TY - GEN
T1 - Security attacks and countermeasures in Surveillance Wireless Sensor Networks
AU - Sert, Seyyit Alper
AU - Onur, Ertan
AU - Yazici, Adnan
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/11/25
Y1 - 2015/11/25
N2 - Surveillance has always been an important task for human beings either for protecting a precious asset or gathering information from the surrounding environment. However, things to be monitored are increasing with a huge rate due to the changing requirements day by day. As a result, it becomes nearly impossible for individuals to do this task manually. To be able to fulfill such requirements, Surveillance Wireless Sensor Networks (SWSNs) have emerged. An SWSN is comprised of tiny nodes geared with various sensor types from a few of them to hundreds or even thousands, where each node is connected to several surrounding nodes. Most SWSNs operate by sensing at the node-level and conveying the sensed data to the sink (base station) for decision making processes such as object classification, localization, or event detection. In this respect, secure transmission of the sensed data is crucial since decision making is performed according to the received data. In this study, we primarily discuss the security attacks and defense mechanisms in surveillance wireless sensor networks. Moreover, security requirements of SWSNs, how accuracy and efficiency aspects of SWNSs are affected from each attack type, and evaluation criteria of defense mechanisms are presented in detail.
AB - Surveillance has always been an important task for human beings either for protecting a precious asset or gathering information from the surrounding environment. However, things to be monitored are increasing with a huge rate due to the changing requirements day by day. As a result, it becomes nearly impossible for individuals to do this task manually. To be able to fulfill such requirements, Surveillance Wireless Sensor Networks (SWSNs) have emerged. An SWSN is comprised of tiny nodes geared with various sensor types from a few of them to hundreds or even thousands, where each node is connected to several surrounding nodes. Most SWSNs operate by sensing at the node-level and conveying the sensed data to the sink (base station) for decision making processes such as object classification, localization, or event detection. In this respect, secure transmission of the sensed data is crucial since decision making is performed according to the received data. In this study, we primarily discuss the security attacks and defense mechanisms in surveillance wireless sensor networks. Moreover, security requirements of SWSNs, how accuracy and efficiency aspects of SWNSs are affected from each attack type, and evaluation criteria of defense mechanisms are presented in detail.
KW - attacks and countermeasures
KW - breach of security
KW - impact assessment
KW - surveillance wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=84960932874&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84960932874&partnerID=8YFLogxK
U2 - 10.1109/ICAICT.2015.7338546
DO - 10.1109/ICAICT.2015.7338546
M3 - Conference contribution
AN - SCOPUS:84960932874
T3 - 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings
SP - 201
EP - 205
BT - 9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 9th International Conference on Application of Information and Communication Technologies, AICT 2015
Y2 - 14 October 2015 through 16 October 2015
ER -