International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 1

ISSN 2229-5518

Security Challenges & Preventions in

Wireless Communications

Kashif Laeeq

Abstract— Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communica- tion is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing reliance on wireless communication also brings great challenges to the security measures and other correlated issues. Although the newly intro- duced corrected security standard, IEEE 802.11i, offers extensive security for the wireless environment but it is still premature and does not provide effective measures to protect the wireless networks from confidentiality and integrity threats. The main issues for dep- loyment of wireless networks are security attacks, vulnerabilities, battery power and improper security models. This paper provides a study on these problems especially in ad-hoc wireless networks. The study is based on numerous proposed schemes in the endeavor to secure such networks. The goal of this paper is to probe the principal security issues, challenges and fundamental security require- ments of wireless communications on the bases of their proposed solutions.

Index TermsAttack, Denial of service, Mobile Ad-hoc Networks, Security issues, Vulnerabilities, W ireless Communication, W SN.

1 INTRODUCTION

—————————— • ——————————
UE to low cost, low power consumption, flexible, no physical infrastructure and easy to deploy, wireless communications have been an admired research
area over the past few years with tremendous growth in the population of wireless users. Many systems are still mapping wire to wireless media. Nowadays , there are number of wireless technologies on hand for long range applications like cellular mobile, satellite communica- tions, Radio Frequency (RF), and short range applications such as Bluetooth, Infrared (IR), Near Field Communica- tion (NFC), ZigBee, Ultra Wide Band (UWB). These short range wireless technologies are being used in many wire- less technologies like wireless local area networks (WLAN), wireless body area networks (WBANs), wireless personal area networks (WPANs), and, ad-hoc network etc. Although wireless communications have numerous compensations over the usual wired networks in contrast it is exposed to a range of intrusion attacks. Unlike the wired networks, the wireless networks face unique chal- lenges due to their inherent vulnerabilities. Any wireless signal is subject to interception, jamming and false com- mand disruption.
The coverage area of wireless communication is depend- able on the devices used. The more powerful device may cover large area but it will be expensive, consume more power and also produce more electromagnetic radiation that might be danger for human health [11]. One of the solution provides in that enlarge the coverage area hop by hope, by applying the ZigBee protocol, but the energy issue remain constant. Majority of times the limited ener- gy restrict the security schemes [15].

————————————————

Kashif Laeeq is lecturer at Computer Dept. in Federal Urdu University of

Arts, Science & Technology, Karachi, Pakistan, PH-03002511667. E-mail:

Nearly all the proposed solutions concentrate on a specif- ic security problem but pay no attention to others, those which pull off low energy and memory burning up nego- tiates on security level. Therefore the demand for a mod- el; which fulfills all these issues with low cost, high secu- rity and low power, is increasing with raising the wireless technology.
Attack, is also one of the major issues in wireless commu- nications. The technology suffers with two major types of attacks, i.e. inside and outside attacks. Outside attacker can’t get access to the network but inside attacker can do it and may disrupt the network resources such that en- cryption keys or further codes used by the network. It is observed many times that only cryptographic security schemes may be failed to combat with numerous types of attacks in contrast all the proposed intrusion detection systems are not surely detect and remove the intruders. In reactive routing protocols like AODV, chances of attack are higher [18].

2 ISSUES AND CHALLENGESS

Wireless communication has emerged as a major break- through in traditional wired communications. It has changed messy wired world into a clean and flexible at- mosphere. According to a well known adage, there is no unmixed good in this world; implementation of wireless network carries numerous performance and security issues. These issues include:

2.1 Vulnerabilities in Current Wireless

Communications

The wireless communications survivability relates to wireless communication protection mechanism and ro- bustness against attacks and failure of wireless network elements or communication itself. Some of these issues are as follows:
kashiflaeeq@yahoo.com

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 2

ISSN 2229-5518

• The Wireless Sensor Network gateway forms a single point of breakdown for the back-to-back sensor network infrastructure [1].
• After deployment of network, sensor nodes re- main unattended which is a root cause of securi- ty lapses [2].
• The existing location tracking methods have their own boundaries in tracing wireless intruders [3].
• Major threat and challenges of wireless commu- nications are still not considered in IEEE 802.11i revised specification [4]
• Ad-hoc Wireless Sensor Networks deployment for monitoring physical environments are still in vulnerable zone [5].

