical Systems

Part of the book series: Studies in Computational Intelligence ((SCI,volume 768))

Abstract

Wireless Sensor Networks (WSNs) have become a prominent technology for many applications due to its various advantages and feasibility. It has been applied in government, military, transport, health care, education, business, and environment applications. WSN makes sensing, tracking, monitoring, and automation much simpler, effective, and efficient as compared to its predecessor technologies. Due to its vast implementations and immense potential, it has also attracted many threats and vulnerabilities along its path to advancement. This chapter reviews the existing literature and discusses the security issues related to WSN and the challenges in addressing them.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Abouei, J., Brown, J. D., Plataniotis, K. N., & Pasupathy, S. (2011). Energy efficiency and reliability in wireless biomedical implant systems. IEEE Transactions on Information Technology in Biomedicine, 15, 456–466.

    Article  Google Scholar 

  • Almasri, M., Elleithy, K., Bushang, A., & Alshinina, R. (2013). Terp: A trusted and energy efficient routing protocol for wireless sensor networks (WSNs). In Proceedings of the 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications, 2013 (pp. 207–214). IEEE Computer Society.

    Google Scholar 

  • Amini, F., MiÅ¡ic, V. B., & MiÅ¡ic, J. (2007). Intrusion detection in wireless sensor networks. Security in Distributed, Grid, Mobile, and Pervasive Computing, pp. 111

    Google Scholar 

  • Anand, M., Cronin, E., Sherr, M., Blaze, M., Ives, Z., & Lee, I. (2006). Security challenges in next generation cyber physical systems. In Beyond SCADA: Networked Embedded Control for Cyber Physical Systems

    Google Scholar 

  • Anderson, R., Chan, H., & Perrig, A. (2004). Key infection: Smart trust for smart dust. In. ICNP 2004. Proceedings of the 12th IEEE International Conference on Network Protocols, 2004 (pp. 206–215). New York: IEEE.

    Google Scholar 

  • Araujo, A., Blesa, J., Romero, E., & Villanueva, D. (2012). Security in cognitive wireless sensor networks. Challenges and open problems. EURASIP Journal of Wireless Communications and Networking, 2012, 48.

    Google Scholar 

  • Ashraf, N., Bohnet, I., & Piankov, N. (2006). Decomposing trust and trustworthiness. Experimental Economics, 9, 193–208.

    Article  Google Scholar 

  • Baig, W. A., Khan, F. I., Kim, K.-H., & Yoo, S.-W. (2012). Privacy assuring protocol using simple cryptographic operations for smart metering. International Journal of Multimedia and Ubiquitous Engineering, 7, 315–322.

    Google Scholar 

  • Bao, F., Chen, I.-R., Chang, M., & Cho, J.-H. (2011a). Hierarchical trust management for wireless sensor networks and its application to trust-based routing. In Proceedings of the 2011 ACM Symposium on Applied Computing (pp. 1732–1738). ACM, New York.

    Google Scholar 

  • Bao, F., Chen, R., Chang, M., & Cho, J.-H. (2011b). Trust-based intrusion detection in wireless sensor networks. In 2011 IEEE International Conference on Communications (ICC) (pp. 1–6). New York: IEEE.

    Google Scholar 

  • Bao, F., Chen, R., Chang, M., & Cho, J.-H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9, 169–183.

    Article  Google Scholar 

  • Becher, A., Benenson, Z., & Dornseif, M. (2006). Tampering with Motes: Real-world physical attacks on wireless sensor networks. In J. A. Clark, R. F. PAIGE, F. A. C. Polack, & P. J. Brooke (Eds.), Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18–21, 2006. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg.

    Google Scholar 

  • Benenson, Z., Cholewinski, P. M., & Freiling, F. C. (2008). Vulnerabilities and attacks in wireless sensor networks. Wireless Sensors Networks Security, pp. 22–43.

    Google Scholar 

  • Blaze, M., Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In IEEE Symposium on Security and Privacy (pp. 164–173). New York: IEEE.

