Autosoft Journal

Online Manuscript Access

Security Completeness Problem in Wireless Sensor Networks



With the emergence of wireless sensor networks and its usage in sensitive monitoring and tracking applications, the need of ensuring complete security is gaining more importance than ever before. Complete security can only be ensured by adding privacy, cryptographic-based security and trust management aspects in a security solution. However, integration of all these three aspects in a single solution for resource constraints wireless sensor networks is not trivial. Current research intensively focuses on all these three aspects in an isolated manner. To the best of our knowledge, we have not found any work in the literature that comprehensively discusses: how these various privacy, security and trust solutions work together? In this work, we have made the first step towards this direction and to show how integration of various privacy, security and trust solutions can be performed in a single solution in step-by-step manner.



Total Pages: 16
Pages: 235-250


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways

Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Volume: 21
Issue: 2
Year: 2014

Cite this document


Ahmed, Khandakar, and Mark Gregory. "Integrating Wireless Sensor Networks with Cloud Computing." 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks (2011): n. pag. Crossref. Web.

Ahmed, Muhammad R., Xu Huang, and Dharmendra Sharma. "A Novel Misbehavior Evaluation with Dempster-Shafer Theory in Wireless Sensor Networks." Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc Networking and Computing - MobiHoc ”12 (2012): n. pag. Crossref. Web.

Aivaloglou, Efthimia, Stefanos Gritzalis, and Charalabos Skianis. "Towards a Flexible Trust Establishment Framework for Sensor Networks." Telecommunication Systems 35.3-4 (2007): 207-213. Crossref. Web.

Alamri, Atif et al. "A Survey on Sensor-Cloud: Architecture, Applications, and Approaches." International Journal of Distributed Sensor Networks 9.2 (2013): 917923. Crossref. Web.

Boukerch, A., L. Xu, and K. EL-Khatib. "Trust-Based Security for Wireless Ad Hoc and Sensor Networks." Computer Communications 30.11-12 (2007): 2413-2427. Crossref. Web.

Boyle, David, and Thomas Newe. "Securing Wireless Sensor Networks: Security Architectures." Journal of Networks 3.1 (2008): n. pag. Crossref. Web.

Chai, Guofei et al. "Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity." International Journal of Distributed Sensor Networks 8.4 (2012): 648058. Crossref. Web.

Chen, Gilbert et al. "Sense: A Wireless Sensor Network Simulator." Advances in Pervasive Computing and Networking 249-267. Crossref. Web.

Chen H. Pervasive and Mobile Computing

Cionca, Victor, Thomas Newe, and Vasile Teodor Dădârlat. "Configuration Tool for a Wireless Sensor Network Integrated Security Framework." Journal of Network and Systems Management 20.3 (2011): 417-452. Crossref. Web.

Duan, Junqi et al. "TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 10.1 (2014): 209436. Crossref. Web.

Feng R. International Journal of Distributed Sensor Networks

Ganeriwal, Saurabh, Laura K. Balzano, and Mani B. Srivastava. "Reputation-Based Framework for High Integrity Sensor Networks." ACM Transactions on Sensor Networks 4.3 (2008): 1-37. Crossref. Web.

Gong, Zheng et al. "TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks." Journal of Computer Science and Technology 29.1 (2014): 53-68. Crossref. Web.

Gómez Mármol, Félix, and Gregorio Martínez Pérez. "Providing Trust in Wireless Sensor Networks Using a Bio-Inspired Technique." Telecommunication Systems 46.2 (2010): 163-180. Crossref. Web.

Haowen Chan, and A. Perrig. "Security and Privacy in Sensor Networks." Computer 36.10 (2003): 103-105. Crossref. Web.

Healy, Michael, Thomas Newe, and Elfed Lewis. "Analysis of Hardware Encryption Versus Software Encryption on Wireless Sensor Network Motes." Lecture Notes Electrical Engineering 3-14. Crossref. Web.

Hsu, Shuo-Jen et al. "Conserving Bandwidth In A Wireless Sensor Network For Telemedicine Application." Intelligent Automation & Soft Computing 16.4 (2010): 537-551. Crossref. Web.

Huang, Shih-I, Shiuhpyng Shieh, and J. D. Tygar. "Secure Encrypted-Data Aggregation for Wireless Sensor Networks." Wireless Networks 16.4 (2009): 915-927. Crossref. Web.

Ishmanov, Farruh, Sung Kim, and Seung Nam. "A Secure Trust Establishment Scheme for Wireless Sensor Networks." Sensors 14.1 (2014): 1877-1897. Crossref. Web.

Jian, Y. et al. "Protecting Receiver-Location Privacy in Wireless Sensor Networks." IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (2007): n. pag. Crossref. Web.

Jose, J. & Princy, M. (2013, March). PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks. In Proceedings of 2013 international conference on emerging trends in computing, communication and nanotechnology (pp. 330–336)

Kamat, P. et al. "Enhancing Source-Location Privacy in Sensor Network Routing." 25th IEEE International Conference on Distributed Computing Systems (ICDCS”05) n. pag. Crossref. Web.

