Communications Infrastructure. Systems and Applications in Europe. First International ICST Conference, EuropeComm 2009, London, UK, August 11-13, 2009, Revised Selected Papers

Research Article

Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks

Download
382 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11284-3_27,
        author={Adnan Ashraf and AbdulRauf Rajput and Marvie Mussadiq and Bhawani Chowdhry and Manzoor Hashmani},
        title={Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks},
        proceedings={Communications Infrastructure. Systems and Applications in Europe. First International ICST Conference, EuropeComm 2009, London, UK, August 11-13, 2009, Revised Selected Papers},
        proceedings_a={EUROPECOMM},
        year={2012},
        month={5},
        keywords={WSN security Security vulnerability Threats and Attacks Security Framework},
        doi={10.1007/978-3-642-11284-3_27}
    }
    
  • Adnan Ashraf
    AbdulRauf Rajput
    Marvie Mussadiq
    Bhawani Chowdhry
    Manzoor Hashmani
    Year: 2012
    Improved Classification and Framework Association of Security Vulnerability, Threats and Attacks in Wireless Sensor Networks
    EUROPECOMM
    Springer
    DOI: 10.1007/978-3-642-11284-3_27
Adnan Ashraf1,*, AbdulRauf Rajput1, Marvie Mussadiq2, Bhawani Chowdhry3, Manzoor Hashmani1
  • 1: Mehran UET
  • 2: Xevious Co.
  • 3: Southampton University
*Contact email: adnanlooking@ieee.org

Abstract

Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security threats is overlooked as researchers’ work appear limited in classification of security threats and, 2) security threats are not associated with security frameworks. In this paper, we perform classification of security threats comprehensively whereas, associating these threats to a security framework; we lead in this direction. We find that specifically to assess the impact of these threats.