    Google Scholar 

  • Blilat, A., Bouayad, A., El Houda Chaoui, N., & Ghazi, M. (2012). Wireless sensor network: Security challenges. In 2012 National Days of Network Security and Systems (JNS2), 2012 (pp. 68–72). New York: IEEE.

    Google Scholar 

  • Boukerch, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30, 2413–2427.

    Article  Google Scholar 

  • Boukerche, A., Oliveira, H., Nakamura, E. F., & Loureiro, A. A. (2008). Secure localization algorithms for wireless sensor networks. IEEE Communications Magazine, 46, 96–101.

    Article  Google Scholar 

  • Byers, J., & Nasser, G. (2000). Utility-based decision-making in wireless sensor networks. In 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing, 2000. MobiHOC (pp. 143–144). New York: IEEE.

    Google Scholar 

  • Cardenas, A., Amin, S., & Sastry, S. (2008). Secure control towards survivable cyber-physical systems. In 28th International Conference on Distributed Computing Systems Workshops, 2008. ICDCS ‘08. Beijing: IEEE.

    Google Scholar 

  • Che, S., Feng, R., Liang, X., & Wang, X. (2015). A lightweight trust management based on Bayesian and Entropy for wireless sensor networks. Security and Communication Networks, 8, 168–175.

    Article  Google Scholar 

  • Chen, H., Gu, G., Wu, H., & Gao, C. (2007a). Reputation and trust mathematical approach for wireless sensor networks. International Journal of Multimedia and Ubiquitous Engineering, pp. 23–32.

    Google Scholar 

  • Chen, H., Wu, H., Zhou, X., & Gao, C. (2007b). Reputation-based trust in wireless sensor networks. In International Conference on Multimedia and Ubiquitous Engineering, 2007. MUE’07 (pp. 603–607). New York: IEEE.

    Google Scholar 

  • Choi, J.-H., Choi, C., Ko, B.-K., & Kim, P.-K. (2012). Detection of cross site scripting attack in wireless networks using n-Gram and SVM. Mobile Information Systems, 8, 275–286.

    Article  Google Scholar 

  • Cinque, M., Cotroneo, D., De Caro, G., & Pelella, M. (2006). Reliability requirements of wireless sensor networks for dynamic structural monitoring. In International Workshop on Applied Software Reliability (WASR 2006) (pp. 8–13).

    Google Scholar 

  • Cowan, C., Wagle, P., Pu, C., Beattie, S., & Walpole, J. (2000). Buffer overflows: Attacks and defenses for the vulnerability of the decade. In Proceedings of DARPA Information Survivability Conference and Exposition, 2000. DISCEX’00 (pp. 119–129). New York: IEEE.

    Google Scholar 

  • Crosby, G. V., Hester, L., & Pissinou, N. (2011). Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks. IJ Network Security, 12, 107–117.

    Google Scholar 

  • Crosby, G. V., & Pissinou, N. (2007). Cluster-based reputation and trust for wireless sensor networks. In Consumer Communications and Networking Conference

    Google Scholar 

  • Dhulipala, V. S., Karthik, N., & Chandrasekaran, R. (2013). A novel heuristic approach based trust worthy architecture for wireless sensor networks. Wireless Personal Communications, 70, 189–205.

    Article  Google Scholar 

  • Du, X., Xiao, Y., Chen, H. H., & Wu, Q. (2006). Secure cell relay routing protocol for sensor networks. Wireless Communications and Mobile Computing, 6, 375–391.

    Article  Google Scholar 

  • Egan, D. (2005). The Emergence of ZigBee in building automation and industrial controls. Computing and Control Engineering, 16, 14–19.

    Article  Google Scholar 

  • Estrin, D., Govindan, R., Heidemann, J., & Kumar, S. (1999). Next century challenges: Scalable coordination in sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (pp. 263–270). New York: ACM.

    Google Scholar 

  • Fatema, N., & Brad, R. (2014). Attacks and counterattacks on wireless sensor networks. arXiv preprint arXiv:1401.4443.

