Investigating the prevalent security techniques in wireless sensor network protocols

Show simple item record

dc.contributor.author O'Mahony, George D.
dc.contributor.author Harris, Philip J.
dc.contributor.author Murphy, Colin D.
dc.date.accessioned 2020-01-20T14:45:23Z
dc.date.available 2020-01-20T14:45:23Z
dc.date.issued 2019-06
dc.identifier.citation O'Mahony, G. D., Harris, P. J. and Murphy, C. C. (2019) 'Investigating the Prevalent Security Techniques in Wireless Sensor Network Protocols', 2019 30th Irish Signals and Systems Conference (ISSC), Maynooth, 17-18 June, pp. 1-6. doi: 10.1109/ISSC.2019.8904934 en
dc.identifier.startpage 1 en
dc.identifier.endpage 6 en
dc.identifier.isbn 978-1-7281-2800-9
dc.identifier.issn 2688-1454
dc.identifier.uri http://hdl.handle.net/10468/9534
dc.identifier.doi 10.1109/ISSC.2019.8904934 en
dc.description.abstract The radio architectures of and protocols used by wireless sensor networks (WSNs) are, typically, very similar and are based on IEEE 802.15.4. By concentrating on this standard and the associated employed security techniques, the possibility of designing a transferable safety and privacy enhancement across protocols and services, becomes a reality. WSN applications have expanded significantly over the past decade or so and adopt commercial off-the-shelf (COTS) devices and publicly available standards, which inherently creates intruder incentives and security challenges. Securing WSNs is a critical requirement due to the challenging burden of protecting the transmitted sensitive information across various applications, while operating under unique security vulnerabilities and a fluctuating radio frequency (RF) spectrum and physical environment. Couple this aspect with establishing a level of trust among network nodes, while providing resilience to interference, it becomes clear that maintaining security is challenging. This paper identifies unique vulnerabilities in WSNs, which have a direct impact on privacy and safety. The prevalent security techniques used in the common PHY and MAC layers of various WSN protocols are discussed in terms of providing the essential security requirements. An experimental visualization of the coexistence issues in the industrial, scientific and medical (ISM) RF band, which is integral for IoT operations, is provided as an introduction to a new perspective on attacking WSNs. Fundamental attack styles and spectrum sharing/coexistence based intrusions are presented. Typical methods, which use COTS devices and open source software to exploit WSN security holes, are also discussed. en
dc.description.sponsorship Irish Research Council and United Technologies Research Center Ireland under the Enterprise Partnership Scheme Postgraduate scholarship EPSPG/2016/66 en
dc.format.mimetype application/pdf en
dc.language.iso en en
dc.publisher Institute of Electrical and Electronics Engineers (IEEE) en
dc.relation.uri https://ieeexplore.ieee.org/abstract/document/8904934
dc.rights © 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. en
dc.subject Interference en
dc.subject Intrusion en
dc.subject IoT en
dc.subject MAC en
dc.subject Packet en
dc.subject PHY en
dc.subject Protocol en
dc.subject Security en
dc.subject & WSN en
dc.subject Wireless sensor network (WSN) en
dc.subject Internet of Things (IoT) en
dc.subject Wireless sensor networks en
dc.title Investigating the prevalent security techniques in wireless sensor network protocols en
dc.type Conference item en
dc.internal.authorcontactother Colin Murphy, Electrical & Electronic Engineering, University College Cork, Cork, Ireland. +353-21-490-3000 Email: colinmurphy@ucc.ie en
dc.internal.availability Full text available en
dc.date.updated 2020-01-20T14:27:15Z
dc.description.version Accepted Version en
dc.internal.rssid 500175632
dc.contributor.funder Irish Research Council en
dc.contributor.funder United Technologies Research Centre, Ireland en
dc.description.status Peer reviewed en
dc.internal.copyrightchecked Yes
dc.internal.licenseacceptance Yes en
dc.internal.conferencelocation Maynooth, Ireland en
dc.internal.IRISemailaddress colinmurphy@ucc.ie en


Files in this item

This item appears in the following Collection(s)

Show simple item record

This website uses cookies. By using this website, you consent to the use of cookies in accordance with the UCC Privacy and Cookies Statement. For more information about cookies and how you can disable them, visit our Privacy and Cookies statement