2.2 Current Security Models and Prevailing

Security Threats

Different performance issues of wireless networks opera- tion, administration and management are encountered due to improper security model. Many security schemes don’t guard against some prevailing threats. Some of these issues are as follows:
• Present security schemes for Wireless Personal
Area Networks (WPANs) are immature [6]
• There is no proper visualization technique present for wireless communications [7]
• Security model for wired network not necessarily effective for wireless networks [8].
• Compressed Real time Transport Protocol (CRTP) is not appropriate for wireless links, that have a very high and erratic bit error rate (BER)[9]
• Inadequate security integration scheme for hete- rogeneous networks [10].
• The current wireless smart home system has range limitation issue [11].

2.3 Major Attacks on Wireless Sensor Net works (WSN)

Wireless Sensor Network (WSN) is a prevailing technolo- gy that shows great promise for diverse ultramodern ap- plications both for mass public and intelligence. Security in wireless sensor networks is still in its childhood, as little consideration has been made to this area by the re- search community, due to this ignorance, WSN still facing numerous issues and challenges. Some of these issues are as follows:
• There is no common model to guaranteed securi- ty for each layer in a Wireless Sensor Networks (WSNs) [12].
• Current security Solutions for wireless Sensor networks are not feasible against all Prevailing security threats [13]
• Protection mechanism in wireless sensor network is still adolescent age [14].
• The current protocols for data link layer & net- work layers are not adequate for handling vari-
ous security threats in WSN [15].
• The existing security measures for wireless sen-
sor networks (WSN) are insufficient [16].

2.4 Security Attacks on Ad-hoc Wireless Networks Truly speaking the most demanding area of wireless net- working is ad-hoc wireless networks, but unfortunately it

is the most at risk. Any intruder can easily get the access
on the network resources and disrupts the communica-
tions. Some of these issues are as follows:
• In many cases cryptographic-based solution for
detection the intruder in ad-hoc networks are in-
effective [17].
• Attacks on wireless ad hoc network specially on routing protocols upsets network performance and reliability [18]
• No response method and limitations to handle wormhole attacks in Wireless Ad-hoc Networks (WANs). [19].
• Many existing ad-hoc routing protocols concern only the length of the routers [20].

3 APPROACHES TO MITIGATE ABOVE CHALLENGES

The main issues for deployment of wireless networks are security attacks, vulnerabilities, battery power and im- proper security models. The research on security issues and challenges in wireless communication comprises per- formance implications due to different factors. The effects of these factors or problem areas have been addressed by using different tools, algorithms, models, simulations and design modifications. These sub domains and the ap- proaches or methodologies are discussed in subsequent paragraphs:

3.1 Protecting Wireless Network against

Vulnerabilities

The Wireless Sensor Network gateway forms a single point of collapse for the back-to-back sensor network in- frastructure. Even if a strong security model is used, but whenever intruder attacks on WSN-gateway, the whole network operations hampered. The fault endurance of WSN-gateway should be increased to avoid single point failure. In [1] a commercial grade WSN is considered and threw a ping-based DDos attack on the gateway of WSN. Various computers send ping attack traffic simultaneous- ly to the WSN-gateway. For the entire testing of 4 hours of DDoS attack, processor fatigue and sensed data were collected. It is clearly observed that the computing re- sources of network gateway exhaustion under ping-based DDoS attack traffic. At a load exceeds by 20% of the ping attack, the WSN gateway processor became 100% busy, which caused the WSN-gateway to discontinue collection, reporting and recording the log sensor data. Result of this experiment stress to increase the fault endurance to avoid

