Imperial College London

ProfessorJulieMcCann

Faculty of EngineeringDepartment of Computing

Professor of Computer Systems
 
 
 
//

Contact

 

+44 (0)20 7594 8375j.mccann Website

 
 
//

Location

 

258ACE ExtensionSouth Kensington Campus

//

Summary

 

Publications

Citation

BibTex format

@article{Tomic:2017:10.1109/JIOT.2017.2749883,
author = {Tomic, I and McCann, JA},
doi = {10.1109/JIOT.2017.2749883},
journal = {IEEE Internet of Things Journal},
pages = {1910--1923},
title = {A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols},
url = {http://dx.doi.org/10.1109/JIOT.2017.2749883},
volume = {4},
year = {2017}
}

RIS format (EndNote, RefMan)

TY  - JOUR
AB - The increasing pervasiveness of Wireless Sensor Networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments i.e. IEEE 802.15.4, B-MAC, 6LoWPAN, RPL, BCP, CTP, and CoAP, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This work culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems.
AU - Tomic,I
AU - McCann,JA
DO - 10.1109/JIOT.2017.2749883
EP - 1923
PY - 2017///
SN - 2327-4662
SP - 1910
TI - A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols
T2 - IEEE Internet of Things Journal
UR - http://dx.doi.org/10.1109/JIOT.2017.2749883
UR - http://hdl.handle.net/10044/1/53004
VL - 4
ER -