Abstract
Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security threats is overlooked as researchers’ work appear limited in classification of security threats and, 2) security threats are not associated with security frameworks. In this paper, we perform classification of security threats comprehensively whereas, associating these threats to a security framework; we lead in this direction. We find that specifically to assess the impact of these threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zia, T., Zomaya, A.: A security Framework for Wireless Sensor Networks. In: SAS 2006 – IEEE Sensors Application Symposium, Houston, Texas, USA, February 7-9 (2006)
Zou, K.C.Y.: Uncertainty-aware and Coverage-oriented Deployment for Sensor Networks. Journal of Parallel and Distributed Computing 64(7), 788–798 (2004)
Ashraf, A., Hashmani, M., Mussadiq, M., Chowdhry, B.S., et al.: A Pretty Safe Strategy for Analyzing Discrete Security Assessment Framework in Wireless Sensor Networks, Communications in Computer and Information Science, November 14, 2008. Book of Wireless Networks, Information Processing and Systems, vol. 20, pp. 445–448. Springer, Heidelberg (2008)
Ashraf, A., Hashmani, M., Mussadiq, M., Chowdhry, B.S.: Design and Analysis of the Security Assessment Framework for Achieving Discrete Security Values in Wireless Sensor Networks, Electrical and Computer Engineering, 2008. In: CCECE 2008. Canadian Conference on Electrical and Computer Engineering, May 4-7, pp. 855–860 (2008)
Ilyas, M., Mahgoub, I.: Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems (2004) ISBN 0-8493-1968-4, TK7872.D48.H36
Muraleedharan, R., Osadciw, L.A.: Jamming Attack Detection and Countermeasures. In: Wireless Sensor Network Using Ant System, Department of Electrical Engineering and Computer Science, pp. 13244–11240. Syracuse University, Syracuse
Crespo, R.G.: Slides on Mobile Systems Security, WSN Security Threats’, Copyright Departmento de Engenharia, Electrotecnica, e de Computadores (Fall 2006)
Akojwar, S.G., Patrikar, R.M.: Classification Techniques with Cooperative Routing for Industrial Wireless Sensor Networks. In: Advances in Computer and Information Sciences and Engineering, pp. 503–508. Springer, Netherlands (2008)
Kaplantzis, S., Mani, N.: A Study on Classification Techniques for Network Intrusion Detection. In: Proceedings of the IASTED International Conference on Networks and Communication Systems, year of publication (2006)
Kim, Y., Jeong, S., Kim, D.: A GMM-Based Target Classification Scheme for a Node in Wireless Sensor Networks. IEICE Transactions on Communications E91-B(11), 3544–3551 (2008); doi:10.1093/ietcom/e91-b.11.3544, The Institute of Electronics, Information and Communication Engineers
Kim, D.S., Shazzad, K.M., Park, J.S.: A Framework of Survivability Model for Wireless Sensor Network. In: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 515–522 (2006) ISBN:0-7695-2567-9
Kaplantzis, S., Mani, N.: Security Models of Wireless Sensor Networks, final review report for PhD (2007), http://users.monash.edu.au/~skap3/
Barnum, S., Gegick, M.: Defense in Depth, pp. 2005–2009. Cigital, Inc., on 2005-09-13, Copyright (2005)
The Living Dictionary, Series of Longman Dictionary of Contemporary English, Copyright Pearsons Education (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Ashraf, A., Rajput, A., Mussadiq, M., Chowdhry, B.S., Hashmani, M. (2009). Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks. In: Mehmood, R., Cerqueira, E., Piesiewicz, R., Chlamtac, I. (eds) Communications Infrastructure. Systems and Applications in Europe. EuropeComm 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 16. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11284-3_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-11284-3_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11283-6
Online ISBN: 978-3-642-11284-3
eBook Packages: Computer ScienceComputer Science (R0)