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 3

ISSN 2229-5518

single point failure. [1].
Due to the vulnerable attributes of sensor networks, there
is always a risk of threats, along with the objective to en-
sure the privacy, integrity and reliability of transmission
over these sensor networks. Model present in [2] asso-
ciated with Communal Reputation and Individual Trust (CRIT) within sensor nodes overcomes this problem. In this model, a node judge the reliability or adequacy of a neighbor node throughout a set of values associated to
the neighbor node’s reliability and reputation. A node observes their neighboring nodes and positions the neighbors in conditions of a trust vote. Trust table kept by neighboring nodes conclude the communal and individu- al trustworthiness of nodes. A node keeps two tables, a trust table and other is reputation table. Trust table keeps the trust and un-trust observations for all other neighbor nodes. In the same way reputation table keeps reputation observations for all the neighbor nodes. If a node throws a unique message, and that is not confirmed by all other nodes, then the reliability of the node is under question, and also the un-trust value for the node increases. This message comes to cluster leader, by all other nodes about a specific node, it transmit the information so that all oth- er nodes disregard the untrustworthy node and it is dis- carded from the network [2].
The current location tracking schemes have their own boundaries in tracing wireless intruders. The modifica- tion for Triangulation method present in [3] seeks to overcome this limitation. The technique based on two separate databases, the values of these databases consider by two locations, one for inside and other for outside the building. For location tracking using databases, execute the Triangulation method followed by matching up to the value with entries of data bases. It will be at a glance that attacker is inside the building or outside, then looking for closest values in databases; the matching observations in column without having triangulation would be the more precise location of device [3].
The IEEE 802.11i modification has concluded to deal with security issues in wireless local area networks but major threats like DoS attacks, insider attacks and offline guess- ing attacks are still looked-for consideration. An im- proved authentication mechanism present in [4] can over- come this ignorance. This scheme adopts an asymmetric cryptography technique to achieve effective defense in six categories that are discovery phase, authentication and association phase, RADIUS authentication, 4-way hand- shake, group key handshake, and secure data communi- cation. This integrated protection for, null data frames, EAPOL frames, management frames as well as protection from some fundamental DoS attacks, Offline guessing attacks and insider attacks. This authentication mechan- ism is also capable to allow stations to organize them- selves automatically [4].
Ad-hoc wireless sensor networks deployment for moni-
toring physical environments, where targets have unfore- seen motions, are still in vulnerable zone. For such type of Self Organizing Wireless Sensor Networks (SOWSNs), stat-mesh architecture and mobility scheme provide an efficient monitoring system [5]. The architecture has a base station (BS) node and sensor nodes (SN), which un- ites a mesh of routers to expand radio coverage with star endpoints. Star-Mesh architecture utilizes multi-hopping to offer multipath routing, by means of an ad-hoc net- work based approach. The SN collects environmental in formations and re-arranging events generated by BS. The BS performs actions on receiving events also managing the routes. Initially when a node gets a message it stores the flooded one and transmit the message to all its neigh- bors. A new received message that has the same flood id is erased. Each SN has an initial amount of power hence it can drive signals to all nodes surrounded by its transmis- sion range. Each SN connected at least one B.S. the BS, with great amount of energy, works as a gateway that connects SN to the analysis center. The BSs are fixed and each BS knows exactly its position information. The BSs are assumed to be arbitrarily located. [5]

Fig.1: The Ad-hoc SOWSN architecture [5]

3.2 Schemes to Reduce Current Security Threats and Range Limitation Issues

At hand security schemes for Wireless Personal Area Networks (WPANs) needed more research. In [6] T.Kennedy and R. Hunt review WPAN security accord- ing to them protection mechanism for Bluetooth is that PIN should not entered into the Bluetooth devices for paring in public and only known devices should pair. Encryption technology is essential for unique session key. For ZigBee the source decides whether a protected or non-protected acknowledge frame is needed, also per- forming authentication of the source address. Use sym- metric key key exchange (SKKE) acknowledgement of a link key between trust centre and connected devices. For Near Field Communication, a standard key handshake protocol such as diffie-Hellman associated on elliptic

