Kablosuz Algılayıcı Ağlarda Güvenlik Sorunları ve Alınabilecek Önlemler

Günümüzde kablosuz algılayıcı ağların verimliliği ve kullanılabilirliği hakkında birçok çalışma olmasına rağmen bu ağların güvenliği konusunda yeterli miktarda çalışma yoktur. Peki, bu kablosuz algılayıcı ağları oluşturan trilyonlarca küçük algılayıcıların güvenliği nasıl sağlanacaktır? Bu ağların güvenliği, masaüstü bilgisayarlar kadar kolay değildir. Çünkü bu algılayıcıların işlemci gücü, hafıza, bantgenişliği ve enerji gibi bazı kısıtları vardır. Dolayısıyla yapısı çeşitli saldırılara açıktır. Bu çalışmada kablosuz algılayıcı ağların yapısı, bu ağların ana çalışma konuları, bu ağlarda güvenlik hedefleri, temel ağ saldırıları, güvenlik protokolleri, güvenli yönlendirme ve güvenli servis modelleri ele alınmıştır. Güvenliği sağlamak için çeşitli çözümler sunan makaleler incelenerek bu bildiriler ve makalelerde bulunan açıklıklarlistelenmiş, kablosuz algılayıcı ağ güvenliğinin nasıl sağlanması gerektiği üzerinde çalışmalar özetlenmiştir. Elde edilen bulgular sonuçta tartışılmıştır

Security Issues on Wireless Sensor Networks and The Possible Precautions

Nowadays, there are lots of study which include wireless sensor networks' efficiency and usability but there aren't enough study that includes its security. Then, how can the security of trillions of small sensors (which form the wireless sensor network) be provided? The security of these networks is not as easy as security of desktop computers. Because, there are constraints which are CPU power, memory, bandwidth and energy in these sensors. Hence, its structure is vulnerable to variousattacks. In this study, structure of wireless sensor networks, main study subjects of these networks, security goals on these networks, basic network attacks, security protocols, secured routing and secured service models are handled. By examining articles which offer solutions for security, the vulnerabilities in these articles are listed and the articles are summarized on how the security of wireless sensor networks must be provided

