Resource Limitations for Wireless Sensor Networks to Establish a Comprehensive Security System in the 5G Network
DOI:
https://doi.org/10.56919/usci.2223.007Keywords:
Keywords- Wireless, Sensor, Network, Holistic, Quantum, 5GAbstract
The difficulty with safety in Wireless Sensor Networks (WSNs) requires comprehensive, holistic security techniques that can offer a long-term solution. Quantum security is anticipated to assist in the overall security strategy for WSN systems given the broad adoption of WSN around the world, notably the Internet of Things (IoTs). With the use of WSN and these quantum safeguards, data security can be offered whenever and anywhere. This study examines the security limitations of WSNs and offers a comprehensive approach through all network layers that will function as an Equal security mechanism solution and a solution to shield nodes from threats such as attacks on sensitive data, eavesdropping, disruption, destruction, and alteration. WSNs are used in a range of missions, especially the armed forces, ecological, and health ones, for evaluation, tracking, and regulating purposes. However, problems arise from being aware of their resource limitations. Data and node security are difficulties when using WSN because to low computation capabilities, small memory, few power sources, and unreliable connectivity, to name just a few. Therefore, as the demand for WSNs increases, so does the need for better security measures.
References
Ahmad, K., Maabreh, M., Ghaly, M., Khan, K., Qadir, J., & Al-Fuqaha, A. (2022). Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges. Computer Science Review, 43, 100452.
https://doi.org/10.1016/j.cosrev.2021.100452
Aldaghri, N., & Mahdavifar, H. (2020). Physical layer secret key generation in static environments. IEEE Transactions on Information Forensics and Security, 15, 2692-2705.
https://doi.org/10.1109/TIFS.2020.2974621
Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs-Pitfalls and ongoing issues. Future Internet, 11(3), 73.
https://doi.org/10.3390/fi11030073
AlTawy, R., Gong, G., Mandal, K., & Rohit, R. (2020). Wage: An authenticated encryption with a twist. IACR Transactions on Symmetric Cryptology, 132-159.
https://doi.org/10.46586/tosc.v2020.iS1.132-159
Bennett, C. H., & Brassard, G. (2020). Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557.
Bock, E. A., Amadori, A., Brzuska, C., & Michiels, W. (2020). On the security goals of white-box cryptography. IACR transactions on cryptographic hardware and embedded systems, 327-357.
https://doi.org/10.46586/tches.v2020.i2.327-357
Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 24(2), 839-894.
https://doi.org/10.1109/COMST.2022.3144219
Chiara, P. G. (2023). Security and Privacy of Resource Constrained Devices University of Luxembourg, Luxembourg, Luxembourg].
Cohen-Shacham, E., Andrade, A., Dalton, J., Dudley, N., Jones, M., Kumar, C., Maginnis, S., Maynard, S., Nelson, C. R., & Renaud, F. G. (2019). Core principles for successfully implementing and upscaling Nature-based Solutions. Environmental Science & Policy, 98, 20-29.
https://doi.org/10.1016/j.envsci.2019.04.014
Dehraj, P., & Sharma, A. (2021). A review on architecture and models for autonomic software systems. The Journal of Supercomputing, 77, 388-417.
https://doi.org/10.1007/s11227-020-03268-0
Fan, P., Rahman, A. U., Ji, Z., Ji, X., Hao, Z., & Zhang, H. (2022). Two-party quantum private comparison based on eight-qubit entangled state. Modern Physics Letters A, 37(05), 2250026.
https://doi.org/10.1142/S0217732322500262
Fatima, A., Khan, T. A., Abdellatif, T. M., Zulfiqar, S., Asif, M., Safi, W., Al Hamadi, H., & Al-Kassem, A. H. (2023). Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat. 2023 International Conference on Business Analytics for Technology and Security (ICBATS),
https://doi.org/10.1109/ICBATS57792.2023.10111168
Feng, Y., Jayasundara, C., Nirmalathas, A., & Wong, E. (2019). A feasibility study of IEEE 802.11 HCCA for low-latency applications. IEEE Transactions on Communications, 67(7), 4928-4938.
https://doi.org/10.1109/TCOMM.2019.2910055
Hamann, M., Moch, A., Krause, M., & Mikhalev, V. (2022). The DRACO stream cipher: A power-efficient small-state stream cipher with full provable security against TMDTO attacks. IACR Transactions on Symmetric Cryptology, 1-42.
https://doi.org/10.46586/tosc.v2022.i2.1-42
Haq, I. U., Ramzan, S., Ahmad, N., Ahmad, Y., & Nadeem, A. (2023). Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks. International Journal of Computing and Digital Systems, 14(1), 1-xx.
Keerthika, M., & Shanmugapriya, D. (2022). A Systematic Survey on Various Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks (WSN). 2022 IEEE 7th International Conference on Recent Advances and Innovations in Engineering (ICRAIE),
https://doi.org/10.1109/ICRAIE56454.2022.10054309
Kissi, M. K., & Asante, M. (2020). Penetration testing of IEEE 802.11 encryption protocols using Kali Linux hacking tools. International Journal of Computer Applications, 975, 8887.
