Abstract
Nowadays, the most exciting and challenging research domain remains Wireless Sensor Networks due to their rapidly progress in Information and Communication Technology. Follow-on different debates over the most effective means of securing wireless sensor networks, the intent of this paper is to investigate the security issues and challenges as well as solutions in WSN. Authentication is the primary focus, as the most malicious attacks on a network are the work of imposters, such as DOS attacks. Nevertheless, the data link layer is not spared, in this paper we emphasized on it for the reason that it handles everything within one hop such as the media access control (MAC), the error control (EC) and the power control (PC) while the link layer specifies the handshakes and handles retransmissions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Sharma, A., Shinghal, K., Srivastava, N., Singh, R.: Energy Management for Wireless Sensor Network Nodes. International Journal of Advances in Engineering & Technology 1(1), 7–13 (2011)
Kuorilehto, M., Kohvakka, M., Suhonen, J., Hamalainen, P., Hannikainen, M., Hamalainen, T.D.: Ultra-Low Energy Wireless Sensor Networks in Practice: Theory, Realization and Deployment. Tampere University of Technology, Finland (2007)
Hassanzdeh, N.: Scalable Data Collection for Wireless Sensors Networks. Swedish Institute of Computer Science, Stockholm, Sweden XR-EE-LCN (2012)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag., 102–114 (August 2002)
Zheng, J., Jamallipour, A.: Wireless Sensor Network. A Networking Perspective. IEEE (2009) ISBN: 178-0-470-16763-2
Souppaya, M., Scarfone, K.: Recommendations of the National Institute of Standards and Technology (NIST). Guidelines for Securing Wireless Local Area Networks (WLANs), U.S Department of Commerce, Special Publication 800-153 (February 2012)
Xing, K., Sundhar, S., Srinivasan, R., Rivera, M., Li, J., Cheng, X.: Attacks and Counter-measures in Sensor Networks: A Survey. Network Security (2005)
Van Dam, T., Langendoen, K.: An adaptive energy-efficient MAC protocol for wireless sensor networks. In: Proc 1st Ibt’l Conf. on Embedded Networked Sensor Systems, Los Angeles (2003)
Lu, G., Machari, K., Raghavendra, C.: An adaptive energy efficient and low-latency MAC for data gathering in wireless sensor networks. In: Proc 18th Int’l Parallel and Distributed Processing Symp. (IPDPS 2004), New Mexico (2004)
Mahajan, L., Kaur, S.: Medium Access Control Optimization for Wireless Sensor Networks. International Journal of Computer Science and Technology 1(1), 8 (2010)
Ganeriwal, S., Kumar, R., Srivastava, M.: Timing2sync protocol for sensor networks. In: Proceedings of t he 1st ACM Conference on Embedded Networked Sensor Systems, Los Angeles (2003)
Van Dam, T., Langendoen, K.: An adaptive energy-efficient MAC protocol for wireless sensor networks. In: Proc 1st Ibt’l Conf. on Embedded Networked Sensor Systems, Los Angeles (2003)
Camtepe, S.A., Yener, B.: Key management in wireless sensor network. In: Lopez, J., Zhou, J.Y. (eds.) Wireless Sensor Network Security. IOS Press (2008)
Altisen, K., Devismes, S., Lafourcade, P., Ponsonnet, C.: Secure Probabilistic Routing in Wireless Sensor Networks, Verimag Research Report, TR-2011-15g, ADPP-RR-2011
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bruce, N., Kim, TY., Lee, H.J. (2012). Data Link Layer’ Security Analysis for Wireless Sensor Networks. In: Kim, Th., Ko, Ds., Vasilakos, T., Stoica, A., Abawajy, J. (eds) Computer Applications for Communication, Networking, and Digital Contents. FGCN 2012. Communications in Computer and Information Science, vol 350. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35594-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-35594-3_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35593-6
Online ISBN: 978-3-642-35594-3
eBook Packages: Computer ScienceComputer Science (R0)