Prospectiva de seguridad de las redes de sensores inalámbricos

En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las s...

Full description

Autores:
Gutiérrez Portela, Fernando
Almenárez Mendoza, Florina
Calderón Benavides, Liliana
Romero Riaño, Efrén
Tipo de recurso:
Article of investigation
Fecha de publicación:
2021
Institución:
Universidad Cooperativa de Colombia
Repositorio:
Repositorio UCC
Idioma:
OAI Identifier:
oai:repository.ucc.edu.co:20.500.12494/47517
Acceso en línea:
https://doi.org/10.18273/revuin.v20n3-2021014
https://hdl.handle.net/20.500.12494/47517
Palabra clave:
redes de sensores inalámbricos
ataques a las WSN
mecanismos de seguridad
inteligencia artificial
detección de intrusiones.
wireless sensor networks
WSN attacks
security mechanism
artificial intelligence
intrusion detection
Rights
closedAccess
License
Atribución
id COOPER2_d1d696560ad73fe24df9a1fec255c226
oai_identifier_str oai:repository.ucc.edu.co:20.500.12494/47517
network_acronym_str COOPER2
network_name_str Repositorio UCC
repository_id_str
dc.title.spa.fl_str_mv Prospectiva de seguridad de las redes de sensores inalámbricos
title Prospectiva de seguridad de las redes de sensores inalámbricos
spellingShingle Prospectiva de seguridad de las redes de sensores inalámbricos
redes de sensores inalámbricos
ataques a las WSN
mecanismos de seguridad
inteligencia artificial
detección de intrusiones.
wireless sensor networks
WSN attacks
security mechanism
artificial intelligence
intrusion detection
title_short Prospectiva de seguridad de las redes de sensores inalámbricos
title_full Prospectiva de seguridad de las redes de sensores inalámbricos
title_fullStr Prospectiva de seguridad de las redes de sensores inalámbricos
title_full_unstemmed Prospectiva de seguridad de las redes de sensores inalámbricos
title_sort Prospectiva de seguridad de las redes de sensores inalámbricos
dc.creator.fl_str_mv Gutiérrez Portela, Fernando
Almenárez Mendoza, Florina
Calderón Benavides, Liliana
Romero Riaño, Efrén
dc.contributor.author.none.fl_str_mv Gutiérrez Portela, Fernando
Almenárez Mendoza, Florina
Calderón Benavides, Liliana
Romero Riaño, Efrén
dc.subject.spa.fl_str_mv redes de sensores inalámbricos
ataques a las WSN
mecanismos de seguridad
inteligencia artificial
detección de intrusiones.
topic redes de sensores inalámbricos
ataques a las WSN
mecanismos de seguridad
inteligencia artificial
detección de intrusiones.
wireless sensor networks
WSN attacks
security mechanism
artificial intelligence
intrusion detection
dc.subject.other.spa.fl_str_mv wireless sensor networks
WSN attacks
security mechanism
artificial intelligence
intrusion detection
description En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las soluciones de seguridad y privacidad es un tema candente hoy en día. En este artículo se analizanlos trabajos de investigación que se han realizado sobre los mecanismos de seguridad para la protección de las WSN frente a amenazas y ataques, así como las tendencias que surgen en otros países junto con futuras líneas de investigación.
