Smart City Gnosys

Smart city article details

Title Intrusion Detection Protocols In Wireless Sensor Networks Integrated To Internet Of Things Deployment: Survey And Future Challenges
ID_Doc 33339
Authors Pundir S.; Wazid M.; Singh D.P.; Das A.K.; Rodrigues J.J.P.C.; Park Y.
Year 2020
Published IEEE Access, 8
DOI http://dx.doi.org/10.1109/ACCESS.2019.2962829
Abstract As we all know that the technology is projected to be next to humans very soon because of its holistic growth. Now-a-days, we see a lot of applications that are making our lives comfortable such as smart cars, smart homes, smart traffic management, smart offices, smart medical consultation, smart cities, etc. All such facilities are in the reach of a common man because of the advancement in Information and Communications Technology (ICT). Because of this advancement, new computing and communication environment such as Internet of Things (IoT) came into picture. Lot of research work is in progress in IoT domain which helps for the overall development of the society and makes the lives easy and comfortable. But in the resource constrained environment of Wireless Sensor Network (WSN) and IoT, it is almost inconceivable to establish a fully secure system. As we are moving forward very fast, technology is becoming more and more vulnerable to the security threats. In future, the number of Internet connected people will be less than the smart objects so we need to prepare a robust system for keeping the above mentioned environments safe and standardized it for the smooth conduction of communication among IoT objects. In this survey paper, we provide the details of threat model applicable for the security of WSN and IoT based communications. We also discuss the security requirements and various attacks possible in WSN and IoT based communication environments. The emerging projects of WSNs integrated to IoT are also briefed. We then provide the details of different architectures of WSN and IoT based communication environments. Next, we discuss the current issues and challenges related to WSN and IoT. We also provide a critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis. A taxonomy of security and privacy-preservation protocols in WSN and IoT is also highlighted. Finally, we discuss some research challenges which need to be addressed in the coming future. © 2019 IEEE.
Author Keywords cloud computing; edge computing; fog computing; Internet of Things (IoT); intrusion detection; security; Wireless sensor network (WSN)


Similar Articles


Id Similarity Authors Title Published
46467 View0.909Chiba Z.; Abghour N.; Moussaid K.; Lifandali O.; Kinta R.Review Of Recent Intrusion Detection Systems And Intrusion Prevention Systems In Iot Networks2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022 (2022)
5166 View0.903Alsharifi S.; Alanezi M.A Survey Of Intrusion Detection Systems In Wireless Sensor NetworksAIP Conference Proceedings, 2845, 1 (2023)
33253 View0.902Oluwalola F.K.; Oluyemi D.Introduction Of Security And Privacy Issues For Iot And WsnSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
47990 View0.892Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
4267 View0.892Durga Bhavani A.; Mangla N.A Review On Intrusion Detection Approaches In Resource-Constrained Iot EnvironmentLecture Notes on Data Engineering and Communications Technologies, 68 (2022)
16580 View0.889Sharma P.Critical Review Of Various Intrusion Detection Techniques For Internet Of Things2nd International Conference on Data, Engineering and Applications, IDEA 2020 (2020)
32898 View0.886Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
25567 View0.885Saini J.; Kait R.Exploring Machine Learning Strategies For Intrusion Detection In Wireless Sensor Networks2024 IEEE 9th International Conference for Convergence in Technology, I2CT 2024 (2024)
54316 View0.881Kadel A.; Gangakhedkar T.; Patidar Y.; Ghosh A.; Panchal A.; Albalawi N.S.Systematic Literature Review On Security And Privacy Issues On Wsn And IotSecurity and Privacy Issues for IoT and WSN-based Real-time Applications (2025)
58001 View0.879Rangelov D.; Lämmel P.; Brunzel L.; Borgert S.; Darius P.; Tcholtchev N.; Boerger M.Towards An Integrated Methodology And Toolchain For Machine Learning-Based Intrusion Detection In Urban Iot Networks And PlatformsFuture Internet, 15, 3 (2023)