The Security Paradigm That Strikes a Balance Between a Holistic Security Mechanism and The WSN's Resource Constraints

Authors

  • Umar Danjuma Maiwada Umaru Musa Yaradua Uiversity Katsina
  • Aminu Aminu Muazu Umaru Musa Yar'adua University Katsina
  • Nadzira Noor Universiti Teknologi Petronas

DOI:

https://doi.org/10.55927/eajmr.v1i3.102

Keywords:

Wireless, Sensor, Network, Holistic, Quantum

Abstract

There is a need for comprehensive holistic security methods that can provide a long-term response to the challenge of security in Wireless Sensor Networks (WSNs). Due to the widespread use of WSN around the world, particularly the Internet of Things (IoTs), quantum security is predicted to aid in the comprehensive security strategy for WSN environments. These quantum securities can be used in conjunction with WSN to provide data security anywhere and at any time. The goal of this study is to examine the security constraints of WSNs and provide a holistic strategy across all network tiers that will serve as a balanced security mechanism solution, as well as a solution to protect nodes from vital data attack, eavesdropping, disruption, destruction as well as alteration and other threats. WSNs are utilized for monitoring, tracking, and controlling applications in a variety of operations, including military, ecological, and health. However, the nature of their resource constraints causes difficulties. Low compute capabilities, tiny memory, limited energy resources, and unreliable communications are just a few of the factors that make data and node security problematic when employing WSN. As a result, as the need for WSNs grows, so does the requirement for improved security methods.

References

Amitangshu Pal, "Localization Algorithms in Wireless Sensor Networks," Network Protocols and Algorithms, Vols. Vol. 2, No. 1, pp. 45-48, 2010.

F. Idachaba, "Remote Operation of Oil and Gas production installations in the Niger Delta," Asian Transactions on Engineering, vol. Volume 01, no. Issue 03, pp. 45-59, 2011.

D. W. Chris Karlof, "Secure routing in wireless sensor networks: attacks," Elsevier, vol. 1, pp. 293-315, 2003.

T. Hollingshead, "802.11 Wireless Security vs. Basic Network Security Principles," Global Information Assurance Certification, 2003.

Al-Sakib Khan Pathan, "Security in Wireless Sensor Networks: Issues and challenges," 2006, 2006.

I. M. Junaid, "Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol," World Academy of Science, Engineering and Technology 11 2007, vol. II, pp. 910-915, 2007.

Suhas J Manangi, "Simplified AES for Low Memory Embedded," Global Journal of Computer Science and Technology Processors, vol. Vol. 10 14, no. 14, pp. 7-11, 2010.

J. C. M. Changhua He, "Security Analysis and Improvements for IEEE 802.11i”. Electrical Engineering and Computer Science Departments, Stanford University, Stanford CA 94305.

M. A. S. a. S. G.-H. Thi Mai Trang Nguyen, "802.11i Encryption Key Distribution Using Quantum Cryptography," JOURNAL OF NETWORKS, vol. 1, no. 5, pp. 9-20, SEPTEMBER/OCTOBER 2006.

H. A. a. Y. B. S. Yubo, "The provable security formal analysis of 802.11i authentication scheme," Engineering Sciences, vol. 1, no. 12, pp. 67-73, 2010.

T. W. a. H. Bin, "A Stronger Formal Security Model of Three-party Authentication and Key Distribution Protocol for 802.11i," International Journal of Security and Its Applications, vol. 6, no. 4, pp. 163-174, 2012.

A. P. Hosam Soleman, "Architecture for Application Autonomic Protection Principles in Wireless Sensor Network," International Journal of Computer Applications, vol. 64, no. 6,pp. 39-42, 2013.

Downloads

Published

2022-04-26

How to Cite

Umar Danjuma Maiwada, Aminu Aminu Muazu, & Nadzira Noor. (2022). The Security Paradigm That Strikes a Balance Between a Holistic Security Mechanism and The WSN’s Resource Constraints. East Asian Journal of Multidisciplinary Research, 1(3), 343–352. https://doi.org/10.55927/eajmr.v1i3.102

Issue

Section

Articles