publishDate 2021
dc.date.issued.none.fl_str_mv 2021-06-07
dc.date.accessioned.none.fl_str_mv 2022-12-14T15:32:41Z
dc.date.available.none.fl_str_mv 2022-12-14T15:32:41Z
dc.type.none.fl_str_mv Artículos Científicos
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/article
dc.type.version.none.fl_str_mv info:eu-repo/semantics/publishedVersion
format http://purl.org/coar/resource_type/c_2df8fbb1
status_str publishedVersion
dc.identifier.issn.spa.fl_str_mv 21458456
dc.identifier.uri.spa.fl_str_mv https://doi.org/10.18273/revuin.v20n3-2021014
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12494/47517
dc.identifier.bibliographicCitation.spa.fl_str_mv Gutiérrez-Portela, F., Almenares-Mendoza, F., Calderón-Benavides, L., & Romero-Riaño, E. (2021). Prospectiva de seguridad de las redes de sensores inalámbricos. Revista UIS Ingenierías, 20(3), 189–202. https://doi.org/10.18273/revuin.v20n3-2021014
identifier_str_mv 21458456
Gutiérrez-Portela, F., Almenares-Mendoza, F., Calderón-Benavides, L., & Romero-Riaño, E. (2021). Prospectiva de seguridad de las redes de sensores inalámbricos. Revista UIS Ingenierías, 20(3), 189–202. https://doi.org/10.18273/revuin.v20n3-2021014
url https://doi.org/10.18273/revuin.v20n3-2021014
https://hdl.handle.net/20.500.12494/47517
dc.relation.isversionof.spa.fl_str_mv https://revistas.uis.edu.co/index.php/revistauisingenierias/article/view/11656
dc.relation.ispartofjournal.spa.fl_str_mv Revista UIS Ingenierías
dc.relation.references.spa.fl_str_mv M. M. Shaimaa, S. . H. Haitham, A. S. Iman, “Coverage in mobile wireless sensor networks (M-WSN): A survey,” Computer Communications, vol. 110, no. C, pp. 133-150, 2017. doi: 10.1016/j.comcom.2017.06.010
J. Huang, E. Liao, Y. Chung, K. Chen, “Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining,” Information Sciences, vol. 231, pp. 32-44, 2013. doi: 10.1016/j.ins.2011.03.014
A. E. Zonouz, L. Xing, V. Vokkarane, Y. L. Sun, “Reliability-oriented single-path routing protocols in wireless sensor networks,” IEEE Sensors Journal, vol. 14, no. 11, pp. 4059-4068, 2014. doi:10.1109 / JSEN.2014.2332296
S. Chatterjee, A. K. Das, “An enhanced access control scheme in wireless sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 21, no. 1,pp. 121-149, 2014.
S. G. Yoo, K. Park, J. Kim, “A security-performance-balanced user authentication scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 8, no. 3, pp. 28-38, 2012. doi: 10.1155/2012/382810
I. Tomic, J. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1910-1923, 2017. doi: 10.1109/JIOT.2017.2749883
M. Rezvani, A. Ignjatović, E. Bertino, S. Jha, “Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 98-110, 2015. doi: 10.1109/TDSC.2014.2316816
A. Saipulla, C. Westphal, B. Liu, J. Wang, “Barrier coverage with line-based deployed mobile sensors,” Ad Hoc Networks, vol. 11, no. 4, pp. 1381-1391, 2013. doi: 10.1016/j.adhoc.2010.10.002
M. Abu Alsheikh, T. H. Dinh, D. Niyato, H. P. Tan, S. Lin, “Markov decision processes with applications in wireless sensor networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1239-1267, 2015. doi: 10.1109/COMST.2015.2420686
IEEE Computer Society, “IEEE Standard for Low-Rate,” in IEEE, pp. 1-709, 22 04 2016.
IEEE Standard for Low-Rate Wireless Networks,” in IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), 2016, pp.1-709. doi: 10.1109/IEEESTD.2016.7460875
IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN - Specific Requirements - Part 15: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)," in IEEE Std 802.15.1-2002 , 2002, pp.1-473. doi: 10.1109/IEEESTD.2002.93621
A. Narmada, P. S. Rao, “Zigbee based WSN with IP connectivity,” In 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, 2012, pp. 178-181. doi: 10.1109 / CIMSim.2012.39.
