Skip to main content

OSI Layer Wise Security Analysis of Wireless Sensor Network

  • Conference paper
Signal Processing and Multimedia (MulGraB 2010, SIP 2010)

Abstract

The security in wireless sensor networks (WSNs) is a critical issue due to the inherent limitations of computational capacity and power usage. While a variety of security techniques are being developed and a lot of research is going on in security field at a brisk pace but the fields lacks a common integrated platform which provides a comprehensive comparison of the seemingly unconnected but linked issues. In this paper, we have tried to analyze some attacks and their possible countermeasures in OSI layered manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  2. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public key cryptography for wireless sensor networks. In: Third IEEE Conference on Pervasive Computing and Communications (PERCOM 2005), pp. 324–328. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  3. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile ad hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1), 38–47 (2004)

    Article  Google Scholar 

  4. Carman, D., Matt, B., Balenson, D., Kruus, P.: A communications security architecture and cryptographic mechanisms for distributed sensor networks. In: DARPA SensIT Workshop. NAI Labs, The Security Research Division Network Associates, Inc. (1999)

    Google Scholar 

  5. Xiao, Y. (ed.): Security in Distributed, Grid and Pervasive Computing. Auerbach Publications, CRC Press (2006)

    Google Scholar 

  6. Ganesan, D., Cerpa, A., Yu, Y., Estrin, D.: Networking issues in wireless sensor networks. Journal of Parallel and Distributed Computing (JPDC), Special issue on Frontiers in Distributed Sensor Networks

    Google Scholar 

  7. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and Countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 293–315 (May 2003)

    Google Scholar 

  8. Sharma, K., Ghose, M.K., Kuldeep: Complete Security Framework for Wireless Networks. International Journal of Computer Science and Information Security 3(1) (2009)

    Google Scholar 

  9. Ganeriwal, S., Srivastava, M.B.: Reputation Based Framework for?High Integrity Sensor Networks. In: Proceedings of the 2nd ACM Workshop on Security of ad hoc and sensor networks, pp. 66–77. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saha, S., Bhattacharyya, D., Kim, Th. (2010). OSI Layer Wise Security Analysis of Wireless Sensor Network. In: Kim, Th., Pal, S.K., Grosky, W.I., Pissinou, N., Shih, T.K., Ślęzak, D. (eds) Signal Processing and Multimedia. MulGraB SIP 2010 2010. Communications in Computer and Information Science, vol 123. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17641-8_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17641-8_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17640-1

  • Online ISBN: 978-3-642-17641-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics