Data link layer security protocols in Wireless Sensor Networks: A survey

Saleha Mubarak Almheiri, Hend Saeed Alqamzi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Citations (Scopus)

Abstract

Wireless Sensor Networks (WSNs) spread widely and rapidly due to its unique features, such as their light weight, low-cost, and ad hoc nature. However, this network is vulnerable to several attacks that affect its security. Thus, securing different layers in such a network becomes an urgent necessity. In this paper, we survey several existing protocols and algorithms designed to secure the data link layer, which in turn guarantees a reliable communication link between neighboring nodes by controlling the medium access and handling the errors. The main goals of this paper are to shed the light on the current research in this field, show their strength and limitations to meet the unique constraints of WSN, and identify the essential security requirements that must be considered in future designs of data link security protocols.

Original languageEnglish
Title of host publication2013 10th IEEE International Conference on Networking, Sensing and Control, ICNSC 2013
Pages312-317
Number of pages6
DOIs
Publication statusPublished - 2013
Event2013 10th IEEE International Conference on Networking, Sensing and Control, ICNSC 2013 - Evry, France
Duration: Apr 10 2013Apr 12 2013

Publication series

Name2013 10th IEEE International Conference on Networking, Sensing and Control, ICNSC 2013

Other

Other2013 10th IEEE International Conference on Networking, Sensing and Control, ICNSC 2013
Country/TerritoryFrance
CityEvry
Period4/10/134/12/13

Keywords

  • C-Sec
  • LEAP
  • LLSP
  • Replay Protection
  • SPINS
  • Steganography
  • TinySec
  • WSN
  • link layer

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Data link layer security protocols in Wireless Sensor Networks: A survey'. Together they form a unique fingerprint.

Cite this