P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning,” in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017, pp. 230-240. doi: 10.1145/3098243.3098254
G. Habib, N. Haddad, R. El Khoury, “Case study: Wirelesshart vs Zigbee network,” in 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2015, pp. 135-138. doi: 10.1109/TAEECE.2015.7113614
M. Surendar, A. Umamakeswari, “InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 1903-1908. doi: 10.1109/WiSPNET.2016.7566473
dc.rights.license.none.fl_str_mv Atribución
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/closedAccess
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_14cb
rights_invalid_str_mv Atribución
http://purl.org/coar/access_right/c_14cb
eu_rights_str_mv closedAccess
dc.format.extent.spa.fl_str_mv 89–202
dc.coverage.temporal.spa.fl_str_mv 3
dc.publisher.spa.fl_str_mv Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Ibagué
dc.publisher.program.spa.fl_str_mv Ingeniería de Sistemas
dc.publisher.place.spa.fl_str_mv Ibagué
institution Universidad Cooperativa de Colombia
bitstream.url.fl_str_mv https://repository.ucc.edu.co/bitstreams/b1cc30ad-749e-4947-8938-97e6bc32f31e/download
https://repository.ucc.edu.co/bitstreams/83509b09-2268-4a7e-904d-f810f3738cfc/download
https://repository.ucc.edu.co/bitstreams/6c7d688f-3ead-4971-a6f3-9157d4e64802/download
https://repository.ucc.edu.co/bitstreams/731c7f40-0b65-405b-9051-88b440f91a24/download
bitstream.checksum.fl_str_mv 0ce8a81c268ef5f9043b234c73175043
8a4605be74aa9ea9d79846c1fba20a33
52ad6f00a0496c9b6ce40ca9c1845ce7
22d1a23c6a279da17b2a10e0d867ec9b
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Institucional Universidad Cooperativa de Colombia
repository.mail.fl_str_mv bdigital@metabiblioteca.com
_version_ 1811565072215965696
spelling Gutiérrez Portela, FernandoAlmenárez Mendoza, FlorinaCalderón Benavides, LilianaRomero Riaño, Efrén32022-12-14T15:32:41Z2022-12-14T15:32:41Z2021-06-0721458456https://doi.org/10.18273/revuin.v20n3-2021014https://hdl.handle.net/20.500.12494/47517Gutiérrez-Portela, F., Almenares-Mendoza, F., Calderón-Benavides, L., & Romero-Riaño, E. (2021). Prospectiva de seguridad de las redes de sensores inalámbricos. Revista UIS Ingenierías, 20(3), 189–202. https://doi.org/10.18273/revuin.v20n3-2021014En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las soluciones de seguridad y privacidad es un tema candente hoy en día. En este artículo se analizanlos trabajos de investigación que se han realizado sobre los mecanismos de seguridad para la protección de las WSN frente a amenazas y ataques, así como las tendencias que surgen en otros países junto con futuras líneas de investigación.In Wireless Sensor Networks (WSN), nodes are vulnerable to security attacks because they are installed in a harsh environment with limited power and memory, low processing power, and medium broadcast transmission.Therefore, identifying threats, challenges, and solutions of security and privacy is a talkingtopic today. This article analyzes the research work that has been carried out on the security mechanisms for the protection of WSN against threats and attacks, as well as the trends that emerge in other countries combined with future research lines. From the methodological point of view, this analysis is shown through the visualization and study of works indexed in databases such as IEEE, ACM, Scopus,and Springer, with a range of 7 years as an observation window, from 2013 to 2019. A total of 4,728 publications were obtained, with a high rate of collaborationbetween China and Indiahttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000476030https://orcid.org/0000-0003-3722-3809https://orcid.org/0000-0002-5232-2031https://orcid.org/0000-0001-8658-9036https://orcid.org/0000-0002-3627-9942AQUAfernando.gutierrez@campusucc.edu.cohttps://scholar.google.com/citations?hl=es&user=9gw2ob4AAAAJhttps://scholar.google.es/citations?user=iduK4zEAAAAJ&hl=eshttps://scholar.google.com.co/citations?user=XihGBWoAAAAJ&hl=es89–202Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, IbaguéIngeniería de SistemasIbaguéhttps://revistas.uis.edu.co/index.php/revistauisingenierias/article/view/11656Revista UIS IngenieríasM. M. Shaimaa, S. . H. Haitham, A. S. Iman, “Coverage