چکیده
مقدمه
اهداف امنیتی در WSNS
چالش های امنیت در WSNS
تهدیدات در شبکه حسگر بی سیم
اقدامات متقابل در برابر حملات Wsns
نتیجه
منابع
Abstract
Introduction
Security Goals in WSNS
Challenges of Security in WSNS
Threats In Wireless Sensor Network
Countermeasures Against Wsns Attacks
Conclusion
References
چکیده
شبکه حسگر بی سیم (WSN) یک فناوری به سرعت در حال رشد است که می تواند تقریباً در همه برنامه ها مانند محیط مراقبت های بهداشتی، خانه های هوشمند، ساختمان های هوشمند، تجزیه و تحلیل زیستگاه، اپلیکیشن جهانی و غیره مورد استفاده قرار گیرد. با این حال، توسعه و استقرار عظیم WSN در برنامههای مختلف، نگرانیهایی را در مورد بدترین تهدیدات امنیتی ایجاد میکند که WSNها را در برابر بسیاری از حملات امنیتی و خرابیهای سیستم آسیبپذیر میکند. معمولاً چیدمان گرههای حسگر مشکلاتی را ایجاد میکند مانند چیدمان در محیط متروک باعث میشود WSNها در برابر تهدیدات یا تخریب پیچیده ضعیفتر شوند، محدودیتهای ذخیرهسازی داخلی گرههای حسگر نیز آرایش کلاسیک سیستم را بیفایده میکند. بنابراین، این مقاله اهداف امنیتی، آسیبپذیریها و تهدیدات اصلی مرتبط با لایههای WSN را به همراه اقدامات متقابل آنها مورد بحث قرار میدهد.
توجه! این متن ترجمه ماشینی بوده و توسط مترجمین ای ترجمه، ترجمه نشده است.
Abstract
Wireless sensor network (WSNs) is a rapidly growing technology that could be utilized in almost all applications like in healthcare environment, smart homes, smart building, analysis of habitat, global application, and so on. However, the development and huge deployment of WSN in different applications also raises the concerns of worst security threats, which make WSNs vulnerable to many security attacks and system failures. Usually, sensor nodes arrangement cause problems like arrangement in the deserted environment cause the WSNs to become weaker against the complicated threats or destruction, sensor nodes internal storage limitations also cause the classical arrangement of the system useless. Therefore, this papers discusses the major security goals, vulnerabilities, and threats that are associated with the layers of WSNs along with their countermeasures.
Introduction
The wireless sensor network (WSNs) is a network that extends wireless technologies to the embedded network and it is also described as a domain-specific wireless system. Each node is linked with various other sensor nodes and every node is known as a sensor node in a wireless sensor. It is a diverse group of sensors. The sensors in WSN are usually inexpensive and also utilize a very low amount of energy. They have low bandwidth for connectivity and are also small in scale [1]. They are ad hoc in nature. To collect data from the real world is the key purpose of WSNs. They track physical and environmental conditions like sound, pressure, temperature, and relay data accurately across the network. In such types of networks, the sensors are included and they combine information, process the information, and transfer via the central node. The wireless sensor nodes assist in the monitoring of sensor operations are usually bi-directional. To work they do not require any infrastructure. The utilized sensors in this technology are not currently available, at the micro- and nano-stages. Researchers are working on it that for the utilization of network anywhere how sensor size could be utilized [2].
Conclusion
Nowadays security of wireless networks is one of the major concerns, especially wireless network security. Therefore, it is one of the alarming problems these days. This paper has discussed security vulnerabilities, security goals, and threats which are associated with the wireless sensor network nodes. The threats associated with wireless sensor network nodes can be active and passive and these threats are further classified according to modeling layers. However, further research is required in this field for improving systems against security threats. Different protocols have also been associated with the wireless sensor networks, but they do not give satisfactory results. Moreover, the requirements for wireless sensor network nodes and their associated protocols make the wireless sensor network more complicated to have strong security practices.