Prospectiva de seguridad de las redes de sensores inalámbricos
En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las s...
- Autores:
-
Gutiérrez Portela, Fernando
Almenárez Mendoza, Florina
Calderón Benavides, Liliana
Romero Riaño, Efrén
- Tipo de recurso:
- Article of investigation
- Fecha de publicación:
- 2021
- Institución:
- Universidad Cooperativa de Colombia
- Repositorio:
- Repositorio UCC
- Idioma:
- OAI Identifier:
- oai:repository.ucc.edu.co:20.500.12494/47517
- Acceso en línea:
- https://doi.org/10.18273/revuin.v20n3-2021014
https://hdl.handle.net/20.500.12494/47517
- Palabra clave:
- redes de sensores inalámbricos
ataques a las WSN
mecanismos de seguridad
inteligencia artificial
detección de intrusiones.
wireless sensor networks
WSN attacks
security mechanism
artificial intelligence
intrusion detection
- Rights
- closedAccess
- License
- Atribución
id |
COOPER2_d1d696560ad73fe24df9a1fec255c226 |
---|---|
oai_identifier_str |
oai:repository.ucc.edu.co:20.500.12494/47517 |
network_acronym_str |
COOPER2 |
network_name_str |
Repositorio UCC |
repository_id_str |
|
dc.title.spa.fl_str_mv |
Prospectiva de seguridad de las redes de sensores inalámbricos |
title |
Prospectiva de seguridad de las redes de sensores inalámbricos |
spellingShingle |
Prospectiva de seguridad de las redes de sensores inalámbricos redes de sensores inalámbricos ataques a las WSN mecanismos de seguridad inteligencia artificial detección de intrusiones. wireless sensor networks WSN attacks security mechanism artificial intelligence intrusion detection |
title_short |
Prospectiva de seguridad de las redes de sensores inalámbricos |
title_full |
Prospectiva de seguridad de las redes de sensores inalámbricos |
title_fullStr |
Prospectiva de seguridad de las redes de sensores inalámbricos |
title_full_unstemmed |
Prospectiva de seguridad de las redes de sensores inalámbricos |
title_sort |
Prospectiva de seguridad de las redes de sensores inalámbricos |
dc.creator.fl_str_mv |
Gutiérrez Portela, Fernando Almenárez Mendoza, Florina Calderón Benavides, Liliana Romero Riaño, Efrén |
dc.contributor.author.none.fl_str_mv |
Gutiérrez Portela, Fernando Almenárez Mendoza, Florina Calderón Benavides, Liliana Romero Riaño, Efrén |
dc.subject.spa.fl_str_mv |
redes de sensores inalámbricos ataques a las WSN mecanismos de seguridad inteligencia artificial detección de intrusiones. |
topic |
redes de sensores inalámbricos ataques a las WSN mecanismos de seguridad inteligencia artificial detección de intrusiones. wireless sensor networks WSN attacks security mechanism artificial intelligence intrusion detection |
dc.subject.other.spa.fl_str_mv |
wireless sensor networks WSN attacks security mechanism artificial intelligence intrusion detection |
description |
En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las soluciones de seguridad y privacidad es un tema candente hoy en día. En este artículo se analizanlos trabajos de investigación que se han realizado sobre los mecanismos de seguridad para la protección de las WSN frente a amenazas y ataques, así como las tendencias que surgen en otros países junto con futuras líneas de investigación. |
publishDate |
2021 |
dc.date.issued.none.fl_str_mv |
2021-06-07 |
dc.date.accessioned.none.fl_str_mv |
2022-12-14T15:32:41Z |
dc.date.available.none.fl_str_mv |
2022-12-14T15:32:41Z |
dc.type.none.fl_str_mv |
Artículos Científicos |
dc.type.coar.none.fl_str_mv |
http://purl.org/coar/resource_type/c_2df8fbb1 |
dc.type.coarversion.none.fl_str_mv |
http://purl.org/coar/version/c_970fb48d4fbd8a85 |
dc.type.driver.none.fl_str_mv |
info:eu-repo/semantics/article |
dc.type.version.none.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
format |
http://purl.org/coar/resource_type/c_2df8fbb1 |
status_str |
publishedVersion |
dc.identifier.issn.spa.fl_str_mv |
21458456 |
dc.identifier.uri.spa.fl_str_mv |
https://doi.org/10.18273/revuin.v20n3-2021014 |
dc.identifier.uri.none.fl_str_mv |
https://hdl.handle.net/20.500.12494/47517 |
dc.identifier.bibliographicCitation.spa.fl_str_mv |