in mobile wireless sensor networks (M-WSN): A survey,” Computer Communications, vol. 110, no. C, pp. 133-150, 2017. doi: 10.1016/j.comcom.2017.06.010J. Huang, E. Liao, Y. Chung, K. Chen, “Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining,” Information Sciences, vol. 231, pp. 32-44, 2013. doi: 10.1016/j.ins.2011.03.014A. E. Zonouz, L. Xing, V. Vokkarane, Y. L. Sun, “Reliability-oriented single-path routing protocols in wireless sensor networks,” IEEE Sensors Journal, vol. 14, no. 11, pp. 4059-4068, 2014. doi:10.1109 / JSEN.2014.2332296S. Chatterjee, A. K. Das, “An enhanced access control scheme in wireless sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 21, no. 1,pp. 121-149, 2014.S. G. Yoo, K. Park, J. Kim, “A security-performance-balanced user authentication scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 8, no. 3, pp. 28-38, 2012. doi: 10.1155/2012/382810I. Tomic, J. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1910-1923, 2017. doi: 10.1109/JIOT.2017.2749883M. Rezvani, A. Ignjatović, E. Bertino, S. Jha, “Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 98-110, 2015. doi: 10.1109/TDSC.2014.2316816A. Saipulla, C. Westphal, B. Liu, J. Wang, “Barrier coverage with line-based deployed mobile sensors,” Ad Hoc Networks, vol. 11, no. 4, pp. 1381-1391, 2013. doi: 10.1016/j.adhoc.2010.10.002M. Abu Alsheikh, T. H. Dinh, D. Niyato, H. P. Tan, S. Lin, “Markov decision processes with applications in wireless sensor networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1239-1267, 2015. doi: 10.1109/COMST.2015.2420686IEEE Computer Society, “IEEE Standard for Low-Rate,” in IEEE, pp. 1-709, 22 04 2016.IEEE Standard for Low-Rate Wireless Networks,” in IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), 2016, pp.1-709. doi: 10.1109/IEEESTD.2016.7460875IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN - Specific Requirements - Part 15: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)," in IEEE Std 802.15.1-2002 , 2002, pp.1-473. doi: 10.1109/IEEESTD.2002.93621A. Narmada, P. S. Rao, “Zigbee based WSN with IP connectivity,” In 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, 2012, pp. 178-181. doi: 10.1109 / CIMSim.2012.39.P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning,” in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017, pp. 230-240. doi: 10.1145/3098243.3098254G. Habib, N. Haddad, R. El Khoury, “Case study: Wirelesshart vs Zigbee network,” in 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2015, pp. 135-138. doi: 10.1109/TAEECE.2015.7113614M. Surendar, A. Umamakeswari, “InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 1903-1908. doi: 10.1109/WiSPNET.2016.7566473redes de sensores inalámbricosataques a las WSNmecanismos de seguridadinteligencia artificialdetección de intrusiones.wireless sensor networksWSN attackssecurity mechanismartificial intelligenceintrusion detectionProspectiva de seguridad de las redes de sensores inalámbricosArtículos Científicoshttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionAtribucióninfo:eu-repo/semantics/closedAccesshttp://purl.org/coar/access_right/c_14cbPublicationORIGINALProspectiva_Redes_firmado.pdfProspectiva_Redes_firmado.pdfLicencia de usoapplication/pdf291883https://repository.ucc.edu.co/bitstreams/b1cc30ad-749e-4947-8938-97e6bc32f31e/download0ce8a81c268ef5f9043b234c73175043MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repository.ucc.edu.co/bitstreams/83509b09-2268-4a7e-904d-f810f3738cfc/download8a4605be74aa9ea9d79846c1fba20a33MD53THUMBNAILProspectiva_Redes_firmado.pdf.jpgProspectiva_Redes_firmado.pdf.jpgGenerated Thumbnailimage/jpeg5411https://repository.ucc.edu.co/bitstreams/6c7d688f-3ead-4971-a6f3-9157d4e64802/download52ad6f00a0496c9b6ce40ca9c1845ce7MD54TEXTProspectiva_Redes_firmado.pdf.txtProspectiva_Redes_firmado.pdf.txtExtracted texttext/plain6360https://repository.ucc.edu.co/bitstreams/731c7f40-0b65-405b-9051-88b440f91a24/download22d1a23c6a279da17b2a10e0d867ec9bMD5520.500.12494/47517oai:repository.ucc.edu.co:20.500.12494/475172024-08-10 21:02:36.147restrictedhttps://repository.ucc.edu.coRepositorio Institucional Universidad Cooperativa de Colombiabdigital@metabiblioteca.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