Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks

2015-10-16
Sert, Seyyit Alper
Onur, Ertan
Yazıcı, Adnan
Surveillance has always been an important task for human beings either for protecting a precious asset or gathering information from the surrounding environment. However, things to be monitored are increasing with a huge rate due to the changing requirements day by day. As a result, it becomes nearly impossible for individuals to do this task manually. To be able to fulfill such requirements, Surveillance Wireless Sensor Networks (SWSNs) have emerged. An SWSN is comprised of tiny nodes geared with various sensor types from a few of them to hundreds or even thousands, where each node is connected to several surrounding nodes. Most SWSNs operate by sensing at the node-level and conveying the sensed data to the sink (base station) for decision making processes such as object classification, localization, or event detection. In this respect, secure transmission of the sensed data is crucial since decision making is performed according to the received data. In this study, we primarily discuss the security attacks and defense mechanisms in surveillance wireless sensor networks. Moreover, security requirements of SWSNs, how accuracy and efficiency aspects of SWNSs are affected from each attack type, and evaluation criteria of defense mechanisms are presented in detail.

Suggestions

Impacts of Routing Attacks on Surveillance Wireless Sensor Networks
Sert, Seyyit Alper; Yazıcı, Adnan; Coşar, Ahmet (2015-08-25)
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed accordin...
Surveillance wireless sensor networks: Deployment quality analysis
Onur, Ertan; Delic, Hakan; Akarun, Lale (2007-11-01)
Surveillance wireless sensor networks are deployed at perimeter or border locations to detect unauthorized intrusions. For deterministic deployment of sensors, the quality of deployment can be determined sufficiently by analysis in advance of deployment. However, when random deployment is required, determining the deployment quality becomes challenging. To assess the quality of sensor deployment, appropriate measures can be employed that reveal the weaknesses in the coverage of SWSNs with respect to the suc...
An Adaptive, energy-aware and distributed fault-tolerant topology-control algorithm for heterogeneous wireless sensor networks
Deniz, Fatih; Yazıcı, Adnan; Bağcı, Hakkı; Department of Computer Engineering (2016)
Wireless sensor networks (WSNs) are being used in numerous fields, such as battlefield surveillance, environmental monitoring and traffic control. They are typically composed of large numbers of tiny sensor nodes with limited resources. Because of their limitations and because of the environments they are being used, there are problems unique to WSNs. Due to the error-prone nature of wireless communication, especially in harsh environments, fault-tolerance emerges as an important property in WSNs. Also, bec...
S Alper Sert Adnan Yazici and Ahmet Cosar Impacts of Routing Attacks on Surveillance Wireless Sensor Networks IWCMC 2015 Dubrovnik Croatia 24 28 August 2015
Seyyit Alper, Sert; Yazıcı, Adnan; Coşar, Ahmet (null; 2015-06-24)
Surveillance Wireless Sensor Networks (SWSNs) are the result of abundant data gathering requirements occurring in Wireless Sensor Networks, specifically for surveillance reasons. Most SWSNs operate by sensing the environment and transmitting the acquired data to a sink in order to utilize it for decision making processes such as object detection, classification, localization, or event detection. In this respect, secure routing of acquired data is crucial since a decision making process is performed accordin...
Optimal data compression for lifetime maximization in wireless sensor networks operating in stealth mode
Incebacak, Davut; Zilan, Ruken; TAVLI, BÜLENT; Barcelo-Ordinas, Jose M.; Garcia-Vidal, Jorge (2015-01-01)
Contextual privacy in Wireless Sensor Networks (WSNs) is concerned with protecting contextual information such as whether, when, and where the data is collected. In this context, hiding the existence of a WSN from adversaries is a desirable feature. One way to mitigate the sensor nodes' detectability is by limiting the transmission power of the nodes (Le., the network is operating in the stealth mode) so that adversaries cannot detect the existence of the WSN unless they are within the sensing range of the ...
Citation Formats
S. A. Sert, E. Onur, and A. Yazıcı, “Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks,” 2015, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/45851.