Resource Limitations for Wireless Sensor Networks to Establish a Comprehensive Security System in the 5G Network

Authors

DOI:

https://doi.org/10.56919/usci.2223.007

Keywords:

Keywords- Wireless, Sensor, Network, Holistic, Quantum, 5G

Abstract

The difficulty with safety in Wireless Sensor Networks (WSNs) requires comprehensive, holistic security techniques that can offer a long-term solution. Quantum security is anticipated to assist in the overall security strategy for WSN systems given the broad adoption of WSN around the world, notably the Internet of Things (IoTs). With the use of WSN and these quantum safeguards, data security can be offered whenever and anywhere. This study examines the security limitations of WSNs and offers a comprehensive approach through all network layers that will function as an Equal security mechanism solution and a solution to shield nodes from threats such as attacks on sensitive data, eavesdropping, disruption, destruction, and alteration. WSNs are used in a range of missions, especially the armed forces, ecological, and health ones, for evaluation, tracking, and regulating purposes. However, problems arise from being aware of their resource limitations. Data and node security are difficulties when using WSN because to low computation capabilities, small memory, few power sources, and unreliable connectivity, to name just a few. Therefore, as the demand for WSNs increases, so does the need for better security measures.

 

Author Biography

Umar Danjuma Maiwada, Department of Computer Science, Umaru Musa Yar’adua University, PMB 2218, Katsina, Nigeria

 

 

References

Ahmad, K., Maabreh, M., Ghaly, M., Khan, K., Qadir, J., & Al-Fuqaha, A. (2022). Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges. Computer Science Review, 43, 100452.

https://doi.org/10.1016/j.cosrev.2021.100452

Aldaghri, N., & Mahdavifar, H. (2020). Physical layer secret key generation in static environments. IEEE Transactions on Information Forensics and Security, 15, 2692-2705.

https://doi.org/10.1109/TIFS.2020.2974621

Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs-Pitfalls and ongoing issues. Future Internet, 11(3), 73.

https://doi.org/10.3390/fi11030073

AlTawy, R., Gong, G., Mandal, K., & Rohit, R. (2020). Wage: An authenticated encryption with a twist. IACR Transactions on Symmetric Cryptology, 132-159.

https://doi.org/10.46586/tosc.v2020.iS1.132-159

Bennett, C. H., & Brassard, G. (2020). Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557.

Bock, E. A., Amadori, A., Brzuska, C., & Michiels, W. (2020). On the security goals of white-box cryptography. IACR transactions on cryptographic hardware and embedded systems, 327-357.

https://doi.org/10.46586/tches.v2020.i2.327-357

Cao, Y., Zhao, Y., Wang, Q., Zhang, J., Ng, S. X., & Hanzo, L. (2022). The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 24(2), 839-894.

https://doi.org/10.1109/COMST.2022.3144219

Chiara, P. G. (2023). Security and Privacy of Resource Constrained Devices University of Luxembourg, Luxembourg, Luxembourg].

Cohen-Shacham, E., Andrade, A., Dalton, J., Dudley, N., Jones, M., Kumar, C., Maginnis, S., Maynard, S., Nelson, C. R., & Renaud, F. G. (2019). Core principles for successfully implementing and upscaling Nature-based Solutions. Environmental Science & Policy, 98, 20-29.

https://doi.org/10.1016/j.envsci.2019.04.014

Dehraj, P., & Sharma, A. (2021). A review on architecture and models for autonomic software systems. The Journal of Supercomputing, 77, 388-417.

https://doi.org/10.1007/s11227-020-03268-0

Fan, P., Rahman, A. U., Ji, Z., Ji, X., Hao, Z., & Zhang, H. (2022). Two-party quantum private comparison based on eight-qubit entangled state. Modern Physics Letters A, 37(05), 2250026.

