Security attacks and countermeasures in Surveillance Wireless Sensor Networks

Seyyit Alper Sert, Ertan Onur, Adnan Yazici

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Citations (Scopus)

Abstract

Surveillance has always been an important task for human beings either for protecting a precious asset or gathering information from the surrounding environment. However, things to be monitored are increasing with a huge rate due to the changing requirements day by day. As a result, it becomes nearly impossible for individuals to do this task manually. To be able to fulfill such requirements, Surveillance Wireless Sensor Networks (SWSNs) have emerged. An SWSN is comprised of tiny nodes geared with various sensor types from a few of them to hundreds or even thousands, where each node is connected to several surrounding nodes. Most SWSNs operate by sensing at the node-level and conveying the sensed data to the sink (base station) for decision making processes such as object classification, localization, or event detection. In this respect, secure transmission of the sensed data is crucial since decision making is performed according to the received data. In this study, we primarily discuss the security attacks and defense mechanisms in surveillance wireless sensor networks. Moreover, security requirements of SWSNs, how accuracy and efficiency aspects of SWNSs are affected from each attack type, and evaluation criteria of defense mechanisms are presented in detail.

Original languageEnglish
Title of host publication9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages201-205
Number of pages5
ISBN (Electronic)9781467368551
DOIs
Publication statusPublished - Nov 25 2015
Event9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Rostov-on-Don, Russian Federation
Duration: Oct 14 2015Oct 16 2015

Publication series

Name9th International Conference on Application of Information and Communication Technologies, AICT 2015 - Proceedings

Conference

Conference9th International Conference on Application of Information and Communication Technologies, AICT 2015
Country/TerritoryRussian Federation
CityRostov-on-Don
Period10/14/1510/16/15

Keywords

  • attacks and countermeasures
  • breach of security
  • impact assessment
  • surveillance wireless sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Security attacks and countermeasures in Surveillance Wireless Sensor Networks'. Together they form a unique fingerprint.

Cite this