Survey: Self-Empowered Wireless Sensor Networks Security Taxonomy, Challenges and Future Research Directions

Date

2022-10-28

Department

Program

Citation of Original Publication

M. Adil et al., "Survey: Self-Empowered Wireless Sensor Networks Security Taxonomy, Challenges and Future Research Directions," in IEEE Sensors Journal, 2022, doi: 10.1109/JSEN.2022.3216824.

Rights

© 2022 IEEE.  Personal use of this material is permitted.  Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Subjects

Abstract

In the recent past, patient wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to the information anywhere and every time to improve the life standard of multifarious disease effected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders, etc. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user’s or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up the underlined limitations to discuss the open security challenges of SWSN that need the concerned authorities’ attention. Based on this, we will pave a road map for the future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students that why this paper is in time and needed in the presence of rival papers.