IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cybersecurity Attacks On Wireless Sensor Networks In Smart Cities: An Exposition

[Full Text]

 

AUTHOR(S)

Hind Alshambri, Mohammed A. AlZain, Ben Soh, Mehedi Masud, Jehad Al-Amri

 

KEYWORDS

Cybersecurity, wireless sensor, smart city.

 

ABSTRACT

The smart city concept is a link between digital world and the physical world. The smart city is designed and constructed by using advanced techniques which consist of sensors, electronics and networks. However, automatic information flow and connection between IoT devices creates new security risks. If data can be accessed remotely, it means that a cybercriminal could also access it. Moreover, connectivity is the essence of IoT. If multiple devices are connected to the same network, it means that cybercriminals have multiple access points. Understanding how wireless sensor technology works is crucial before deploying IoT applications. In this article, we explore the understanding through: (1) vulnerabilities on wireless sensors and techniques to avoid them, (2) emerging wireless standards for sensors, and (3) what role these standards will play in the future.

 

REFERENCES

[2] statista.com, "online statistics portal, and one of the world’s most successful statistics databases," 2016.
[3] ITU, "Internet of Things Global Standards Initiative. Recommendation ITU-T Y.2060," 2015.
[4] John, Biggs, "Hackers release source code for a powerful DDoS app called Mirai," 2016.
[5] Lagane, Christophe, "BrickerBot, destrector of connected objects," 2017.
[6] Kocher, Paul C., "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS,," Springer Berlin Heidelberg, Berlin, Heidelberg, 1996.
[7] Kirk Martinez, Paritosh Padhy, Alistair Riddoch, Royan Ong and Jane Hart, "Glacial Environment Monitoring using Sensor Networks," 2005.
[8] Kazatzopoulos, Leonidas, "WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination," 2014.
[9] Wissam Sammouri, Étienne Côme, Latifa Oukhellou et Patrice Aknin, "« Mining Floating Train Data Sequences for Temporal Association Rules within a Predictive Maintenance Framework," 2013.
[10] Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler and J. D. Tygar, "SPINS : Security Protocols for Sensor Networks," 2002.
[11] David, Andrew S. Tanenbaum , "Computer Networks, 5/E. Prentice Hall," 2010.
[12] Debashis, Sahabul Alam, "Analysis of Security Threats in Wireless Sensor Network," 2014.
[13] Tseng, Benjamin J. Culpepper and H. Chris, "Sinkhole Intrusion Indicators in DSR MANETs," 2004.
[14] Najma Farooq, Irwa Zahoor and Sandip Mandal, "Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks," 2014.
[15] (IETF), Internet Engineering Task Force, "Internet-Draft : Survey of Security Hardening Methods for Transmission Control Protocol (TCP) Implementations," 2012.
[16] Fangmin Sun, Zhan Zhao, Zhen Fang, Lidong Du, Zhihong Xu, "A Review of Attacks and Security Protocols for Wireless Sensor Networks," 2014.
[17] Jahangir, Laleh Arshadi and Amir Hossein, "« Entropy Based SYN Flooding Detection," 2011.
[18] Hongmei Deng, Wei Li and Dharma P. Agrawal, Routing Security in Wireless, 2002.
[19] Quentin Monnet, Lynda Mokdad and Jalel Ben-Othman, Data Protection in Multipaths WSNs, 2013.
[20] Kumar, Chinnu Mary George and Manoj, Cluster Based Location Privacy in Wireless Sensor Networks Against a Universal Adversary, 2013.
[21] Leonidas Kazatzopoulos, Costas Delakouridis and Christos Anagnostopoulos, WSN Location Privacy Scheme Enhancement through Epidemical Information Dissemination, 2014.
[22] Rupam Sherma and Nidhi Tripathi, Comprehensive Review on Wireless Sensor Networks, 2015
[23] A.J. Watt,M.R. Phillips,C.E-A. Campbell,I. Wells,S. Hole " Wireless Sensor Networks for monitoring underwater sediment transport"2019
[24] Ribhu Chopra ; Chandra R. Murthy ; Ramesh Annavajjala "Physical Layer Security in Wireless Sensor Networks Using Distributed Co-Phasing" 2019
[25] Guangjie Han ; Xu Miao ; Hao Wang ; Mohsen Guizani ; Wenbo Zhang "A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks"2019
[26] Shoukat Ali ; Muazzam A Khan ; Jawad Ahmad ; Asad W. Malik ; Anis ur Rehman" Detection and prevention of Black Hole Attacks in IOT & WSN"2018