Kumar, A., & Paul, P. (2019). A Secure Three-Way Handshake Authentication Process in IEEE 802.11 i. Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017),
https://doi.org/10.1007/978-981-10-8234-4_58
Kumar, T. M., Reddy, K. S., Rinaldi, S., Parameshachari, B. D., & Arunachalam, K. (2021). A low area high speed FPGA implementation of AES architecture for cryptography application. Electronics, 10(16), 2023.
https://doi.org/10.3390/electronics10162023
Lata, S., Mehfuz, S., & Urooj, S. (2021). Secure and reliable wsn for internet of things: Challenges and enabling technologies. IEEE Access, 9, 161103-161128.
https://doi.org/10.1109/ACCESS.2021.3131367
Li, J.-D., & Fan, C.-P. (2020). Design and VLSI Implementation of Low Latency IEEE 802.11 i Cryptography Processing Unit. Journal of Advances in Computer Networks, 8(1).
https://doi.org/10.18178/JACN.2020.8.1.274
Maiwada, U. D., Muazu, A. A., & Noor, N. (2022). The Security Paradigm That Strikes a Balance Between a Holistic Security Mechanism and The WSN's Resource Constraints. East Asian Journal of Multidisciplinary Research, 1(3), 343-352.
https://doi.org/10.55927/eajmr.v1i3.102
Majid, M., Habib, S., Javed, A. R., Rizwan, M., Srivastava, G., Gadekallu, T. R., & Lin, J. C.-W. (2022). Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors, 22(6), 2087.
https://doi.org/10.3390/s22062087
Nazir, R., Laghari, A. A., Kumar, K., David, S., & Ali, M. (2021). Survey on wireless network security. Archives of Computational Methods in Engineering, 1-20.
Niemiec, M. (2019). Error correction in quantum cryptography based on artificial neural networks. Quantum Information Processing, 18(6), 174.
https://doi.org/10.1007/s11128-019-2296-4
Olakanmi, O. O., & Dada, A. (2020). Wireless sensor networks (WSNs): Security and privacy issues and solutions. Wireless mesh networks-security, architectures and protocols, 13, 1-16.
https://doi.org/10.5772/intechopen.84989
Orogun, E., Erivwo, O., Ideh, M., Okon, W., & Ageh, E. (2020). Optimizing Technology Applications with Compatibility Challenges in Remote Operating Environments-A Niger Delta Case Study. SPE Nigeria Annual International Conference and Exhibition,
https://doi.org/10.2118/203679-MS
Ostad-Sharif, A., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Computer Systems, 100, 882-892.
https://doi.org/10.1016/j.future.2019.04.019
Power, M. (2021). Modelling the micro-foundations of the audit society: Organizations and the logic of the audit trail. Academy of management review, 46(1), 6-32.
https://doi.org/10.5465/amr.2017.0212
Prakasan, A., Jain, K., & Krishnan, P. (2022). Authenticated-encryption in the quantum key distribution classical channel using post-quantum cryptography. 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS),
https://doi.org/10.1109/ICICCS53718.2022.9788239
Rathee, M., Kumar, S., Gandomi, A. H., Dilip, K., Balusamy, B., & Patan, R. (2019). Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Transactions on Engineering Management, 68(1), 170-182.
https://doi.org/10.1109/TEM.2019.2953889
Shamshad, S., Riaz, F., Riaz, R., Rizvi, S. S., & Abdulla, S. (2022). An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), Employing quantum computing supremacy. Sensors, 22(21), 8151.
https://doi.org/10.3390/s22218151
Sharma, S., & Verma, V. K. (2022). An integrated exploration on internet of things and wireless sensor networks. Wireless Personal Communications, 124(3), 2735-2770.
https://doi.org/10.1007/s11277-022-09487-3
Simidzija, P., Ahmadzadegan, A., Kempf, A., & Martín-Martínez, E. (2020). Transmission of quantum information through quantum fields. Physical Review D, 101(3), 036014.
https://doi.org/10.1103/PhysRevD.101.036014
Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks (pp. 153-185). Elsevier.
https://doi.org/10.1016/B978-0-12-821255-4.00008-0
Sornalatha, R., Janakiraman, N., Balamurugan, K., Sivaraman, A. K., Vincent, R., & Muralidhar, A. (2021). FPGA Implementation of Protected Compact AES S-Box Using CQCG for Embedded Applications. Smart Intell. Comput. Commun. Technol., 38, 396-401.
https://doi.org/10.3233/APC210073
Strumberger, I., Minovic, M., Tuba, M., & Bacanin, N. (2019). Performance of elephant herding optimization and tree growth algorithm adapted for node localization in wireless sensor networks. Sensors, 19(11), 2515.
https://doi.org/10.3390/s19112515
Vazirani, U., & Vidick, T. (2019). Fully device independent quantum key distribution. Communications of the ACM, 62(4), 133-133.
https://doi.org/10.1145/3310974
Vishal, & Taruna, S. (2020). An Efficient Quantum Key Management Scheme. 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019: Internet of Things and Connected Technologies,
https://doi.org/10.1007/978-3-030-39875-0_29
Wagner, P. G., Birnstill, P., & Beyerer, J. (2020). Establishing secure communication channels using remote attestation with TPM 2.0. Security and Trust Management: 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings 16,
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 UMYU Scientifica
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.