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 4

ISSN 2229-5518

curve cryptography, or RSA could be used to set up a shared secret between two devices for securing the chan- nel [6].
Wireless network visualization techniques in presentation mode visualize the information of access points, mobile devices and relationship using the icons, colored lines and symbol. in this way more information about network status and performance can be achieve, and will help the network performance and security attacks [7].
A novel method using MAC Spoofing proposed in [8] used to avoid any intruder into the wireless communica- tions. MAC address of authenticated user can be used to save any unauthorized access a data base of all autho- rized client MAC address maintain by organization. If the intrusion detection system finds more than one request of MAC address in the same network, it can be sure that the MAC address has been fraud and can block access to that MAC address temporarily [8].
A modified Enhance Compressed Real-time Transport
Protocol (ECRTP) is suitable for wireless point-to-point
links, which have a very high and erratic Bit Error Rate
(BER). In modified ECRTP, the size of header is reduced.
In compressed RTP packets occupy only 2 bytes. These
bytes may be the UDP check-sum or the compressor inter-
leaved header checksum. By sending these checksums
only in some packets, the average header size can be re-
duced [9].
Heterogeneous Network Integration Model proposed in
[10], yields a security scheme for wireless mesh networks.
Each of the mixed wireless networks has produced con- nection with mesh backbone throughout the mesh gate- way interface. Whenever these networks correspond with the mesh cloud, they cross the gateway routers of mesh
backbone. Security issues of the border between the hete- rogeneous wireless networks and the mesh communica- tions should be contracted intensively. In order with this, when passing during the mesh cloud, every of these hete- rogeneous networks require the mesh infrastructure to perform their own individual security requirements.
The current wireless home system has range limitation issue. By using IEEE 802.15.4 standard a system is pro- posed for smart home environment. The most vital part of the structure is main controller, which will provide inter- facing between users and the system. PICI8f452 microcon- troller is used as a brain of the main controller for low power consumption CMOS technology’s ICs are used. A GSM modem is attached with the controller for SMS. Ap- proximately nine phone numbers can be stored and only these numbers can communicate with main controller for sending & receiving SMS & system resource controller. User can enter into system by entering password. The software consists of programming PICI6LF452 microcon- troller using Mikroc compiler from Mikroelectronika. Us- ing C-Language, all of this programming is completed [11].

3.3 Preventive Measures against Security Issues in

Wireless Sensor Networks


Majority of proposed security schemes are supported by particular network model. It is needed to have a model that accomplishes the need of security for each layer in a network. The proposed holistic approach [12] with re- spect to security for wireless sensor networks mitigates this issue. The holistic scheme has some fundamental principles like in a certain network; security is to be guar- anteed for all the layers of protocol stack, the value for ensuring security should not exceed the assessed security risk at a particular time, if there is no substantial security ensured for the sensors. In a particular network; safety is to be ensured for every layers of the protocol stack then the cost for guarantee security should not exceed the as- sessed security risk at a particular time, if there is no physical security guaranteed for the sensors. The security evaluate must be capable to exhibit a refined degradation if some of sensors in the system are compromised. The security considered should be developed to function in a decentralized mode. If security is not measured for all the security layers there are a few efficient security methods working in other layers. By formation security layers as in the holistic scheme, protection could be recognized for the overall network [12].

Fig.2: Holistic View of Security in wireless sensor networks [12]

Classification and association of security VTA (Vulnera- bilities Threats & Attack), is proposed to remodel applica- tion-specific WSNs. The proposed scheme has redefined the concepts of vulnerability, threats and attacks with respect to wireless sensor network. On the basis of this differentiation we can check the list of security VTAs, which can reduce the ambiguity of security information on VTAs. Then; by probing each of VTAs we relate it with a security appraisal framework for analysis [13].

Table 1. Classification and Association of Security VTAs with Discrete

Security Assessment Framework [13]

N Vulnerability: average energy exhaustion (network), low

E computational capacity, limited network storage time,

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 5

ISSN 2229-5518

T

W

O R K

self organization, fault-tolerance level, distributed

storage, task details, simple ciphering, and node deployment

T

W

O R K

Threat: Topology change, change of frequency, large mes-

saging overhead, non-scalability, recursive routing, system failures

T

W

O R K

Attack: complete DoS or DDoS

L I N K

Vulnerability: Radio link, Signal transmission range

(916MHz,2.4GHz), Broadcasting, Topology-less infra- structure, Ad hoc Topology information

L I N K

Threat: Non-Reachable, Link-failure, High-density of

nodes, Indefinite jamming of signals, Data tampering, High noise, unmanaged mobility, Higher delays (link- setup)

