Comparative Analysis of Security Issues and Trends in IoT and WSN

Main Article Content

Vishal Choudhary
Animesh Srivastava
Anoop Kumar
Sunil Taruna

Abstract

Recent advancements in the field of wireless sensor networks and the internet of things market give rise to security concerns. While using the application of these technologies in the real world, many security issues have emerged. There are security risks involved in using IoT and WSN devices in areas such as financial, health, and business, as well as in industry. Security requirements are exponentially increasing with the demand for IoT devices in the market around the world. The trends have shown that the WSN field is slowly merging into the IoT ecosystem. Another factor that encourages the integration of the WSN field in IoT is advancements in addressing and the internet of everything. If we study both technologies in minute detail, we will find that although both technologies are interrelated, there is a huge difference in application areas, connectivity issues, routing issues, security issues, etc. WSN gives great importance to the efficient management of constrained resources. On the other hand, security, scalability, quality of service, and heterogeneity are the main concerns in IoT systems. In this paper, there is a detailed analysis of several factors, requirements, and trends in the advancement of both technologies.

Downloads

Download data is not yet available.

Article Details

How to Cite
Choudhary, V., Srivastava, A., Kumar, A., & Taruna, S. (2022). Comparative Analysis of Security Issues and Trends in IoT and WSN. SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 14(02), 216-222. https://doi.org/10.18090/samriddhi.v14i02.16
Section
Research Article

References

[1] Alharbi, R., & Aspinall, D. (2018). An IoT Analysis Framework: An Investigation of IoT Smart Cameras’ Vulnerabilities. Living in the Internet of Things: Cybersecurity of the IoT - 2018. https://doi.
org/10.1049/cp.2018.0047
[2] Choudhary, V. (2017). Fuzzy Analysis for Nodes Deployment Strategies in Wireless Sensor Network. International
Journal on Recent and Innovation Trends in Computing and Communication, 5(6), 852–855. https://doi.org/10.17762/ijritcc.
v5i6.866
[3] Choudhary, V., & Taruna, S. (2018). A Distributed Key Management Protocol for Wireless Sensor Network. Communications in Computer and Information Science, 243–256. https://doi.
org/10.1007/978-981-13-3143-5_21
[4] Choudhary, V., & Taruna, S. (2020). The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network. Journal of Discrete Mathematical Sciences and
Cryptography, 23(1), 95–114. https://doi.org/10.1080/0972052 9.2020.1721880
[5] Choudhary, V., & Taruna, S. (2021). An Intrusion Detection Technique Using Frequency Analysis for Wireless Sensor
Network. 2021 International Conference on Computing,
Communication, and Intelligent Systems (ICCCIS). https://doi.
org/10.1109/icccis51004.2021.9397076
[6] Choudhary, V., Taruna, D. S., & Purbey, L. B. (2018). A Comparative Analysis of Cryptographic Keys and Security. 2018 3rd
International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE). https://doi.org/10.1109/ icraie.2018.8710431
[7] Gupta, S., Bharti, P. K., & Choudhary, V. (2011). Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc Networks. High Performance Architecture and Grid Computing, 574–579. https:// doi.org/10.1007/978-3-642-22577-2_76
[8] Kavak, A., & Kucuk, K. (2009). On connectivity analysis of smart antenna capable wireless sensor networks. 2009 6th International Symposium on Wireless Communication Systems.
https://doi.org/10.1109/iswcs.2009.5285278
[9] Li, Y. X., Qin, L., & Liang, Q. (2010). Research on Wireless Sensor Network Security. 2010 International Conference on Computational Intelligence and Security. https://doi.org/10.1109/ cis.2010.113
[10] Satish Kumar Nalluri, Venkata Krishna Bharadwaj Parasaram, Varun Teja Bathini. (2020). Secure Automation Frameworks for Smart Manufacturing Using Blockchain-Assisted Traceability.
International Journal of Research & Technology, 8(2), 47–53.
Retrieved from https://ijrt.org/j/article/view/879
[11] Manrique, J. A., Rueda-Rueda, J. S., & Portocarrero, J. M. (2016).
Contrasting Internet of Things and Wireless Sensor Network from a Conceptual Overview. 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). https:// doi.org/10.1109/ithings-greencom-cpscom-smartdata.2016.66 [12] Mohammed, A. F., & Qyser, A. A. M. (2020). A Survey on Security Mechanisms in IoT. 2020 International Conference on Emerging Trends in Information Technology and Engineering (Ic-ETITE).
https://doi.org/10.1109/ic-etite47903.2020.172
[13] Mohammed, S., & Al-Jammas, M. H. (2020). Data Security System for IoT Applications. 2020 International Conference on Advanced Science and Engineering (ICOASE). https://doi.org/10.1109/ icoase51841.2020.9436579
[14] Sun, Y., Guo, S., Cheung, S. C., & Tang, Y. (2019). Analyzing and Disentangling Interleaved Interrupt-Driven IoT Programs. IEEE Internet of Things Journal, 6(3), 5376–5386. https://doi.
org/10.1109/jiot.2019.2900769
[15] Tellez, M., El-Tawab, S., & Heydari, M. H. (2016). IoT security attacks using reverse engineering methods on WSN applications. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). https://doi.
org/10.1109/wf-iot.2016.7845429
[16] Satish Kumar Nalluri, Venkata Krishna Bharadwaj Parasaram.
(2019). Software-Centric Automation Frameworks Integrating AI and Cybersecurity Principles. International Journal of Engineering Science & Humanities, 9(1), 30–40. Retrieved from https://www.ijesh.com/j/article/view/539
[17] Nalluri, S. K., Parasaram, V. K. B., & Bathini, V. T. (2021).
Autonomous Manufacturing Operations Using Intelligent MES and Cloud-Native Analytics. Journal of Multidisciplinary Knowledge, 1(1), 45–55. Retrieved from
https://jmk.datatablets.com/index.php/j/article/view/127 [18] Vishal, & Taruna, S. (2020). An Efficient Quantum Key Management Scheme. Advances in Intelligent Systems and Computing, 269–277.
https://doi.org/10.1007/978-3-030-39875-0_29
[19] Xia, S., Chen, D., Wang, R., Li, J., & Zhang, X. (2020). Geometric Primitives in LiDAR Point Clouds: A Review. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 13, 685–707. https://doi.org/10.1109/jstars.2020.2969119 [17] Yu, J. Y., Lee, E., Oh, S. R., Seo, Y. D., & Kim, Y. G. (2020). A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access, 8, 45304–45324.
https://doi.org/10.1109/access.2020.2977778
[20] Zahra, S. R., & Ahsan Chishti, M. (2019). RansomWare and Internet of Things: A New Security Nightmare. 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence). https://doi.org/10.1109/confluence.2019.8776926