4.6 Review

A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network

Journal

ELECTRONICS
Volume 11, Issue 16, Pages -

Publisher

MDPI
DOI: 10.3390/electronics11162529

Keywords

MAC; physical layer; wireless sensor network; attack; challenges; security; cryptography

Funding

  1. SAUDI ARAMCO Cybersecurity Chair

Ask authors/readers for more resources

Physical layer security for wireless sensor networks is a critical issue. Challenges include data security in wireless transmission and threats to the physical security of networks. The paper surveys parameters of a security design model and discusses attacks and mitigation techniques at different layers. Additionally, it introduces applications of WSNs in various fields and proposes a solution to enhance WSN security.
Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of physical security causes a great threat to a network. We have various techniques to resolve these issues, such as interference, noise, fading in the communications, etc. In this paper we have surveyed the different parameters of a security design model to highlight the vulnerabilities. Further we have discussed the various attacks on different layers of the TCP/IP model along with their mitigation techniques. We also elaborated on the applications of WSNs in healthcare, military information integration, oil and gas. Finally, we have proposed a solution to enhance the security of WSNs by adopting the alpha method and handshake mechanism with encryption and decryption.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available