___

  • 1) Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., Culler, D. E. "SPINS: Security Protocols for Sensor Networks", ACM Journal of Wireless Networks, 8 (5), 521-534 (2002).
  • 2) Xu, J.F., "A Defense System for Wireless Sensor Networks", The Journal of China Universities of Posts and Telecommunications, 18(2), 119-122 (2011).
  • 3) Padmavathi, G., Shanmugapriya, D., "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks", International Journal of Computer Science and Information Security, 4 (1), 117- 125 (2009).
  • 4) Özdemir, S., Xiao, Y., "Secure Data Aggregation in Wireless Sensor Networks: A Comprehensive Overview", Computer Networks, 53, 2022-2037 (2009).
  • 5) Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N., "Secure Data Aggregation in Wireless Sensor Networks: A Survey", IEEE Seventh International Conference on Parallel and Distributed Computing, 315-320 (2006).
  • 6) Rajagopalan, R., Varshney, P.K., "Data Aggregation Techniques in Sensor Networks: A Survey", IEEE Communications Surveys&Tutorials, 8 (4), 48-63 (2006).
  • 7) Naeem, T., Loo, K., "Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks", International Journal of Digital Content Technology and Its Applications, 3 (1), 88-9 (2009).
  • 8) Kwon, S., Ko, J., Kim, J., Kim, C., "Dynamic Timeout for Data Aggregation in Wireless Sensor Networks", ACM The International Journal of Computer and Telecommunications Networking, 55 (3), 650- 664 (2011).
  • 9) Zhou, Y., Fang, Y., "Securing Wireless Sensor Networks: A Survey", IEEE Communications Surveys &Tutorials, 10(3), 6-28 (2008).
  • 10) Zubiete, E.D., Luque, L.F., Fernandez, L., Rodriguez, A.V.M., Gonzalez, I.G., "Review of Wireless Sensors Networks in Health Applications", IEEE Engineering Medicine Biology Sociecty, 1789-1793 (2011).
  • 11) Rahman, M.A., Alhamid, M.F., Gueaieb, W., El Saddik, A., "An Ambient Intelligent Body Sensor Network for E-Health Applications",IEEE Medical Measurements and Applications, 22-25 (2009).
  • 12) Singh, S., Verma, H.K., "Security for Wireless Sensor Network", International Journal on Computer Science and Engineering, 3 (6), 2393-2399 (2011).
  • 13) Wang, Y., Attebury, G., Ramamurthy, B., "A Survey of Security Issues in Wireless Sensor Networks", IEEE Communications Surveys &Tutorials, 8 (2), 2-23 (2006).
  • 14) Akyildiz, I.F., Weilian Su, Sankarasubramaniam, Y., Cayirci, E., "Survey on Sensor Networks", IEEE Communications Magazine, 40 (8), 102 - 114 (2002).
  • 15) Meghdadi, M., Özdemir, S., Güler, İ., "Kablosuz Algılayıcı Ağlarında Güvenlik: Sorunlar Ve Çözümler", Bilişim Teknolojileri, 1 (1), (2008).
  • 16) Nanda, R., Krishna, P.V., "Mitigating Denial Of Service Attacks in Hierarchical Wireless Sensor Networks", Network Security, 10, 14-18 (2011).
  • 17) Ssu, K., Wang, W., Chang, W., "Detecting Sybil Attacks in Wireless Sensor Networks Using Neighboring Information", ACM Computer Networks, 52 (18), 3042- 3056 (2009).
  • 18) Tripathy, S., Nandi, S., "Defense Against Outside Attacks in Wireless Sensor Networks", IEEE Computer Communications, 31 (4), 818-826 (2008).
  • 19) Bhatti, S., Xu, J., Memon, M., "Clustering and Fault Tolerance for Target Tracking Using Wireless Sensor Networks", 1 (2), 66-73 (2011).
  • 20) [Stajano, F., Anderson, R., "The Resurrecting Duckling: Security Issues for Ad-Hoc Wireless Networks", 7th International Security Protocols Workshop,1796, 172- 194 (1999).
  • 21) Zhu, S., Setia, S., Jajodia, S., "LEAP: Efficient Security Mechanisms for Largescale Distributed Sensor Networks", ACM Conference on Computer and Communications Security, 62-72 (2003).
  • 22) Chan, H., Perrig, A., Song, D., "Random Key Predistribution Schemes for Sensor Networks", IEEE Security and PrivacySymposium, 197-213 (2003).
  • 23) Karlof, C., Wagner, D., "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures" Ad Hoc Networks, 1, 293-315 (2003).
  • 24) Sharif, L., Ahmed, M., "The Wormhole Routing Attack in Wireless Sensor Networks (WSN)", First IEEE International Workshop on Sensor Network Protocols and Applications, 6 (2), 177-184 (2010).
  • 25) Sun, K., Ning, P., Wang, C., "Tinysersync: Secure and Resilient Time Synchronization in Wireless Sensor Networks", Proceedings of the 13th ACM Conference on Computer and Communications Security, 264-277 (2006).
  • 26) Fessant, F., Papadimitriou, A., Viana, A.C., Sengul, C., Palomar, E., "A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis", Computer Communications, 35:2, 234-248 (2012).
  • 27) Fanian, A., Berenjkoub, M., Saidi, H., Gulliver, T.A., "A high performance and intrinsically secure key establishment protocol for wireless sensor networks", Computer Networks, 55:8, 1849-1863 (2011).
  • 28) Lee, J., Kapitanova, K., Son, S.H., "The price of security in wireless sensor networks", Computer Networks, 54:17, 2967-2978 (2010).
  • 29) Delgado-Mohatar, O., Fúster-Sabater, A., Sierra, J.M., "A light-weight authentication scheme for wireless sensor networks", Ad Hoc Networks, 9:5, 727-735 (2011).
  • 30) Misra, S., Thomasinous, P.D., "A simple, least-time, and energy-efficient routing protocol with one-level data aggregation for wireless sensor networks", Journal of Systems and Software, 83:5, 852-860 (2010).
  • 31) Szalachowski, P., Ksiezopolski, B., Kotulski, Z., "CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks", Information Processing Letters, 110:7, 247- 251 (2010).
  • 32) Li, H., Lin, K., Li, K., "Energy-efficient and highaccuracy secure data aggregation in wireless sensor networks", Computer Communications, 34:4, 591-597 (2011).
  • 33) Das, A.K., Sharma, P., Chatterjee, S., Sing, J.K., "A dynamic password-based user authentication scheme for hierarchical wireless sensor networks", Journal of Network and Computer Applications, 35:5, 1646-1656 (2012).
  • 34) Harjito, B., Han, S., "Wireless Multimedia Sensor Networks Applications and Security Challenges", IEEE Computer Society, 842-846, (2010)