  • Fernandez-Gago, M. C., Roman, R., & Lopez, J. (2007). A survey on the applicability of trust management systems for wireless sensor networks. In Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007 (pp. 25–30). New York: IEEE.

    Google Scholar 

  • Fraley, C. (1998). Algorithms for model-based Gaussian hierarchical clustering. SIAM Journal on Scientific Computing, 20, 270–281.

    Article  MathSciNet  MATH  Google Scholar 

  • Franzèn, J. (2008). Bayesian cluster analysis. Ph.D. Doctrate, Stockholm.

    Google Scholar 

  • Ganeriwal, S., Balzano, L. K., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN), 4, 15.

    Article  Google Scholar 

  • Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14, 279–298.

    Article  Google Scholar 

  • Han, G., Jiang, J., Shu, L., Niu, J., & Chao, H.-C. (2014). Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences, 80, 602–617.

    Article  MATH  Google Scholar 

  • Hardin, R. (2002). Trust and trustworthiness. Russell Sage Foundation.

    Google Scholar 

  • Hsu, M.-T., Lin, F. Y.-S., Chang, Y.-S., & Juang, T.-Y. (2007). The reliability of detection in wireless sensor networks: Modeling and analyzing. In Embedded and ubiquitous computing. Berlin: Springer.

    Google Scholar 

  • Huang, S.-I., Shieh, S., & Tygar, J. (2010). Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16, 915–927.

    Article  Google Scholar 

  • Jadidoleslamy, H. (2014). A comprehensive comparison of attacks in wireless sensor networks. International Journal of Computer Communications and Networks (IJCCN), 4.

    Google Scholar 

  • Jiang, T., & Baras, J. S. (2004). Ant-based adaptive trust evidence distribution in MANET. In Proceedings. 24th International Conference on Distributed Computing Systems Workshops, 2004 (pp. 588–593). New York: IEEE.

    Google Scholar 

  • Jsang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference (pp. 41–55).

    Google Scholar 

  • Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The Eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web, 2003 (pp. 640–651). New York: ACM.

    Google Scholar 

  • Karthik, N., & Karthik, J. (2014). Trust worthy framework for wireless sensor networks. International Journal of Computer Science & Engineering Technology (IJCSET), 5, 478–480.

    Google Scholar 

  • Kaur, D., & Singh, P. (2014). Various OSI layer attacks and countermeasure to enhance the performance of WSNs during wormhole attack. International Journal on Network Security, 5(1), 6.

    Google Scholar 

  • Khalid, O., Khan, S. U., Madani, S. A., Hayat, K., Khan, M. I., Min-Allah, N., et al. (2013). Comparative study of trust and reputation systems for wireless sensor networks. Security and Communication Networks, 6, 669–688.

    Article  Google Scholar 

  • Kim, T. K., & Seo, H. S. (2008). A trust model using fuzzy logic in wireless sensor network. World Academy of Science, Engineering and Technology, 42, 63–66.

    Google Scholar 

  • Kinney, P. (2003). Zigbee technology: Wireless control that simply works. In Communications Design Conference (pp. 1–7).

    Google Scholar 

  • Kumar, V., Jain, A., & Barwal, P. (2014). Wireless sensor networks: Security issues, challenges and solutions. International Journal of Information & Computation Technology, pp. 0974–2239.

    Google Scholar 

  • Lee, K. (2000). IEEE 1451: A standard in support of smart transducer networking. In Instrumentation and Measurement Technology Conference, 2000. IMTC 2000. Proceedings of the 17th IEEE, 2000 (pp. 525–528). New York: IEEE.

    Google Scholar 

  • Lewis, F. L. (2004). Wireless sensor networks, smart environments: Technologies, protocols, and applications (pp. 11–46).

    Google Scholar 

  • Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, pp. 924–935.

    Google Scholar 

  • Li, Z., & Gong, G. (2008). Survey on security in wireless sensor. Special English Edition of Journal of KIISC, 18, 233–248.