L I N K

Attack: Collision or checksum mismatch, Unfairness,

Spoofing, Sybil, Wormholes, Hello flood, ACK-spoofing

S

I N K

Vulnerability: Energy exhaustion at Sink, Task details

S

I N K

Threat: Unauthorized access

S

I N K

Attack: Sinkhole, de-synchronization

N

O

D E

Vulnerability: Energy exhaustion at node, Resilience to

physical security, Limited memory, short-storage time

N

O

D E

Threat: Node failure, Recursive localization, Indefinite

flooding

N

O

D E

Attacks: Selective Forwarding

O

T H

E R

Vulnerability:------

O

T H

E R

Threat: Natural hazards, Environmental interference, Hu-

man Interaction (to damage network), catastrophic(man- made)

O

T H

E R

Attack: Nil

Multitier security architecture is required where each me- chanism has different resource requirements. Identifica- tion of the data type present in sensor network identifies the security threats to the communication for each data type. Every employing multitier security scheme is tai- lored to make the most out of the available resources. Use localized algorithm in which only one node heap all oth- ers sensors data and then sends this mix data to a sensor node which can communicate network and users [14].
The current protocols for data link layer and network layers are not adequate for handling various security threats in WSN. The proposed scheme in [15] is turn to account in the form of two layers, link and network lay- ers. This strategy seep through the jumble attacks layer by layer to reduce the price of energy for processing. Type of attacks that proposed intrusion detection scheme in link layer can easily notice integrity, collision and exhausting attacks, and in network layer it behold sewage pool, wormhole, selective-forwarding and hello flood news attacks. This security architecture needed no extra com- ponent or hardware [15].
The Ad-hoc personal area network & Wireless Sensor Secure NETwork (AWISSENET) distributed detection system (DIDS) proposed in [16] for secure WSNs. The model has plug-in based design in order to enable a flexi- ble management of the algorithms that running on each node. The local IDS agent is composed of four compo- nents. The plug-in manager, data manager, decision
model and communication model. Intrusion algorithm runs just a subset of the AWISSENET nodes. The AWIS- SENET cluster can be multi-hop. The size of a cluster is nearly same scale as the number of bunches in network. The AWISSENET DIDS employs timestamps and absorbs, secrete keys are shared within each cluster and among the cluster heads. Timestamps are used to decide the fresh- ness of the messages and stop replay attacks [16].

3.4 Schemes to Secure Ad-hoc Networks

The proposed system in [17] acts on control messages by checking the truthfulness of their content. Nodes operat- ing the OLSR protocol keep neighborhood information’s. All nodes of the network participate in IDS. This solution represents the first line of protection for the OLSR proto- col. It alleviates threats exploiting flaws in the OLSR spe- cifications to reroute the common routing operation [17].
A Grouped Black Hole Attack Security Model (GBHASM) mitigates the grouped malicious nodes to broadcast the shortest pathway through them to source and destination. Scheme is consisting of two modules; first module has the explanation about new node connectivity & communica- tions. Server receives request acket from new node. It an- swers with membership acknowledgement to the node and stay for the acceptance. If node doesn’t replay within a time limit, the server discards the joining request. Oth- erwise it throws its information. The information received by new joining node is placed in the database and also assign Node Code Pkk1 or pkk2.The second module han- dles all communication activities within the network. Once becoming a part of the network, the node drives call for shortest path through pkk2 packet. Each node will check pkk1 with pkk2, if key matches with in a given time limit, information will be released; otherwise the time of the packets to live, force it to become meaningless [18].
An effective wormhole attack defense method is pro- posed to limits the wormhole attacks on wireless ad-hoc network. In this method each new node of ad-hoc net- work collects information about one hope and two-hope neighbors, in this way the nodes construct a neighbor list and allocate a session key with all neighbor. The identity and MAC address is also present with a packet comes from every node. The next node then verifies whether the forwarder is a neighbor. This technique drops the rep- layed packet, and it broadcasts the exit of the wormhole [19].
A secure routing mechanism called security-aware ad-hoc routing (SAR) not only concern the length of the routers. The security metric is integral part of routing request or RREQ packet and change the forwarding behavior of the nodes receive on RREQ packet with a particular security matrix or trust level. SAR conforms that the node can on- ly forward it, if the node itself can recommend the re- quired security, otherwise the RREQ is discarded. If back- to-back path with the mandatory security elements can be found, an appropriate modified RREQ is launched from

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 6

ISSN 2229-5518






an intermediate node or the ultimate destination. SAR can be employed, based on ad-hoc on-demand routing proto- col such as AODV with suitable modification [20].

