Loading…

A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network

Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we t...

Full description

Saved in:
Bibliographic Details
Published in:Electronics (Basel) 2022-08, Vol.11 (16), p.2529
Main Authors: Rehman, Attique Ur, Mahmood, Muhammad Sajid, Zafar, Shoaib, Raza, Muhammad Ahsan, Qaswar, Fahad, Aljameel, Sumayh S., Khan, Irfan Ullah, Aslam, Nida
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Physical layer security for wireless sensor networks (WSNs) is a laborious and highly critical issue in the world. Wireless sensor networks have great importance in civil and military fields or applications. Security of data/information through wireless medium remains a challenge. The data that we transmit wirelessly has increased the speed of transmission rate. In physical layer security, the data transfer between source and destination is not confidential, and thus the user has privacy issues, which is why improving the security of wireless sensor networks is a prime concern. The loss of physical security causes a great threat to a network. We have various techniques to resolve these issues, such as interference, noise, fading in the communications, etc. In this paper we have surveyed the different parameters of a security design model to highlight the vulnerabilities. Further we have discussed the various attacks on different layers of the TCP/IP model along with their mitigation techniques. We also elaborated on the applications of WSNs in healthcare, military information integration, oil and gas. Finally, we have proposed a solution to enhance the security of WSNs by adopting the alpha method and handshake mechanism with encryption and decryption.
ISSN:2079-9292
2079-9292
DOI:10.3390/electronics11162529