Back
 CN  Vol.7 No.4 , November 2015
A Review Study of Wireless Sensor Networks and Its Security
Abstract: The confluence of cheap wireless communication, sensing and computation has produced a new group of smart devices and by using thousands of these kind of devices in self-organizing networks has formed a new technology that is called wireless sensor networks (WSNs). WSNs use sensor nodes that placed in open areas or in public places and with a huge number that creates many problems for the researchers and network designer, for giving an appropriate design for the wireless network. The problems are security, routing of data and processing of large amount of data etc. This paper describes the types of WSNs and the possible solutions for tackling the listed problems and solution of many other problems. This paper will deliver the knowledge about the WSN and types with literature review so that a person can get more knowledge about this emerging field.
Cite this paper: Aftab, M. , Ashraf, O. , Irfan, M. , Majid, M. , Nisar, A. and Habib, M. (2015) A Review Study of Wireless Sensor Networks and Its Security. Communications and Network, 7, 172-179. doi: 10.4236/cn.2015.74016.
References

[1]   Sharma, K. and Ghose, M. (2010) Wireless Sensor Networks: An Overview on Its Security Threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, 42-45.

[2]   Li, J.Z. and Hong, G. (2008) Survey on Sensor Network Research. Journal of Computer Research and Development, 45, 1-15.

[3]   Ren, F.Y., Lin, G. and Huang, H.N. (2003) Wireless Sensor Networks. Journal of Software, 7.

[4]   Dhillon, S.S. and Chakrabarty, K. (2003) Sensor Placement for Effective Coverage and Surveillance in Distributed Sensor Networks. IEEE, 3, 1609-1614.

[5]   Rezazadeh, J. (2012) Mobile Wireless Sensor Networks Overview. International Journal of Computer Communications and Networks (IJCCN), 2, 17-22.

[6]   Ren, Y. and Boukerche, A. (2008) Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks. IEEE International Conference on Communications, 2008. ICC'08, Beijing, 19-23 May 2008, 2129-2133. http://dx.doi.org/10.1109/icc.2008.408

[7]   Cho, J.-H., Swami, A. and Chen, R. (2011) A Survey on Trust Management for Mobile Ad Hoc Networks. IEEE Communications Surveys & Tutorials, 13, 562-583. http://dx.doi.org/10.1109/SURV.2011.092110.00088

[8]   Djenouri, D., Khelladi, L. and Badache, N. (2005) A Survey of Security Issues in Mobile Ad Hoc Networks. IEEE Communications Surveys, 7, 2-28.

[9]   Duan, J., Qin, Y., Zhang, S., Zheng, T. and Zhang, H. (2011) Issues of Trust Management for Mobile Wireless Sensor Networks. 7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), Wuhan, 23-25 September 2011, 1-4.

[10]   Deng, X.M., Xiong, Y. and Chen, D.P. (2010) Mobility-Assisted Detection of the Replication Attacks in Mobile Wireless Sensor Networks. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Niagara Falls, 11-13 October 2010, 225-232.

[11]   Duan, Z.-F., Guo, F., Deng, M.-X. and Yu, M. (2009) Shortest Path Routing Protocol for Multi-Layer Mobile Wireless Sensor Networks. International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC’09, Wuhan, 25-26 April 2009, 106-110. http://dx.doi.org/10.1109/NSWCTC.2009.282

[12]   Anguita, D., Brizzolara, D. and Parodi, G. (2009) Building an Underwater Wireless Sensor Network Based on Optical: Communication: Research Challenges and Current Results. 3rd International Conference on Sensor Technologies and Applications, SENSORCOMM’09, Athens, 18-23 June 2009, 476-479. http://dx.doi.org/10.1109/SENSORCOMM.2009.79

[13]   Davis, A. and Chang, H. (2012) Underwater Wireless Sensor Networks. Oceans, 2012, Hampton Roads, 14-19 October 2012, 1-5. http://dx.doi.org/10.1109/oceans.2012.6405141

[14]   Akbulut, A., Patlar, F., Zaim, A. and Yilmaz, G. (2011) Wireless Sensor Networks for Space and Solar-System Missions. 2011 5th International Conference on Recent Advances in Space Technologies (RAST), Istanbul, 9-11 June 2011, 616-618. http://dx.doi.org/10.1109/RAST.2011.5966912

[15]   Vladimirova, T., Bridges, C.P., Paul, J.R., Malik, S.A. and Sweeting, M.N. (2010) Space-Based Wireless Sensor Networks: Design Issues. IEEE Aerospace Conference, Big Sky, 6-13 March 2010, 1-14.

