Security perspective of wireless sensor networks

被引:0
|
作者
Gutierrez-Portela, Fernando [1 ]
Almenarez-Mendoza, Florina [2 ]
Calderon-Benavides, Liliana [3 ,4 ]
Romero-Riano, Efren
机构
[1] Univ Cooperat Colombia, Ingn Civil, Aqua, Medellin, Colombia
[2] Univ Carlos III Madrid, Dept Ingn Telemat, Aplicac & Serv Telemat, Madrid, Spain
[3] Univ Autonoma Bucaramanga, Unidad Acad, Tecnol Informac, Bucaramanga, Santander, Colombia
[4] Univ Autonoma Bucaramanga, Bucaramanga, Santander, Colombia
来源
UIS INGENIERIAS | 2021年 / 20卷 / 03期
关键词
wireless sensor networks; WSN attacks; security mechanisms; artificial intelligence; intrusion detection; computational resources; countermeasures; ZigBee protocol; machine learning; supervised techniques; unsupervised techniques; anomaly detection; clustering algorithms; VOSviewer; security prospective; EFFICIENT; PRIVACY; ATTACKS; SCHEME; AUTHENTICATION; ALGORITHM; PROTOCOL; SYSTEM;
D O I
10.18273/revuin.v20n3-2021014
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In Wireless Sensor Networks (WSN), nodes are vulnerable to security attacks because they are installed in a harsh environment with limited power and memory, low processing power, and medium broadcast transmission. Therefore, identifying threats, challenges, and solutions of security and privacy is a talking topic today. This article analyzes the research work that has been carried out on the security mechanisms for the protection of WSN against threats and attacks, as well as the trends that emerge in other countries combined with future research lines. From the methodological point of view, this analysis is shown through the visualization and study of works indexed in databases such as IEEE, ACM, Scopus, and Springer, with a range of 7 years as an observation window, from 2013 to 2019. A total of 4,728 publications were obtained, with a high rate of collaboration between China and India. The research raised developments, such as advances in security principles and defense mechanisms, which have led to the design of countermeasures in intrusion detection. Finally, the results show the interest of the scientific and business community in the use of artificial intelligence and machine learning (ML) to optimize performance measurements.
引用
收藏
页码:189 / 201
页数:13
相关论文
共 50 条
  • [21] Security in operational wireless sensor networks
    Chang, Chih-Chun
    Muftic, Sead
    Nagel, David J.
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 781 - +
  • [22] Quantum security in wireless sensor networks
    Nagy, Naya
    Nagy, Marius
    Akl, Selim G.
    NATURAL COMPUTING, 2010, 9 (04) : 819 - 830
  • [23] Security threats in Wireless Sensor Networks
    Sarma, Hiren Kumar Deva
    Kar, Avijit
    2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, : 243 - +
  • [24] Security for Wireless Sensor Networks: A Review
    Healy, Michael
    Newe, Thomas
    Lewis, Elfed
    SAS 2009 - IEEE SENSORS APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2009, : 80 - 85
  • [25] Security and Robustness of Wireless Sensor Networks
    Matyas, Vaclav
    Svenda, Petr
    ERCIM NEWS, 2009, (76): : 27 - 28
  • [26] Security Issues in Wireless Sensor Networks
    Sora, Daniel
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2010, 6 (04) : 26 - 30
  • [27] A security protocol for Wireless Sensor Networks
    Zhang, Chang N.
    Yu, Qian
    Huang, Xun
    Yang, Cungang
    WIRELESS SENSOR AND ACTOR NETWORKS II, 2008, 264 : 113 - +
  • [28] Quantum security in wireless sensor networks
    Naya Nagy
    Marius Nagy
    Selim G. Akl
    Natural Computing, 2010, 9 : 819 - 830
  • [29] THE SECURITY PROBLEM IN WIRELESS SENSOR NETWORKS
    Zhao, Xiaoye
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1079 - 1082
  • [30] Security solutions for wireless sensor networks
    R and D Network Laboratories, NEC Europe Ltd.
    不详
    不详
    NEC Tech. J., 2006, 3 (106-111):