https://doi.org/10.1142/S0217732322500262

Fatima, A., Khan, T. A., Abdellatif, T. M., Zulfiqar, S., Asif, M., Safi, W., Al Hamadi, H., & Al-Kassem, A. H. (2023). Impact and Research Challenges of Penetrating Testing and Vulnerability Assessment on Network Threat. 2023 International Conference on Business Analytics for Technology and Security (ICBATS),

https://doi.org/10.1109/ICBATS57792.2023.10111168

Feng, Y., Jayasundara, C., Nirmalathas, A., & Wong, E. (2019). A feasibility study of IEEE 802.11 HCCA for low-latency applications. IEEE Transactions on Communications, 67(7), 4928-4938.

https://doi.org/10.1109/TCOMM.2019.2910055

Hamann, M., Moch, A., Krause, M., & Mikhalev, V. (2022). The DRACO stream cipher: A power-efficient small-state stream cipher with full provable security against TMDTO attacks. IACR Transactions on Symmetric Cryptology, 1-42.

https://doi.org/10.46586/tosc.v2022.i2.1-42

Haq, I. U., Ramzan, S., Ahmad, N., Ahmad, Y., & Nadeem, A. (2023). Towards Robust and Low Latency Security Framework for IEEE 802.11 Wireless Networks. International Journal of Computing and Digital Systems, 14(1), 1-xx.

Keerthika, M., & Shanmugapriya, D. (2022). A Systematic Survey on Various Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks (WSN). 2022 IEEE 7th International Conference on Recent Advances and Innovations in Engineering (ICRAIE),

https://doi.org/10.1109/ICRAIE56454.2022.10054309

Kissi, M. K., & Asante, M. (2020). Penetration testing of IEEE 802.11 encryption protocols using Kali Linux hacking tools. International Journal of Computer Applications, 975, 8887.

Kumar, A., & Paul, P. (2019). A Secure Three-Way Handshake Authentication Process in IEEE 802.11 i. Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017),

https://doi.org/10.1007/978-981-10-8234-4_58

Kumar, T. M., Reddy, K. S., Rinaldi, S., Parameshachari, B. D., & Arunachalam, K. (2021). A low area high speed FPGA implementation of AES architecture for cryptography application. Electronics, 10(16), 2023.

https://doi.org/10.3390/electronics10162023

Lata, S., Mehfuz, S., & Urooj, S. (2021). Secure and reliable wsn for internet of things: Challenges and enabling technologies. IEEE Access, 9, 161103-161128.

https://doi.org/10.1109/ACCESS.2021.3131367

Li, J.-D., & Fan, C.-P. (2020). Design and VLSI Implementation of Low Latency IEEE 802.11 i Cryptography Processing Unit. Journal of Advances in Computer Networks, 8(1).

https://doi.org/10.18178/JACN.2020.8.1.274

Maiwada, U. D., Muazu, A. A., & Noor, N. (2022). The Security Paradigm That Strikes a Balance Between a Holistic Security Mechanism and The WSN's Resource Constraints. East Asian Journal of Multidisciplinary Research, 1(3), 343-352.

https://doi.org/10.55927/eajmr.v1i3.102

Majid, M., Habib, S., Javed, A. R., Rizwan, M., Srivastava, G., Gadekallu, T. R., & Lin, J. C.-W. (2022). Applications of wireless sensor networks and internet of things frameworks in the industry revolution 4.0: A systematic literature review. Sensors, 22(6), 2087.

https://doi.org/10.3390/s22062087

Nazir, R., Laghari, A. A., Kumar, K., David, S., & Ali, M. (2021). Survey on wireless network security. Archives of Computational Methods in Engineering, 1-20.

