Loading

Internet of Things (IoT) Enabled Wireless Sensor Networks Security Challenges and Current Solutions
Ashwini Kore1, Shailaja Patil2

1Ashwini Kore*, JSPM’s, Rajarshi Shahu College Of Engineering, Tathawade, Pune.
2Shailaja Patil, Professor, JSPM’s Rajarshi Shahu College Of Engineering, Tathawade, Pune.

Manuscript received on October 11, 2019. | Revised Manuscript received on 24 October, 2019. | Manuscript published on November 10, 2019. | PP: 282-290 | Volume-9 Issue-1, November 2019. | Retrieval Number: A4023119119/2019©BEIESP | DOI: 10.35940/ijitee.A4023.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Nowadays Internet of Things (IoT) is emerging and effective technology along with Wireless Sensor Networks (WSNs) in a few constant applications in which the human intervention significantly reduced along with better human life. In IoT enabled WSNs, the sensor nodes used to assemble the fragile data and communicate towards the sink hub and actuators for automotive remote monitoring process. However as the WSNs operating at free frequency band, it is powerless against different attacks at various layers of WSNs protocol stack in which attackers may try to hack and compromise the user’s personal information. There are different types of attacks in WSNs and several research works conducted to protect from these attacks in WSNs. Majority of security methods proposed are based layered technique. However, the layer approach is not enough to protect the WSNs effectively as the many attackers used the cross-layer information to perform the attacks. This paper presents the study over the layered security solutions and their research problems at first to justify the importance of cross-layer solutions. The review of different ways of designing the cross-layer security techniques for WSNs with their behaviour presented as well. The challenges of IoT enabled WSNs single layered security solutions presented and then the various cross-layer solutions reviewed in this paper. The comparative study of different cross-layer techniques to demonstrate the layers and their parameters involved to detect of security threats. The outcome of this review work is the research challenges noticed from the present cross-layer solutions. Keywords: Attacks, cross-layer attacks, cross-layer solutions, layered solutions, Internet of Things, wireless sensor networks.
Keywords: Fuzzy Number, Hexagonal Fuzzy
Scope of the Article:  Internet of Things (IoT)