Mohammed Faris, M. N. Mahmud, Mohd Syafiq Mohd Salleh, Alhamzah Alnoor
{"title":"Wireless sensor network security: A recent review based on state-of-the-art works","authors":"Mohammed Faris, M. N. Mahmud, Mohd Syafiq Mohd Salleh, Alhamzah Alnoor","doi":"10.1177/18479790231157220","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is applied in many aspects, including surveillance battlefields, patient medical monitoring, building automation, traffic control, environmental monitoring, and building intrusion monitoring. The WSN is made up of a vast number of sensor nodes, which are interconnected through a network. However, despite the growing usage of applications that rely on WSNs, they continue to suffer from restrictions, such as security issues and limited characteristics due to low memory and calculation power. Security issues lead to a lack of communication between sensors, wasting more energy. The need for efficient solutions has increased, especially with the rise of the Internet of Things, which relies on the effectiveness of WSNs. This review focuses on security issues by reviewing and addressing diverse types of WSN assaults that happened on each layer of the WSN that were published in security issues in the previous 3 years. As a consequence, this paper gives a taxonomy of security threats for each layer and different algorithmic solutions that numerous researchers who seek to counter this attack have explored. This study also presents a framework for constructing an intrusion detection system in the WSN by emphasising the drawbacks of each approach suggested by researchers to defend against specific forms of assault. In order to diminish the impact of this attack, this summary shows which attacks the majority of researchers have dealt with as well as which ones they have not yet addressed in their academic work.","PeriodicalId":45882,"journal":{"name":"International Journal of Engineering Business Management","volume":null,"pages":null},"PeriodicalIF":4.9000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Engineering Business Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/18479790231157220","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"BUSINESS","Score":null,"Total":0}
引用次数: 5
Abstract
Wireless sensor networks (WSNs) are a major part of the telecommunications sector. WSN is applied in many aspects, including surveillance battlefields, patient medical monitoring, building automation, traffic control, environmental monitoring, and building intrusion monitoring. The WSN is made up of a vast number of sensor nodes, which are interconnected through a network. However, despite the growing usage of applications that rely on WSNs, they continue to suffer from restrictions, such as security issues and limited characteristics due to low memory and calculation power. Security issues lead to a lack of communication between sensors, wasting more energy. The need for efficient solutions has increased, especially with the rise of the Internet of Things, which relies on the effectiveness of WSNs. This review focuses on security issues by reviewing and addressing diverse types of WSN assaults that happened on each layer of the WSN that were published in security issues in the previous 3 years. As a consequence, this paper gives a taxonomy of security threats for each layer and different algorithmic solutions that numerous researchers who seek to counter this attack have explored. This study also presents a framework for constructing an intrusion detection system in the WSN by emphasising the drawbacks of each approach suggested by researchers to defend against specific forms of assault. In order to diminish the impact of this attack, this summary shows which attacks the majority of researchers have dealt with as well as which ones they have not yet addressed in their academic work.
期刊介绍:
The International Journal of Engineering Business Management (IJEBM) is an international, peer-reviewed, open access scientific journal that aims to promote an integrated and multidisciplinary approach to engineering, business and management. The journal focuses on issues related to the design, development and implementation of new methodologies and technologies that contribute to strategic and operational improvements of organizations within the contemporary global business environment. IJEBM encourages a systematic and holistic view in order to ensure an integrated and economically, socially and environmentally friendly approach to management of new technologies in business. It aims to be a world-class research platform for academics, managers, and professionals to publish scholarly research in the global arena. All submitted articles considered suitable for the International Journal of Engineering Business Management are subjected to rigorous peer review to ensure the highest levels of quality. The review process is carried out as quickly as possible to minimize any delays in the online publication of articles. Topics of interest include, but are not limited to: -Competitive product design and innovation -Operations and manufacturing strategy -Knowledge management and knowledge innovation -Information and decision support systems -Radio Frequency Identification -Wireless Sensor Networks -Industrial engineering for business improvement -Logistics engineering and transportation -Modeling and simulation of industrial and business systems -Quality management and Six Sigma -Automation of industrial processes and systems -Manufacturing performance and productivity measurement -Supply Chain Management and the virtual enterprise network -Environmental, legal and social aspects -Technology Capital and Financial Modelling -Engineering Economics and Investment Theory -Behavioural, Social and Political factors in Engineering