Niemiec, M. (2019). Error correction in quantum cryptography based on artificial neural networks. Quantum Information Processing, 18(6), 174.

https://doi.org/10.1007/s11128-019-2296-4

Olakanmi, O. O., & Dada, A. (2020). Wireless sensor networks (WSNs): Security and privacy issues and solutions. Wireless mesh networks-security, architectures and protocols, 13, 1-16.

https://doi.org/10.5772/intechopen.84989

Orogun, E., Erivwo, O., Ideh, M., Okon, W., & Ageh, E. (2020). Optimizing Technology Applications with Compatibility Challenges in Remote Operating Environments-A Niger Delta Case Study. SPE Nigeria Annual International Conference and Exhibition,

https://doi.org/10.2118/203679-MS

Ostad-Sharif, A., Arshad, H., Nikooghadam, M., & Abbasinezhad-Mood, D. (2019). Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Generation Computer Systems, 100, 882-892.

https://doi.org/10.1016/j.future.2019.04.019

Power, M. (2021). Modelling the micro-foundations of the audit society: Organizations and the logic of the audit trail. Academy of management review, 46(1), 6-32.

https://doi.org/10.5465/amr.2017.0212

Prakasan, A., Jain, K., & Krishnan, P. (2022). Authenticated-encryption in the quantum key distribution classical channel using post-quantum cryptography. 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS),

https://doi.org/10.1109/ICICCS53718.2022.9788239

Rathee, M., Kumar, S., Gandomi, A. H., Dilip, K., Balusamy, B., & Patan, R. (2019). Ant colony optimization based quality of service aware energy balancing secure routing algorithm for wireless sensor networks. IEEE Transactions on Engineering Management, 68(1), 170-182.

https://doi.org/10.1109/TEM.2019.2953889

Shamshad, S., Riaz, F., Riaz, R., Rizvi, S. S., & Abdulla, S. (2022). An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), Employing quantum computing supremacy. Sensors, 22(21), 8151.

https://doi.org/10.3390/s22218151

Sharma, S., & Verma, V. K. (2022). An integrated exploration on internet of things and wireless sensor networks. Wireless Personal Communications, 124(3), 2735-2770.

https://doi.org/10.1007/s11277-022-09487-3

Simidzija, P., Ahmadzadegan, A., Kempf, A., & Martín-Martínez, E. (2020). Transmission of quantum information through quantum fields. Physical Review D, 101(3), 036014.

https://doi.org/10.1103/PhysRevD.101.036014

Singh, P., Acharya, B., & Chaurasiya, R. K. (2021). Lightweight cryptographic algorithms for resource-constrained IoT devices and sensor networks. In Security and Privacy Issues in IoT Devices and Sensor Networks (pp. 153-185). Elsevier.

https://doi.org/10.1016/B978-0-12-821255-4.00008-0

Sornalatha, R., Janakiraman, N., Balamurugan, K., Sivaraman, A. K., Vincent, R., & Muralidhar, A. (2021). FPGA Implementation of Protected Compact AES S-Box Using CQCG for Embedded Applications. Smart Intell. Comput. Commun. Technol., 38, 396-401.

https://doi.org/10.3233/APC210073

Strumberger, I., Minovic, M., Tuba, M., & Bacanin, N. (2019). Performance of elephant herding optimization and tree growth algorithm adapted for node localization in wireless sensor networks. Sensors, 19(11), 2515.

https://doi.org/10.3390/s19112515

Vazirani, U., & Vidick, T. (2019). Fully device independent quantum key distribution. Communications of the ACM, 62(4), 133-133.

https://doi.org/10.1145/3310974

Vishal, & Taruna, S. (2020). An Efficient Quantum Key Management Scheme. 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019: Internet of Things and Connected Technologies,

https://doi.org/10.1007/978-3-030-39875-0_29

Wagner, P. G., Birnstill, P., & Beyerer, J. (2020). Establishing secure communication channels using remote attestation with TPM 2.0. Security and Trust Management: 16th International Workshop, STM 2020, Guildford, UK, September 17-18, 2020, Proceedings 16,

https://doi.org/10.1007/978-3-030-59817-4_5

Downloads

Published

2023-06-30

How to Cite

Yakubu, M. M., & Maiwada, U. D. (2023). Resource Limitations for Wireless Sensor Networks to Establish a Comprehensive Security System in the 5G Network. UMYU Scientifica, 2(2), 44–52. https://doi.org/10.56919/usci.2223.007