Gutiérrez-Portela, F., Almenares-Mendoza, F., Calderón-Benavides, L., & Romero-Riaño, E. (2021). Prospectiva de seguridad de las redes de sensores inalámbricos. Revista UIS Ingenierías, 20(3), 189–202. https://doi.org/10.18273/revuin.v20n3-2021014 |
identifier_str_mv |
21458456 Gutiérrez-Portela, F., Almenares-Mendoza, F., Calderón-Benavides, L., & Romero-Riaño, E. (2021). Prospectiva de seguridad de las redes de sensores inalámbricos. Revista UIS Ingenierías, 20(3), 189–202. https://doi.org/10.18273/revuin.v20n3-2021014 |
url |
https://doi.org/10.18273/revuin.v20n3-2021014 https://hdl.handle.net/20.500.12494/47517 |
dc.relation.isversionof.spa.fl_str_mv |
https://revistas.uis.edu.co/index.php/revistauisingenierias/article/view/11656 |
dc.relation.ispartofjournal.spa.fl_str_mv |
Revista UIS Ingenierías |
dc.relation.references.spa.fl_str_mv |
M. M. Shaimaa, S. . H. Haitham, A. S. Iman, “Coverage in mobile wireless sensor networks (M-WSN): A survey,” Computer Communications, vol. 110, no. C, pp. 133-150, 2017. doi: 10.1016/j.comcom.2017.06.010 J. Huang, E. Liao, Y. Chung, K. Chen, “Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining,” Information Sciences, vol. 231, pp. 32-44, 2013. doi: 10.1016/j.ins.2011.03.014 A. E. Zonouz, L. Xing, V. Vokkarane, Y. L. Sun, “Reliability-oriented single-path routing protocols in wireless sensor networks,” IEEE Sensors Journal, vol. 14, no. 11, pp. 4059-4068, 2014. doi:10.1109 / JSEN.2014.2332296 S. Chatterjee, A. K. Das, “An enhanced access control scheme in wireless sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 21, no. 1,pp. 121-149, 2014. S. G. Yoo, K. Park, J. Kim, “A security-performance-balanced user authentication scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 8, no. 3, pp. 28-38, 2012. doi: 10.1155/2012/382810 I. Tomic, J. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1910-1923, 2017. doi: 10.1109/JIOT.2017.2749883 M. Rezvani, A. Ignjatović, E. Bertino, S. Jha, “Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 98-110, 2015. doi: 10.1109/TDSC.2014.2316816 A. Saipulla, C. Westphal, B. Liu, J. Wang, “Barrier coverage with line-based deployed mobile sensors,” Ad Hoc Networks, vol. 11, no. 4, pp. 1381-1391, 2013. doi: 10.1016/j.adhoc.2010.10.002 M. Abu Alsheikh, T. H. Dinh, D. Niyato, H. P. Tan, S. Lin, “Markov decision processes with applications in wireless sensor networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1239-1267, 2015. doi: 10.1109/COMST.2015.2420686 IEEE Computer Society, “IEEE Standard for Low-Rate,” in IEEE, pp. 1-709, 22 04 2016. IEEE Standard for Low-Rate Wireless Networks,” in IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), 2016, pp.1-709. doi: 10.1109/IEEESTD.2016.7460875 IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN - Specific Requirements - Part 15: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)," in IEEE Std 802.15.1-2002 , 2002, pp.1-473. doi: 10.1109/IEEESTD.2002.93621 A. Narmada, P. S. Rao, “Zigbee based WSN with IP connectivity,” In 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, 2012, pp. 178-181. doi: 10.1109 / CIMSim.2012.39. P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning,” in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017, pp. 230-240. doi: 10.1145/3098243.3098254 G. Habib, N. Haddad, R. El Khoury, “Case study: Wirelesshart vs Zigbee network,” in 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2015, pp. 135-138. doi: 10.1109/TAEECE.2015.7113614 M. Surendar, A. Umamakeswari, “InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 1903-1908. doi: 10.1109/WiSPNET.2016.7566473 |
dc.rights.license.none.fl_str_mv |
Atribución |
dc.rights.accessrights.none.fl_str_mv |
info:eu-repo/semantics/closedAccess |
dc.rights.coar.none.fl_str_mv |
http://purl.org/coar/access_right/c_14cb |
rights_invalid_str_mv |
Atribución http://purl.org/coar/access_right/c_14cb |
eu_rights_str_mv |
closedAccess |
dc.format.extent.spa.fl_str_mv |
89–202 |
dc.coverage.temporal.spa.fl_str_mv |
3 |
dc.publisher.spa.fl_str_mv |
Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, Ibagué |
dc.publisher.program.spa.fl_str_mv |
Ingeniería de Sistemas |
