TY - JOUR
T1 - Improving the resilience of Wireless Sensor Networks against security threats
T2 - A survey and open research issues
AU - Ali, Saqib
AU - Al-Balushi, Taiseera
AU - Nadir, Zia
AU - Hussain, Omar Khadeer
N1 - Funding Information:
The research that produced these findings received Project Funding from The Research Council of the Sultanate of Oman, under Research Agreement No [ORG/SQU/ICT/13/011]. The authors would like to acknowledge and sincerely thank the research council and Sultan Qaboos University for all their managerial, administrative and financial support.
Publisher Copyright:
© IJTech 2018.
PY - 2018
Y1 - 2018
N2 - Wireless Sensor Network (WSN) technology has gained importance in recent years due to its various benefits, practicability and extensive utilization in diverse applications. The innovation helps to make real-time automation, monitoring, detecting and tracking much easier and more effective than previous technologies. However, as well as their benefits and enormous potential, WSNs are vulnerable to cyber-attacks. This paper is a systematic literature review of the security-related threats and vulnerabilities in WSNs. We review the safety of and threats to each WSN communication layer and then highlight the importance of trust and reputation, and the features related to these, to address the safety vulnerabilities. Finally, we highlight the open research areas which need to be addressed in WSNs to increase their flexibility against security threats.
AB - Wireless Sensor Network (WSN) technology has gained importance in recent years due to its various benefits, practicability and extensive utilization in diverse applications. The innovation helps to make real-time automation, monitoring, detecting and tracking much easier and more effective than previous technologies. However, as well as their benefits and enormous potential, WSNs are vulnerable to cyber-attacks. This paper is a systematic literature review of the security-related threats and vulnerabilities in WSNs. We review the safety of and threats to each WSN communication layer and then highlight the importance of trust and reputation, and the features related to these, to address the safety vulnerabilities. Finally, we highlight the open research areas which need to be addressed in WSNs to increase their flexibility against security threats.
KW - Countermeasures
KW - Reputation
KW - Security
KW - Threats
KW - Trust
KW - Vulnerabilities
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=85052519286&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85052519286&partnerID=8YFLogxK
U2 - 10.14716/ijtech.v9i4.1526
DO - 10.14716/ijtech.v9i4.1526
M3 - Article
AN - SCOPUS:85052519286
SN - 2086-9614
VL - 9
SP - 828
EP - 839
JO - International Journal of Technology
JF - International Journal of Technology
IS - 4
ER -