IDENTIFIKASI KEUTUHAN DAN PENANGAN KEAMANAN DATA PADA WIRELESS SENSOR NETWORK

Authors

  • Sri Wahyuni Universitas Islam Negeri Ar-Raniry
  • Satrio Danuasmo Universitas Bina Bangsa Getsempena

DOI:

https://doi.org/10.22373/jintech.v3i1.1557

Keywords:

wireless sensor network, security and threats, internet of things

Abstract

Wireless Sensor Networks (WSN) is becoming a trend of technology along with the development of data transmission and the human need for the Internet of Things (IoT). IoT is a technology term created to connect one object to be able to send data through a transmission medium (internet) without the help of computers and humans. WSN is one of the technological elements in IoT that helps create connectivity. Currently WSN is widely used to assist tasks related to monitoring, evaluating, tracking, controlling things, and others. WSN consists of a collection of small sensors that will collect data and then transmit it. WSN with wireless system is very vulnerable to security holes. Here we will focus on examining the security vulnerabilities of WSN, how to avoid, and protect the WSN network.

References

Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–105. https://doi.org/10.1109/MCOM.2002.1024422.

Al-Ani, K. W., Abdalkafor, A. S., &Nassar, A. M. (2019). An overview of wireless sensor network and its applications. Indonesian Journal of Electrical Engineering and Computer Science, 17(3), 1480–1486. https://doi.org/10.11591/ijeecs.v17.i3.pp1480-1486.

Ashraf, J., & Latif, S. (2014). Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques. National Software Engineering Conference, NSEC 2014, 55–60. https://doi.org/10.1109/NSEC.2014.6998241.

Burhanuddin, M. A., Mohammed, A. A. J., Ismail, R., Hameed, M. E., Kareem, A. N., & Basiron, H. (2018). A review on security challenges and features in wireless sensor networks: IoT perspective. Journal of Telecommunication, Electronic and Computer Engineering, 10(1–7), 17–21.Chan, H., & Perrig, A. (2003). Security and privacy in sensor networks. Computer, 36(10), 103–105. https://doi.org/10.1109/MC.2003.1236475.

Deng, J., Han, R., & Mishra, S. (2003). A Performance Evaluation of Intrusion-Tolerant. 349–364.

Douceur, J. R. (2002). The sybil attack. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2429, 251–260. https://doi.org/10.1007/3-540-45748-8_24.

Gudymenko, I., Borcea-pfitzmann, K., & Tietze, K. (2012). Privacy Implications ofthe Internet of Things Introduction Privacy Implications of IoT Possible solutions. 280–286.Hu, L., & Evans, D. (2004). Using Directional Antennas to Prevent Wormhole Attacks. Network and Distributed Systems Symposium, NDSS, February, 1–11.

http://www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Hu.pdfHu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Proceedings -IEEE INFOCOM, 3(C), 1976–1986. https://doi.org/10.1109/infcom.2003.1209219.

Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2–3), 293–315. https://doi.org/10.1016/S1570-8705(03)00008-8.

Kumar, H., Sarma, D., & Kar, A. (2008). Security threats in wireless sensor networks. IEEE Aerospace and Electronic Systems Magazine, 23(6), 39–45. https://doi.org/10.1109/MAES.2008.4558008.

Mohapatra, H., Rath, S., Panda, S., & Kumar, R. (2020). Handling of man-in-the-middle attack in WSN through intrusion detection system. International Journal of Emerging Trends in Engineering Research, 8(5), 1503–1510. https://doi.org/10.30534/ijeter/2020/05852020.

Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., &Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials, 11(4), 42–56. https://doi.org/10.1109/SURV.2009.090404.

Mukherjee, A., Fakoorian, S. A. A., Huang, J., & Swindlehurst, A. L. (2014). Principles of physical layer security in multiuser wireless networks: A survey. IEEE Communications Surveys and Tutorials, 16(3), 1550–1573. https://doi.org/10.1109/SURV.2014.012314.00178.

Paharia, B., & Bhushan, K. (2019). A comprehensive review of distributed denial of service (DDoS) attacks in fog computing environment. In Handbook of Computer Networks and Cyber Security: Principles and Paradigms. https://doi.org/10.1007/978-3-030-22277-2_20.

Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534. https://doi.org/10.1023/A:1016598314198.

Raymond, D. R., & Midkiff, S. F. (2008). Denial-of-service in wireless sensor networks: Attacks and defenses. IEEE Pervasive Computing, 7(1), 74–81. https://doi.org/10.1109/MPRV.2008.6.

Security Requirements in Wireless Sensor Networks. (n.d.). Retrieved January 31, 2022, from https://krazytech.com/technical-papers/security-requirements-in-wireless-sensor-networksShahzad, F., Pasha, M., & Ahmad, A. (2017). A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures. 14(12), 54–65. http://arxiv.org/abs/1702.07136.

Sharma, K., & Ghose, M. (2010). Wireless sensor networks: An overview on its security threats. International Journal of Computers and Their Applications, 42–45. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.206.3550&rep=rep1&type=pdfSohraby, K., Minoli, D., & Znati, T. (2007). Basic Wireless Sensor Technology. In Wireless Sensor Networks. https://doi.org/10.1002/9780470112762.ch3.

Solanki, S., & Kohli, J. (2016). Wireless sensor network: A survey. Far East Journal of Electronics and Communications, SpecialVol, 767–776. https://doi.org/10.17654/ECSV3PII16767

Wang, W., & Bhargava, B. (2004). Visualization of wormholes in sensor networks. Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe, 51–60. https://doi.org/10.1145/1023646.1023657.

What Are Eavesdropping Attacks? | Fortinet. (n.d.). Retrieved January 31, 2022, from https://www.fortinet.com/resources/cyberglossary/eavesdropping.

Zhang, Y., Liu, W., Lou, W., & Fang, Y. (2006). Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2), 247–260. https://doi.org/10.1109/JSAC.2005.861382

Downloads

Published

2022-07-02