Kambourakis, Georgios, Stefanos Gritzalis, and Jong Hyuk Park. "Device Authentication In Wireless And Pervasive Environments." Intelligent Automation & Soft Computing 16.3 (2010): 399-418. Crossref. Web.

Karlof, Chris, Naveen Sastry, and David Wagner. "TinySec." Proceedings of the 2nd international conference on Embedded networked sensor systems - SenSys ”04 (2004): n. pag. Crossref. Web.

Li, Xiaoyong, Feng Zhou, and Junping Du. "LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks." IEEE Transactions on Information Forensics and Security 8.6 (2013): 924-935. Crossref. Web.

Li, Y., Li, J., Ren, J. & Wu, J. (2012). Providing hop-by-hop authentication and source privacy in wireless sensor networks. In IEEE international conference on computer communications (pp. 3071–3075)

Li, Yun, and Jian Ren. "Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks." 2010 Proceedings IEEE INFOCOM (2010): n. pag. Crossref. Web.

Liu, Ke, Nael Abu-Ghazaleh, and Kyoung-Don Kang. "Location Verification and Trust Management for Resilient Geographic Routing." Journal of Parallel and Distributed Computing 67.2 (2007): 215-228. Crossref. Web.

Mainwaring, Alan et al. "Wireless Sensor Networks for Habitat Monitoring." Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications - WSNA ”02 (2002): n. pag. Crossref. Web.

Misra, Satyajayant, and Guoliang Xue. "Efficient Anonymity Schemes for Clustered Wireless Sensor Networks." International Journal of Sensor Networks 1.1/2 (2006): 50. Crossref. Web.

Nguyen, Son T., Erdal Cayirci, and Chunming Rong. "A Secure Many-to-Many Routing Protocol for Wireless Sensor and Actuator Networks." Security and Communication Networks 7.1 (2012): 88-98. Crossref. Web.

Oliveira, Leonardo B. et al. "TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks." Computer Communications 34.3 (2011): 485-493. Crossref. Web.

Ozturk, Celal, Yanyong Zhang, and Wade Trappe. "Source-Location Privacy in Energy-Constrained Sensor Network Routing." Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks - SASN ”04 (2004): n. pag. Crossref. Web.

Park, Taejoon, and Kang G. Shin. "LiSP." ACM Transactions on Embedded Computing Systems 3.3 (2004): 634-660. Crossref. Web.

Perrig, Adrian, John Stankovic, and David Wagner. "Security in Wireless Sensor Networks." Communications of the ACM 47.6 (2004): 53. Crossref. Web.

Perrig, Adrian et al. Wireless Networks 8.5 (2002): 521-534. Crossref. Web.

Shaikh, Riaz Ahmed et al. "Achieving Network Level Privacy in Wireless Sensor Networks." Sensors 10.3 (2010): 1447-1472. Crossref. Web.

Shaikh, R.A. et al. "Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks." IEEE Transactions on Parallel and Distributed Systems 20.11 (2009): 1698-1712. Crossref. Web.

Shaikh, Riaz Ahmed et al. "LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network." Lecture Notes in Computer Science (2006): 367-377. Crossref. Web.

Syed, Muhammad Khaliq-ur-Rahman Raazi et al. "MUQAMI+: a Scalable and Locally Distributed Key Management Scheme for Clustered Sensor Networks." annals of telecommunications - annales des télécommunications 65.1-2 (2009): 101-116. Crossref. Web.

Tan, Guangbao, Wei Li, and Jie Song. "Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks." Proceedings of International Conference on Computer Science and Information Technology (2014): 279-289. Crossref. Web.

Wood, Anthony D. et al. "SIGF." Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks - SASN ”06 (2006): n. pag. Crossref. Web.

Yang, Junmo, and Sang-Hun Jung. "The Case Study Of System Architecture In Wireless Sensor Networks: The Kindergarten Safety System (Kss)." Intelligent Automation & Soft Computing 16.4 (2010): 507-517. Crossref. Web.

Yao, Zhiying, Daeyoung Kim, and Yoonmee Doh. "PLUS: Parameterized and Localized trUst Management Scheme for Sensor Networks Security." 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems (2006): n. pag. Crossref. Web.

Yu, Yanli et al. "Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures." Journal of Network and Computer Applications 35.3 (2012): 867-880. Crossref. Web.

Zhang, Junqi et al. "A Trust Management Architecture for Hierarchical Wireless Sensor Networks." IEEE Local Computer Network Conference (2010): n. pag. Crossref. Web.

Zhu, Chunsheng et al. "Providing Desirable Data to Users When Integrating Wireless Sensor Networks with Mobile Cloud." 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (2013): n. pag. Crossref. Web.

Zhu, Sencun, Sanjeev Setia, and Sushil Jajodia. "LEAP+." ACM Transactions on Sensor Networks 2.4 (2006): 500-528. Crossref. Web.


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048