    Google Scholar 

  • Liu, A. X., Kovacs, J. M., Huang, C.-T., & Gouda, M. G. A secure cookie protocol. In Proceedings of 14th International Conference on Computer Communications and Networks, 2005, San Diego, California, USA (pp. 333–338). New York: IEEE.

    Google Scholar 

  • Liu, Z., Joy, A. W., & Thompson, R. A. (2004). A dynamic trust model for mobile ad hoc networks. In Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004 (pp. 80–85). New York: IEEE.

    Google Scholar 

  • Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33, 1086–1093.

    Article  Google Scholar 

  • Lopez, J., Roman, R., & Alcaraz, C. (2009). Analysis of security threats, requirements, technologies and standards in wireless sensor networks. In Foundations of security analysis and design V. Berlin: Springer.

    Google Scholar 

  • López, J., & Zhou, J. (2008). Wireless sensor network security. Amsterdam: IOS Press.

    Google Scholar 

  • Lynch, C. (1999). Canonicalization: A fundamental tool to facilitate preservation and management of digital information. D-Lib Magazine, 5, 17–25.

    Article  Google Scholar 

  • Mahmood, M. A., Seah, W. K., & Welch, I. (2015). Reliability in wireless sensor networks: A survey and challenges ahead. Computer Networks, 79, 166–187.

    Article  Google Scholar 

  • Mármol, F. G., & Pérez, G. M. (2009). TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In IEEE International Conference on Communications, 2009 (pp. 1–5). ICC’09. New York: IEEE.

    Google Scholar 

  • Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32, 185–196.

    Article  Google Scholar 

  • Miao, C.-Y., Dai, G.-Y., & Chen, Q.-Z. (2015). Cooperative localization and location verification in WSN. In Human centered computing. Berlin: Springer.

    Google Scholar 

  • Mohammadi, S., & Jadidoleslamy, H. (2011a). A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.

  • Mohammadi, S., & Jadidoleslamy, H. (2011b). A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks, 2, 24–42.

    Article  Google Scholar 

  • Momani, M., Aboura, K., & Challa, S. (2007a). RBATMWSN: Recursive Bayesian approach to trust management in wireless sensor networks.

    Google Scholar 

  • Momani, M., & Challa, S. (2008). GTRSSN: Gaussian trust and reputation system for sensor networks. In Advances in computer and information sciences and engineering. Berlin: Springer.

    Google Scholar 

  • Momani, M., & Challa, S. (2010). Survey of trust models in different network domains. International Journal of Ad Hoc, Sensor & Ubiquitous Computing, 1, 1–19.

    Article  Google Scholar 

  • Momani, M., Challa, S., & Aboura, K. (2007b). Modelling trust in wireless sensor networks from the sensor reliability prospective. In Innovative algorithms and techniques in automation, industrial electronics and telecommunications. Berlin: Springer

    Google Scholar 

  • Momani, M., Challa, S., & Alhmouz, R. (2008). Can we trust trusted nodes in wireless sensor networks? In International Conference on Computer and Communication Engineering, 2008. ICCCE 2008 (pp. 1227–1232). New York: IEEE.

    Google Scholar 

  • Naseer, A. (2012). Reputation system based trust-enabled routing for wireless sensor networks. INTECH Open Access Publisher.

    Google Scholar 

  • Ngai, E.-H., & Lyu, M. R. (2004). Trust-and clustering-based authentication services in mobile ad hoc networks. In Proceedings of 24th International Conference on Distributed Computing Systems Workshops, 2004 (pp. 582–587). New York: IEEE.

    Google Scholar 

  • Patil, V. S., Bamnote, G. R., & Nair, S. S. (2011). Cross site scripting: An overview. In IJCA Proceedings on International Symposium on Devices MEMS, Intelligent Systems and Communication, (pp. 19–22), Sikkim, India.

    Google Scholar 

  • Pereira, P. R., Grilo, A., Rocha, F., Nunes, M. S., Casaca, A., Chaudet, C., et al. (2007). End-to-end reliability in wireless sensor networks: Survey and research challenges. In EuroFGI Workshop on IP QoS and Traffic Control (pp. 67–74).

