| Literature DB >> 27070601 |
Abstract
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.Entities:
Keywords: directional antenna; malicious attacks; security risks; wireless sensor networks
Year: 2016 PMID: 27070601 PMCID: PMC4851002 DOI: 10.3390/s16040488
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Omnidirectional radiation pattern (dipole antenna).
Figure 2Directional radiation pattern for the binomial array antenna.
Omnidirectional vs. directional antenna comparison.
| Characteristic | Omnidirectional Antenna | Directional Antenna |
|---|---|---|
| Energetic efficiency | Lower | Higher |
| Broadcasting direction | All | Desired |
| Transmission range | Lower | Higher |
| Node orientation | Not required | Required |
| Price | Lower | Higher |
| Dimensions | Smaller | Bigger |
| Transmission security | Lower | Higher |
| Collisions | More | Less |
Directional antenna prototypes for WSNs.
| Research | Frequency | Antenna’s Structure | Mote Platform |
|---|---|---|---|
| Leang and Kalis [ | 868 MHz | Two horizontal or vertical wire antennas and a reflective SPDT switch | SensorDVB |
| Nilsson [ | 2.4 GHz | Electronically switched parasitic element antenna | TMote Sky |
| Giorgetti | 2.4 GHz | A box-like structure of four coaxially fed planar patch antennas | TelosB |
| Liang | 2.4 GHz | Active cylindrical frequency selective surface | VirtualSense |
| Catarinucci | 2.4 GHz | Radiation structure made of eight microstrip antennas using rectangular two-element patch antenna arrays and a vertical half-wavelength dipole antenna | STM32W-EXT |
| Catarinucci | 2.4 GHz | Four identical antennas, containing two quarter-wavelength | STM32W-EXT |
| Felemban | 2.4 GHz | 6-Sectored antennas having an overlap of 120 degrees in azimuth | Nano-Qplus |
Summary of research on the use of directional antennas in WSN security.
| Research | Attack | Directional Antenna Involvement | Short Description |
|---|---|---|---|
| Dai | eavesdropping | direct | Establishes eavesdropping models for omnidirectional and directional antennas, proving that directional antennas perform better |
| Li | eavesdropping | direct | Analysis the effects of using directional antennas upon eavesdropping probability from the attacker’s perspective |
| Kim | eavesdropping | direct | Employs special nodes (defensive jammers) equipped with directional antennas in mitigating the eavesdropping attacks |
| Noubir [ | jamming | direct | Proves the efficiency of directional antennas in jamming circumstances by comparing the network connectivity index |
| Panyim | jamming | direct | Proposes a combined strategy that uses pre-distributed cryptographic keys in conjunction with sensor nodes able to switch from omnidirectional to directional antennas anytime a jamming attack is detected |
| Staniec and Debita [ | jamming | direct | Suggests two simultaneous defense strategies: equipping the nodes with directional antennas and establishing a superior limit of the duty cycle |
| Newsome | Sybil attack | indirect | Provides a list of possible defenses against Sybil attacks, underlining the efficiency of position verification tactics |
| Suen and A. Yasinsac [ | Sybil attack | indirect | Uses nodes equipped with GPS and directional antennas to locate the Sybil nodes |
| Bhatia | evil-twin attack | indirect | Employs nodes equipped with four-sector directional antennas to detect malicious nodes using Hyperbolic Position Bounding algorithm |
| Vaman and Shakhakarmi [ | Sybil attack | indirect | Proposes an integrated key-based Strict Friendliness Verification of neighboring nodes |
| Rabieh | Sybil attack | indirect | Identifies Sybil attacks using directional information, public key cryptography and hash function applied to trial messages |
| Hu and Evans [ | wormhole attack | indirect | Proposes three approaches to mitigate wormhole attacks, the basic idea being to maintain an accurate list of trusted neighbors |
| Shi | wormhole attack | indirect | Proposes a Secure Neighbor Discovery scheme for wireless networks with a centralized network controller; the approach uses signature based authentication, transmission time information and directional information |
| Vaman and Shakhakarmi [ | wormhole attack | indirect | Proposes a mechanism based on symmetric node ids, round trip response times and real time location information obtained by directional antennas |
Figure 3Eavesdropping and jamming effect with directional antennas.
Figure 4Sybil attack in WSN.
Figure 5Wormhole attack.