Domain

Challenges & Issues

Suggestions

Mobile Ad Hoc

Networks

Cryptographic-based scheme may be failed to find

out the intruders.

Use any proper intrusion detection system (IDS).

Mobile Ad Hoc

Networks

Ad hoc network routing protocols are prone to

security attacks.

Use any attack prevention scheme particularly at

the time of root construction.

Mobile Ad Hoc

Networks

Majority of routing protocols concern only the length of the routers.

The security metric should be integral part of routing protocols.

S

E N S O R

N E T

W O R K

Deployment

Issues

WSN gateway form single point failure.

Fault endurance of WSN-gateway should be in-

crease.

S

E N S O R

N E T

W O R K

Deployment

Issues

After deployment sensor nodes are gone unat-

tended.

Periodically checking all the attached nodes of a

WSN.

S

E N S O R

N E T

W O R K

Protocol Issues

Current protocols for link layer and network layer can be failed to handle security threads in WSN.

Need for security architecture to handle this is- sue.

S

E N S O R

N E T

W O R K

Protocol Issues

No common model to guarantee security for each layer in WSN.

Holistic approach with respect to security can mitigate this issue.

S

E N S O R

N E T

W O R K

Inherited Is- sues

Limited computation power, short memory and low power supply.

Extensive research is required to resolve these inherited issues.

S

E N S O R

N E T

W O R K

Inherited Is- sues

Increment in the range of devices will increase the

energy consumption.

Extensive research is required to resolve these inherited issues.

S

E N S O R

N E T

W O R K

Inherited Is- sues

Increment in the range will create high electro-

magnetic radiation.

Extensive research is required to resolve these inherited issues.

S

E N S O R

N E T

W O R K

Inherited Is- sues

Energy issue restricts the implementation of secu-

rity schemes.

Extensive research is required to resolve these inherited issues.

Table 2. Major issues and Suggestions

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 7

ISSN 2229-5518

4 CONCLUSION

In this survey paper, we look into the security issues and challenges in wireless communications, particularly in ad hoc communications. We have divided our studies into four sub-domains that are Security attacks, Vulnerabili- ties, Security models and Range limitation issues. Main issues addressed in this paper comprise the continuity of environment monitoring, limitation and vulnerabilities of sensors networks, the ad-hoc communication scheme, and the security scheme that protects against large num- ber of attacks including DoS, Wormhole attacks, HELLO flood news attacks etc. we also discussed some security model for protection against attacks, these mechanisms still have limitations, which are discussed in this paper. We also provide a tabular form of major issues and chal- lenges in WSN and MANETs and also provide some sug- gestion towards solutions. The contribution of this paper is to spell out the current security threats and other corre- lated issues in wireless communications and discussed
the proposed solutions which may offer a new way of thinking towards the solution space.

REFERENCES

[1] Kumar, R. Valdez, O.Gomez ,S.Bose: “Survivability evaluation of wireless sensor network under DDoS attacks”IEEE Interna- tional Conference on Systems and Mobile Communications and Learning Technologies,2006 pp.82-82

[2] Tanveer A Zia and Md Zahidul Islam: “Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Net- works:”IEEE, International Conference on Availability, Reliabil- ity and Security, ARES '10 International Conference on, 2010 pp. 347-352

[3] H.R. Zeilandoo, M.A. Ngadi: “Intruder Location Tracking” second international conference on computer and electirical en- gineering, DO110.1109/ICCEE.2009.53, 2009 pp.507-511

[4] Xinyu Xing; Shakshuki, E.; Benoit, D.; Sheltami, T: “Security Analysis and Authentication Improvement for IEEE 802.11i Specification” IEEE lobal Telecommunications Conference,

2008. IEEE GLOBECOM 2008. pp. 1-5

[5] Boudriga, N.; Baghdadi, M.; Obaidat, M.S: “A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks”IEEE 39th Annual Simulation Sympo- sium, November Digital Object Identifier: 10.1109/ANSS.2006.8,

2006.