    Google Scholar 

  • Pirzada, A. A., & Mcdonald, C. (2004). Establishing trust in pure ad-hoc networks. In Proceedings of the 27th Australasian Conference on Computer science-Volume 26, 2004 (pp. 47–54). Australian Computer Society, Inc.

    Google Scholar 

  • Probst, M. J., & Kasera, S. K. (2007). Statistical trust establishment in wireless sensor networks. In 2007 International Conference on Parallel and Distributed Systems (pp. 1–8). New York: IEEE.

    Google Scholar 

  • Reddy, Y., & Selmic, R. (2011). Agent-based trust calculation in wireless sensor networks. In SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications (pp. 334–339).

    Google Scholar 

  • Rehana, J. (2009). Security of wireless sensor network. Helsinki University of Technology, Technical report.

    Google Scholar 

  • Reshmi, V., & Sajitha, M. (2014). A survey on trust management in wireless sensor networks. International Journal of Computer Science & Engineering Technology, 5, 104–109.

    Google Scholar 

  • Sabeel, U., Maqbool, S., & Chandra, N. (2013). Categorized security threats in the wireless sensor networks: Countermeasures and security management schemes. International Journal of Computer Applications, 64, 19–28.

    Article  Google Scholar 

  • Sarma, H. K. D., & Kar, A. (2006) Security threats in wireless sensor networks. In Proceedings 2006 40th Annual IEEE International, Carnahan Conferences Security Technology (pp. 243–251). New York: IEEE.

    Google Scholar 

  • Sarma, H. K. D., & Kar, A. (2008). Security threats in wireless sensor networks. IEEE Aerospace and Electronic Systems Magazine, 23, 39–45.

    Google Scholar 

  • Sastry, A. S., Sulthana, S., & Vagdevi, S. (2013). Security threats in wireless sensor networks in each layer. International Journal of Advanced Networking and Applications, 4, 1657.

    Google Scholar 

  • Shaikh, R. A., Jameel, H., D’Auriol, B. J., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20, 1698–1712.

    Article  Google Scholar 

  • Shannon, C. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27, 379–423 & 623–656.

    Google Scholar 

  • Silberman, P., & Johnson, R. (2004). A comparison of buffer overflow prevention implementations and weaknesses. In IDEFENSE, August.

    Google Scholar 

  • Singh, H., Agrawal, M., Gour, N., & Hemrajani, N. (2014). A study on security threats and their countermeasures in sensor network routing. Prevention, 3.

    Google Scholar 

  • Singh, M., Sardar, A. R., Sahoo, R. R., Majumder, K., Ray, S., & Sarkar, S. K. (2015). Lightweight trust model for clustered WSN. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 765–773). Berlin: Springer.

    Google Scholar 

  • Sorniotti, A., Gomez, L., Wrona, K., & Odorico, L. (2007). Secure and trusted in-network data processing in wireless sensor networks: A survey. Journal of Information Assurance and Security, 2, 189–199.

    Google Scholar 

  • Srinivasan, A., Teitelbaum, J., & Wu, J. (2006). DRBTS: Distributed reputation-based beacon trust system. In 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006 (pp. 277–283). New York: IEEE.

    Google Scholar 

  • Srinivasan, A., Teitelbaum, J., Wu, J., Cardei, M., & Liang, H. (2009). Reputation-and-trust-based systems for ad hoc networks. In Algorithms and protocols for wireless and mobile ad hoc networks, pp. 375.

    Google Scholar 

  • Srivastava, S., & Johri, K. (2012). A survey on reputation and trust management in wireless sensor network. International Journal of Scientific Research Engineering & Technology, 1, 139–149.

    Article  Google Scholar 

  • Sun, F., Zhao, Z., Fang, Z., Du, L., Xu, Z., & Chen, D. (2014). A review of attacks and security protocols for wireless sensor networks. Journal of Networks, 9, 1103–1113.