[16]   Sun, Z. and Akyildiz, I.F. (2010) Connectivity in Wireless Underground Sensor Networks. 2010 7th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), Boston, 21-25 June 2010, 1-9. http://dx.doi.org/10.1109/secon.2010.5508264

[17]   Poojary, S. and Pai, M.M. (2010) Multipath Data Transfer in Wireless Multimedia Sensor Network. 2010 International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA), Fukuoka, 4-6 November 2010, 379-383. http://dx.doi.org/10.1109/BWCCA.2010.100

[18]   Nayyar, A., Bashir, F. and Hamid, Z. (2011) Intelligent Routing Protocol for Multimedia Sensor Networks. 2011 International Conference on Information Technology and Multimedia (ICIM), Kuala Lumpur, 14-16 November 2011, 1-6. http://dx.doi.org/10.1109/icimu.2011.6122747

[19]   Phan, K.T., Fan, R., Jiang, H., Vorobyov, S.A. and Tellambura, C. (2009) Network Lifetime Maximization with Node Admission in Wireless Multimedia Sensor Networks. IEEE Transactions on Vehicular Technology, 58, 3640-3646. http://dx.doi.org/10.1109/TVT.2009.2013235

[20]   Shafiee, M. and Vakili, V. (2012) MTM-Based Spectrum Sensing in Cognitive Wireless Multimedia Sensor Networks (C-WMSNs). 2012 6th International Symposium on Telecommunications (IST), Tehran, 6-8 November 2012, 266-270. http://dx.doi.org/10.1109/ISTEL.2012.6482995

[21]   Lin, K., Rodrigues, J.J., Ge, H.W., Xiong, N.X. and Liang, X.D. (2011) Energy Efficiency QoS Assurance Routing in Wireless Multimedia Sensor Networks. IEEE Systems Journal, 5, 495-505. http://dx.doi.org/10.1109/JSYST.2011.2165599

[22]   Akyildiz, I.F., Su, W.L., Sankarasubramaniam, Y. and Cayirci, E. (2002) A Survey on Sensor Networks. IEEE Communications Magazine, 40, 102-114. http://dx.doi.org/10.1109/MCOM.2002.1024422

[23]   Nadeem, F., Leitgeb, E., Awan, M. and Chessa, S. (2009) Comparing the Life Time of Terrestrial Wireless Sensor Networks by Employing Hybrid FSO/RF and Only RF Access Networks. 5th International Conference on Wireless and Mobile Communications, ICWMC’09, Cannes, 23-29 August 2009, 134-139. http://dx.doi.org/10.1109/ICWMC.2009.29

[24]   Pfleeger, C.P. and Pfleeger, S.L. (2003) Security in Computing. Prentice Hall Professional, Upper Saddle River.

[25]   Zia, T. and Zomaya, A. (2006) Security Issues in Wireless Sensor Networks. International Conference on Systems and Networks Communications, ICSNC’06, Tahiti, 29 October-3 November 2006, 40-40. http://dx.doi.org/10.1109/ICSNC.2006.66

[26]   Singh, S. and Verma, H.K. (2011) Security for Wireless Sensor Network. International Journal on Computer Science & Engineering, 3, 2393-2399.

[27]   Aftab, M.U., Nisar, A., Asif, M., Ashraf, A. and Gill, B. (2013) RBAC Architectural Design Issues in Institutions Collaborative Environment. International Journal of Computer Science Issues (IJCSI), 10, 216-221.

 
 
Top