Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks
Elham Alotaibi ;
Rejwan Bin Sulaiman ;
Mohammed Almaiah
Published: 2025/02/20
Abstract
Wireless sensor networks (WSNs) are a rapidly advancing technology and serve as a foundational component for the Internet of Things (IoT) and various other domains, including healthcare, education, surveillance, military applications, and more. These networks possess unique characteristics such as limited memory, battery life, and processing power, as well as the ability to be deployed in remote or inaccessible areas. While these features enable their widespread use, they also impose significant constraints, making the implementation of robust security and protection mechanisms a complex challenge. This research paper examines a collection of recent scientific studies and proposals aimed at enhancing the security of wireless sensor networks against diverse types of attacks. The primary objective of this study is to explore the common challenges faced by WSNs as an emerging technology. Through a comprehensive review of existing research and practical implementations, it identifies potential risks and threats, evaluates current security measures, and analyzes the outcomes of these studies to provide insights for future advancements in the field.
Keywords
How to Cite the Article
Alotaibi, E., Bin Sulaiman, R., & Almaiah, M. (2025). Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks. Journal of Cyber Security and Risk Auditing, 2025(1), 47–59.https://doi.org/10.63180/jcsra.thestap.2025.1.5
Assessment of cybersecurity threats and defense mechanisms in wireless sensor networks is licensed under CC BY 4.0
References
- Boni, K. R. C., Xu, L., Chen, Z., & Baddoo, T. D. (2020). A security concept based on scaler distribution of a novel intrusion detection device for wireless sensor networks in a smart environment. Sensors, 20(17), 4717.
- London School of Economics and Political Science, Dept. of Accounting and Finance and ESRC, Centre for Analysis of Risk and Reg.,2019 The risk management of nothing q Michael Power, www.elsevier.com/locate/aos .
- Subrato Bharati1, Prajoy Podder2, M. Rubaiyat Hossain Mondal3, Md. Robiul Alam Robel4 (11.jun, 2020) Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems.(arxiv.org)
- Balasem Al-Isawi, University of Babylon(oct,2021) wireless sensor network performance analysis under sinkhole attacks.( https://www.researchgate.net/publication/355615212 )
- Reza Fotohi1 Somayyeh Firoozi Bari2 Mehdi Yusefi3 (27.nov,2020) Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol (arxiv.org).
- Zhang Huanan*, Xing Suping, Wang Jiannan (2020) Security and application of wireless sensor network, at www.sciencedirect.com .
- Tin yang and outhers (19 nov 2021) Design of a secure and efficient authentication protocol for real-time accesses of multiple users in PIoT-oriented multi-gateway WSNs , https://www.sciencedirect.com/ .
- Shariq Aziz Butt (19 th 2019) IoT Smart Health Security Threats, www.researchgate.net
- Waleed Kh. Alzubaidi (2018) Methods of Secure Routing Protocol in Wireless Sensor Networks, http://qu.edu.iq/ .
- Reza Fotohi and outhrers (2020) Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol, arxiv.org.
- Subrato Bharati and others (2020) Threats and Countermeasures of Cyber Security in Direct and Remote Vehicle Communication Systems, arxiv.org.
- Mohammad Nafis Ul Islam (2021) Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques, arxiv.org
- HUDA A. BABAEER and others( 29 may 2020) Efficient and Secure Data Transmission and Sinkhole Detection in a MultiClustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking, https://ieeexplore.ieee.org/
- WATEEN A. ALIADY and others(July 12 ,2019) Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks, https://ieeexplore.ieee.org/ .
- Stalin David and 2 T. Joseph George (2020) Identity-Based Sybil Attack Detection and Localization, Artech Journals.
- JINGZE DING and others (February 5,2021) The DPC-Based Scheme for Detecting Selective Forwarding in Clustered Wireless Sensor Networks, https://ieeexplore.ieee.org/ .
- Mukaram Safaldin and others (13 june ,2020) Improved binary gray wolf optimizer and SVM for intrusion detection system in wireless sensor networks, https://doi.org/10.1007/s12652-020-02228-z .
- Suresh Kumar Jha and others (13 august2021) Security Threat Analysis and Countermeasures on Consensus-Based Time Synchronization Algorithms for Wireless Sensor Network, https://link.springer.com/
- Akashah Arshad and others (September 22,2021) A survey of Sybil attack countermeasures in IoT-based wireless sensor networks, arxiv.org.
- Golden Julie and others (march 25 ,2021) FBDR-Fuzzy based DDoS attack Detection and Recovery mechanism for wireless sensor networks, https://orcid.org/0000-0002-3905-2460
- Shailesh Pramod Bendale and others (2018) Security Threats and Challenges in Future Mobile Wireless Networks , https://ieeexplore.ieee.org/
- Chundong Wang and others (march 15, 2018) Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information, mdpi.com
- Opeyemi Osanaiye anf others (24 may 2018) A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks
- Guang Yang and others (13 Nov 2018) Challenges, Threats, Security Issues and New Trends of Underwater Wireless Sensor Networks, mdpi.com
- Muhammad Adil and others (18 Apr 2018) An Anonymous Channel Categorization Scheme of Edge Nodes to Detect Jamming Attacks in Wireless Sensor Networks
- Salmah Fattah and others ( 21 September 2020) A Survey on Underwater Wireless Sensor Networks: Requirements, Taxonomy, Recent Advances, and Open Research Challenges, ; https://doi.org/10.3390/s20185393 .
- Mubashir Ali (2020) Detection and Isolation Technique for Sinkhole Attack in WSN, , arxiv.org.
- Xintao Huan and others(2021) NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks, https://ieeexplore.ieee.org/ .
- YALI YUAN and others (June 5, 2018) Secure APIT Localization Scheme Against Sybil Attacks in Distributed Wireless Sensor Networks, https://ieeexplore.ieee.org/ .
- OHIDA RUFAI AHUTU (April 15,2020) Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks, https://ieeexplore.ieee.org/
- MUHAMMAD NUMAN and others (march 1,2020) A Systematic Review on Clone Node Detection in Static Wireless Sensor Networks, , https://ieeexplore.ieee.org/
- Guiyun Liu and others (3 jul 2020) Differential Games of Rechargeable Wireless Sensor Networks against Malicious Programs Based on SILRD Propagation Mode, https://doi.org/10.1155/2020/5686413 .
- Hitesh Mohapatra and others (5 may , 2020) Handling of Man-In-The-Middle Attack in WSN Through Intrusion Detection System, http://www.warse.org/IJETER/static/pdf/file/ijeter05852020.pdf
- Ruby Bhatt and others( 5 september 2019) implementation of Fruit Fly Optimization Algorithm (FFOA) to escalate the attacking efficiency of node capture attack in Wireless Sensor Networks (WSN), https://doi.org/10.1016/j.comcom.2019.09.007 .
- Guiyun Liu and others ( 14 sep 2020) Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling, https://doi.org/10.1155/2020/3680518 .
- Elham alotaibi and others (2019) Securing Cyber-Physical Systems,psu.edu.sa
- Bangashand others (2017) Security Issues and Challenges in Wireless Sensor Network,
- Periyanayagi and others (2018) Swarm-based defense technique for tampering and cheating attack in WSN using CPHS , https://link.springer.com/
- Da-WenHuang (2021) Data tampering attacks diagnosis in dynamic wireless sensor networks, https://www.sciencedirect.com .
- George William Kibirige and others (2020) Attacks in Wireless Sensor Networks, arxiv.org.