    Google Scholar 

  • Undercoffer, J., Avancha, S., Joshi, A., & Pinkston, J. (2002). Security for sensor networks. In CADIP Research Symposium. Citeseer (pp. 25–26).

    Google Scholar 

  • Virmani, D., Soni, A., Chandel, S., & Hemrajani, M. (2014). Routing attacks in wireless sensor networks: A survey. arXiv preprint arXiv:1407.3987.

  • Wang, C., Sohraby, K., Li, B., Daneshmand, M., & Hu, Y. (2006a). A survey of transport protocols for wireless sensor networks. IEEE Network, 20, 34–40.

    Article  Google Scholar 

  • Wang, C., Sohraby, K., Li, B., & Tang, W. (2005). Issues of transport control protocols for wireless sensor networks. In Proceedings of International Conference on Communications, Circuits and Systems (ICCCAS) (pp. 422–426).

    Google Scholar 

  • Wang, N., Gao, L., & Wu, C. (2014). A light-weighted data trust model in WSN. International Journal of Grid & Distributed Computing, 7.

    Google Scholar 

  • Wang, Y., Attebury, G., & Ramamurthy, B. (2006b). A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8, 2–23.

    Article  Google Scholar 

  • Willig, A., & Karl, H. (2005). Data transport reliability in wireless sensor networks. A survey of issues and solutions. Praxis der Informationsverarbeitung und Kommunikation, 28, 86–92.

    Article  Google Scholar 

  • Wright, S. (2010). Trust and trustworthiness. Philosophia, 38, 615–627.

    Article  Google Scholar 

  • Xing, K., Srinivasan, S. S. R., Jose, M., Li, J., & Cheng, X. (2010). Attacks and countermeasures in sensor networks: A survey. In Network security. Berlin: Springer

    Google Scholar 

  • Yang, S.-H. (2014). Wireless sensor networks, principles, design and applications. London: Springer.

    Google Scholar 

  • Yang, S.-H., & Cao, Y. (2008). Networked control systems and wireless sensor networks: Theories and applications.

    Google Scholar 

  • Yick, J., Mukherjee, B., & Ghosal, D. (2008). Wireless sensor network survey. Computer Networks, 52, 2292–2330.

    Article  Google Scholar 

  • Yin, J., & Madria, S. K. (2006). SecRout: A secure routing protocol for sensor networks. In 20th International Conference on Advanced Information Networking and Applications, 2006. AINA 2006 (pp. 6). New York: IEEE.

    Google Scholar 

  • Yu, H., Shen, Z., Miao, C., Leung, C., & Niyato, D. (2010). A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE, 98, 1755–1772.

    Article  Google Scholar 

  • Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks attack analysis and countermeasures. Journal of Network and Computer Application, 35, 867–880.

    Article  Google Scholar 

  • Zhan, G., Shi, W., & Deng, J. (2009). SensorTrust: A resilient trust model for WSNs. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, 2009 (pp. 411–412). New York: ACM.

    Google Scholar 

  • Zhang, W., Das, S. K., & Liu, Y. (2006a). A trust based framework for secure data aggregation in wireless sensor networks. In 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006. SECON’06 (pp. 60–69). New York: IEEE.

    Google Scholar 

  • Zhang, Y., Liu, W., Fang, Y., & Wu, D. (2006b). Secure localization and authentication in ultra-wideband sensor networks. IEEE Journal on Selected Areas in Communications, 24, 829–835.

    Article  Google Scholar 

  • Zia, T., & Zomaya, A. (2006). Security issues in wireless sensor networks. In International Conference on Systems and Networks Communications, 2006. ICSNC’06 (pp. 40–40). New York: IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saqib Ali .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K. (2018). Wireless Sensor Network Security for Cyber-Physical Systems. In: Cyber Security for Cyber Physical Systems. Studies in Computational Intelligence, vol 768. Springer, Cham. https://doi.org/10.1007/978-3-319-75880-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-75880-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-75879-4

  • Online ISBN: 978-3-319-75880-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics