TY - JOUR
T1 - Cross-layer based security solutions for wireless sensor networks
AU - Gawdan, Idrees Sarhan
AU - Chow, Chee-Onn
AU - Zia, Tanveer
AU - Gawdan, Qusay I.
N1 - Imported on 12 Apr 2017 - DigiTool details were: month (773h) = September, 2011; Journal title (773t) = International Journal of Physical Sciences. ISSNs: 1992-1950;
PY - 2011/9
Y1 - 2011/9
N2 - Wireless sensor networks (WSNs) were often used to collect sensitive data and the entire network was particularly vulnerable to various threats at different layers of the protocol stack. With this in mind, there was need to improve security solutions that were inevitable and advantageous to the successful deployment of the wireless sensor networks. The vast research conducted to provide security solutions against various attacks in the WSNs so far was based on the layered approach. In this study, we emphasized that the layered approaches have noticeable shortcomings such as the redundancy and/or inflexibility of the security solutions, which made the layers security solutions often inefficient and inadequate. It was, however, beneficial to construct the security approach for the WSNs based on cross-layer interaction between all components in different layers of the protocol stack. Consequently, these new approaches surely gave a new direction towards the issue of security for wireless sensor networks. The outline of the existing cross layer security schemes in literature was presented, while some new novel security solutions were proposed. More so, the synopsis of the proposed cross-layer based comprehensive security framework (CLBCSF) as the framework model for hierarchical clustering wireless sensor networks was also presented. Nonetheless, the open problems in this area were debated too.
AB - Wireless sensor networks (WSNs) were often used to collect sensitive data and the entire network was particularly vulnerable to various threats at different layers of the protocol stack. With this in mind, there was need to improve security solutions that were inevitable and advantageous to the successful deployment of the wireless sensor networks. The vast research conducted to provide security solutions against various attacks in the WSNs so far was based on the layered approach. In this study, we emphasized that the layered approaches have noticeable shortcomings such as the redundancy and/or inflexibility of the security solutions, which made the layers security solutions often inefficient and inadequate. It was, however, beneficial to construct the security approach for the WSNs based on cross-layer interaction between all components in different layers of the protocol stack. Consequently, these new approaches surely gave a new direction towards the issue of security for wireless sensor networks. The outline of the existing cross layer security schemes in literature was presented, while some new novel security solutions were proposed. More so, the synopsis of the proposed cross-layer based comprehensive security framework (CLBCSF) as the framework model for hierarchical clustering wireless sensor networks was also presented. Nonetheless, the open problems in this area were debated too.
KW - Open access version available
M3 - Article
SN - 1992-1950
VL - 6
SP - 4245
EP - 4254
JO - International Journal of Physical Sciences
JF - International Journal of Physical Sciences
IS - 17
ER -