dc.publisher.place.spa.fl_str_mv |
Ibagué |
institution |
Universidad Cooperativa de Colombia |
bitstream.url.fl_str_mv |
https://repository.ucc.edu.co/bitstreams/b1cc30ad-749e-4947-8938-97e6bc32f31e/download https://repository.ucc.edu.co/bitstreams/83509b09-2268-4a7e-904d-f810f3738cfc/download https://repository.ucc.edu.co/bitstreams/6c7d688f-3ead-4971-a6f3-9157d4e64802/download https://repository.ucc.edu.co/bitstreams/731c7f40-0b65-405b-9051-88b440f91a24/download |
bitstream.checksum.fl_str_mv |
0ce8a81c268ef5f9043b234c73175043 8a4605be74aa9ea9d79846c1fba20a33 52ad6f00a0496c9b6ce40ca9c1845ce7 22d1a23c6a279da17b2a10e0d867ec9b |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositorio Institucional Universidad Cooperativa de Colombia |
repository.mail.fl_str_mv |
bdigital@metabiblioteca.com |
_version_ |
1811565072215965696 |
spelling |
Gutiérrez Portela, FernandoAlmenárez Mendoza, FlorinaCalderón Benavides, LilianaRomero Riaño, Efrén32022-12-14T15:32:41Z2022-12-14T15:32:41Z2021-06-0721458456https://doi.org/10.18273/revuin.v20n3-2021014https://hdl.handle.net/20.500.12494/47517Gutiérrez-Portela, F., Almenares-Mendoza, F., Calderón-Benavides, L., & Romero-Riaño, E. (2021). Prospectiva de seguridad de las redes de sensores inalámbricos. Revista UIS Ingenierías, 20(3), 189–202. https://doi.org/10.18273/revuin.v20n3-2021014En las Redes de Sensores Inalámbricos (WSN), los nodos son vulnerables a los ataques de seguridad porque están instalados en un entorno difícil, con energía y memoria limitadas, baja capacidad de procesamiento y transmisión de difusión media; por lo tanto, identificar las amenazas, los retos y las soluciones de seguridad y privacidad es un tema candente hoy en día. En este artículo se analizanlos trabajos de investigación que se han realizado sobre los mecanismos de seguridad para la protección de las WSN frente a amenazas y ataques, así como las tendencias que surgen en otros países junto con futuras líneas de investigación.In Wireless Sensor Networks (WSN), nodes are vulnerable to security attacks because they are installed in a harsh environment with limited power and memory, low processing power, and medium broadcast transmission.Therefore, identifying threats, challenges, and solutions of security and privacy is a talkingtopic today. This article analyzes the research work that has been carried out on the security mechanisms for the protection of WSN against threats and attacks, as well as the trends that emerge in other countries combined with future research lines. From the methodological point of view, this analysis is shown through the visualization and study of works indexed in databases such as IEEE, ACM, Scopus,and Springer, with a range of 7 years as an observation window, from 2013 to 2019. A total of 4,728 publications were obtained, with a high rate of collaborationbetween China and Indiahttps://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?cod_rh=0000476030https://orcid.org/0000-0003-3722-3809https://orcid.org/0000-0002-5232-2031https://orcid.org/0000-0001-8658-9036https://orcid.org/0000-0002-3627-9942AQUAfernando.gutierrez@campusucc.edu.cohttps://scholar.google.com/citations?hl=es&user=9gw2ob4AAAAJhttps://scholar.google.es/citations?user=iduK4zEAAAAJ&hl=eshttps://scholar.google.com.co/citations?user=XihGBWoAAAAJ&hl=es89–202Universidad Cooperativa de Colombia, Facultad de Ingenierías, Ingeniería de Sistemas, IbaguéIngeniería de SistemasIbaguéhttps://revistas.uis.edu.co/index.php/revistauisingenierias/article/view/11656Revista UIS IngenieríasM. M. Shaimaa, S. . H. Haitham, A. S. Iman, “Coverage in mobile wireless sensor networks (M-WSN): A survey,” Computer Communications, vol. 110, no. C, pp. 133-150, 2017. doi: 10.1016/j.comcom.2017.06.010J. Huang, E. Liao, Y. Chung, K. Chen, “Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining,” Information Sciences, vol. 231, pp. 32-44, 2013. doi: 10.1016/j.ins.2011.03.014A. E. Zonouz, L. Xing, V. Vokkarane, Y. L. Sun, “Reliability-oriented single-path routing protocols in wireless sensor networks,” IEEE Sensors Journal, vol. 14, no. 11, pp. 4059-4068, 2014. doi:10.1109 / JSEN.2014.2332296S. Chatterjee, A. K. Das, “An enhanced access control scheme in wireless sensor networks,” Ad-Hoc and Sensor Wireless Networks, vol. 21, no. 1,pp. 121-149, 2014.S. G. Yoo, K. Park, J. Kim, “A security-performance-balanced user authentication scheme for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 8, no. 3, pp. 28-38, 2012. doi: 10.1155/2012/382810I. Tomic, J. McCann, “A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1910-1923, 2017. doi: 10.1109/JIOT.2017.2749883M. Rezvani, A. Ignjatović, E. Bertino, S. Jha, “Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks,” IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 98-110, 2015. doi: 10.1109/TDSC.2014.2316816A. Saipulla, C. Westphal, B. Liu, J. Wang, “Barrier coverage with line-based deployed mobile sensors,” Ad Hoc Networks, vol. 11, no. 4, pp. 1381-1391, 2013. doi: 10.1016/j.adhoc.2010.10.002M. Abu Alsheikh, T. H. Dinh, D. Niyato, H. P. Tan, S. Lin, “Markov decision processes with applications in wireless sensor networks: A survey,” IEEE Communications Surveys and Tutorials, vol. 17, no. 3, pp. 1239-1267, 2015. doi: 10.1109/COMST.2015.2420686IEEE Computer Society, “IEEE Standard for Low-Rate,” in IEEE, pp. 1-709, 22 04 2016.IEEE Standard for Low-Rate Wireless Networks,” in IEEE Std 802.15.4-2015 (Revision of IEEE Std 802.15.4-2011), 2016, pp.1-709. doi: 10.1109/IEEESTD.2016.7460875IEEE Standard for Telecommunications and Information Exchange Between Systems - LAN/MAN - Specific Requirements - Part 15: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)," in IEEE Std 802.15.1-2002 , 2002, pp.1-473. doi: 10.1109/IEEESTD.2002.93621A. Narmada, P. S. Rao, “Zigbee based WSN with IP connectivity,” In 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation, 2012, pp. 178-181. doi: 10.1109 / CIMSim.2012.39.P. Morgner, S. Mattejat, Z. Benenson, C. Müller, F. Armknecht, “Insecure to the touch: attacking ZigBee 3.0 via touchlink commissioning,” in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017, pp. 230-240. doi: 10.1145/3098243.3098254G. Habib, N. Haddad, R. El Khoury, “Case study: Wirelesshart vs Zigbee network,” in 2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2015, pp. 135-138. doi: 10.1109/TAEECE.2015.7113614M. Surendar, A. Umamakeswari, “InDReS: An Intrusion Detection and response system for Internet of Things with 6LoWPAN,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 1903-1908. doi: 10.1109/WiSPNET.2016.7566473redes de sensores inalámbricosataques a las WSNmecanismos de seguridadinteligencia artificialdetección de intrusiones.wireless sensor networksWSN attackssecurity mechanismartificial intelligenceintrusion detectionProspectiva de seguridad de las redes de sensores inalámbricosArtículos Científicoshttp://purl.org/coar/resource_type/c_2df8fbb1http://purl.org/coar/version/c_970fb48d4fbd8a85info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionAtribucióninfo:eu-repo/semantics/closedAccesshttp://purl.org/coar/access_right/c_14cbPublicationORIGINALProspectiva_Redes_firmado.pdfProspectiva_Redes_firmado.pdfLicencia de usoapplication/pdf291883https://repository.ucc.edu.co/bitstreams/b1cc30ad-749e-4947-8938-97e6bc32f31e/download0ce8a81c268ef5f9043b234c73175043MD52LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repository.ucc.edu.co/bitstreams/83509b09-2268-4a7e-904d-f810f3738cfc/download8a4605be74aa9ea9d79846c1fba20a33MD53THUMBNAILProspectiva_Redes_firmado.pdf.jpgProspectiva_Redes_firmado.pdf.jpgGenerated Thumbnailimage/jpeg5411https://repository.ucc.edu.co/bitstreams/6c7d688f-3ead-4971-a6f3-9157d4e64802/download52ad6f00a0496c9b6ce40ca9c1845ce7MD54TEXTProspectiva_Redes_firmado.pdf.txtProspectiva_Redes_firmado.pdf.txtExtracted texttext/plain6360https://repository.ucc.edu.co/bitstreams/731c7f40-0b65-405b-9051-88b440f91a24/download22d1a23c6a279da17b2a10e0d867ec9bMD5520.500.12494/47517oai:repository.ucc.edu.co:20.500.12494/475172024-08-10 21:02:36.147restrictedhttps://repository.ucc.edu.coRepositorio Institucional Universidad Cooperativa de Colombiabdigital@metabiblioteca.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 |