[6] Todd Kennedy, Ray Hunt, Christchurch: “A Review of WPAN Security Attacks and Prevention” the International Conference on Mobile …, 2008 - portal.acm.org

[7] Chi Yoon Jeong, Beom Hwan Chang and Jung Chan Na:, “A Survey on Visualization for Wireless Security” Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference Volume: 1 , 2008.pp.

129-132

[8] Neel Diksha, Agarwal Shubham: “Backdoor Intrusion in Wire- less Networks-Problems and Solutions” Communication Tech- nology, 2006. ICCT '06. International Conference 2006 pp. 1-4

[9] Binod Vaidya, SangDuck Lee, Jongan Park: “Evaluation of Se- cure Multimedia Services over Wireless Access Network”, Ubi- quitous Multimedia Computing, 2008. UMC '08. International Symposium

, May 2008 pp. 181-184

[10] Hassen Redwan and Ki-Hyung Kim: “Survey of Security Re- quirements, Attacks and Network Integration in Wireless Mesh Networks” Frontier of Computer Science and Technology, 2008. FCST '08. Japan-China Joint Workshop , 2008 pp. 3-9

[11] Sarijari, M.A.B.; Rashid, R.A.; Rahim, M.R.A.; Mahalin, N.H: “Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication”Proceedings of IEEE

2008 6th National Conference on Telecommunication Technolo- gies, August 2008 pp. 242-245.

[12] Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong: “Security in Wireless Sensor Networks: Issues and Challenges” Ad- vanced Communication Technology, 2006. ICACT 2006. The 8th International ConferenceVolume: 2 , Feb 2006 pp. 1048

[13] Ashraf, A.; Rauf, A.; Mussadiq, M.; Chowdhry, B.S.; Hashmani, M: “A Model for Classifying Threats and Framework Associa- tion in Wireless Sensor Networks” Anti-counterfeiting, Securi- ty, and Identification in Communication, 2009. ASID 2009. 3rd International Conference pp. 7-9

[14] Slijepcevic, S.; Potkonjak, M.; Tsiatsis, V.; Zimbeck, S.; Srivasta- va, M.B: “On Communication Security in Wireless Ad-Hoc Sen- sor Networks” Enabling Technologies: Infrastructure for Colla- borative Enterprises, 2002. WET ICE 2002. Proceedings. Ele- venth IEEE International Workshops,2002 PP.139-144

[15] Xi Peng; Zheng Wu; Debao Xiao; Yang Yu:“Study on Security Management Architecture for Sensor Network based on Intru- sion Detection” Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Con- ference on Networks Security, Wireless Communications & Trusted Computing,Vol. 2, 2009 pp. 503-507

[16] Lionel Besson, Philippe Leleu, Colombes Cedex France: “A Distributed Intrusion Detection System for Ad-Hoc Wireless Sensor Networks”, Systems, Signals and Image Processing, IWSSIP 2009. 16th International Conference, 2009 pp.1-3

[17] Alia Fourati, Khaldoun Al Agha: “An IDS First Line of Defense for Ad-Hoc Networks”, Wireless Communications and Net- working Conference, 2007.WCNC 2007. IEEE pp. 2619-2624

[18] Shahid Shehzad Bajwa, M. Khalid Khan:“Grouped Black hole Attacks Security Model(GBHASM) for Wireless Ad-Hoc Net- works” Computer and Automation Engineering (ICCAE), 2010

The 2nd International Conference Vol.1 , 2010 pp. 756-760

[19] Gunhee Lee, Dong-Kyoo Kim, Jungtack Seo: ” An Approach to Mitigate Wormhole Attack in Wireless Ad-Hoc Networks”

IJSER © 2011 http://www.ijser.org

International Journal of Scientific & Engineering Research Volume 2, Issue 5, May-2011 8

ISSN 222S-5518

Information Security and Assurance, 2008. ISA 2008. Interna­

tional Conference , 2008 pp. 220-225

[20] S Yi, P Naldurg, R Kravets - Urbana - Citeseer:" A Security­ Aware Routing Protocol for Wireless Ad-Hoc Networks"

IJSER ©2011 http/lwww l!ser orq