This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Hafeezullah Sahibzda,
Dr. Mohammad Salem Hamidi,
- Student, Department of Computer science, Jahan University Kabul, Kabul, Afghanistan
- Lecturer, Department of Computer science, Jahan University Kabul, Kabul, Afghanistan
Abstract
Due to their capability to collect and relay data from locations without supervision, Wireless Sensor Networks (WSNs) have become essential for numerous contemporary applications (such as environmental monitoring, smart cities, and healthcare). However, the open and resource-constrained nature of WSNs makes them particularly vulnerable to security threats. This paper reviews the key security Issue faced by WSNs and the solutions proposed in recent literature. We examine the unique constraints of WSNs (limited energy, computation, and bandwidth) and how they complicate traditional security measures. Common attack types are surveyed, including routing attacks (e.g. wormhole, sinkhole, Sybil) and denial-of-service (e.g. jamming, flooding). Countermeasures are classified into categories such as lightweight cryptography and authentication protocols secure routing schemes, trust and reputation systems, intrusion-detection methods, and emerging approaches like machine learning and blockchain for anomaly detection and data integrity. This study assesses how effective these security mechanisms are across various network conditions, and it emphasizes the trade-offs among security strength, energy consumption, and network lifetime. Additionally, it addresses recent progress in energy-efficient security protocols and cross-layer design methods aimed at improving the overall resilience of systems. Our analysis highlights that no single solution fits all scenarios – instead, a combination of techniques is often required to balance security with WSN resource limitations. The review concludes with a discussion of open issues and recommendations for future research to achieve robust, energy-efficient security in WSNs.
Keywords: Wireless Sensor Networks (WSNs), Network Security, Routing Attacks, Denial-of-Service (DoS), Lightweight Cryptography, Intrusion Detection Systems, Energy Efficiency, Blockchain and Machine Learning
Hafeezullah Sahibzda, Dr. Mohammad Salem Hamidi. Security Challenges and Solutions in Wireless Sensor Networks: a Case study of Afghanistan. Recent Trends in Sensor Research & Technology. 2026; 13(01):-.
Hafeezullah Sahibzda, Dr. Mohammad Salem Hamidi. Security Challenges and Solutions in Wireless Sensor Networks: a Case study of Afghanistan. Recent Trends in Sensor Research & Technology. 2026; 13(01):-. Available from: https://journals.stmjournals.com/rtsrt/article=2026/view=241021
References
1. Mosawi SZ, Qasimi M, Wadeed WM, Rahmani KR. Exploring Wi-Fi security challenges and proposing solutions: The case of Afghanistan. European Journal of Electrical Engineering and Computer Science. 2023 Oct 3;7(5):14-9.
2. Hussain RH. A survey on security challenges in wireless sensor networks. University of Thi-Qar Journal. 2017;12(3):42-72.
3. Lee CC. Security and privacy in wireless sensor networks: Advances and challenges. Sensors. 2020 Jan 29;20(3):744.
4. Ahmad R, Wazirali R, Abu-Ain T. Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors. 2022 Jun 23;22(13):4730.
5. Velliangiri A. Security challenges and solutions in IoT-based wireless sensor networks. Journal of Wireless Sensor Networks and IoT. 2024;1(1):8-14.
6. Garg A, Kumar A, Singh AK. Machine Learning-Based Security Approaches for Wireless Body Area Networks. InSecurity, Privacy, and Trust in WBANs and E- Healthcare 2024 Nov 29 (pp. 206-235). CRC Press.
7. Pathan AS, Lee HW, Hong CS. Security in wireless sensor networks: issues and challenges. In2006 8th International Conference Advanced Communication Technology 2006 Feb 20 (Vol. 2, pp. 6-pp). IEEE.
8. Pathan AS, Lee HW, Hong CS. Security in wireless sensor networks: issues and challenges. In2006 8th International Conference Advanced Communication Technology 2006 Feb 20 (Vol. 2, pp. 6-pp). IEEE.
9. Padmavathi DG, Shanmugapriya M. A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576. 2009 Sep 3. 10. Sharma K, Ghose MK. Complete security framework for wireless sensor networks. arXiv preprint arXiv:0908.0122. 2009 Aug 2.
11. Adil M, Menon VG, Balasubramanian V, Alotaibi SR, Song H, Jin Z, Farouk A. Survey: self-empowered wireless sensor networks security taxonomy, challenges, and future research directions. IEEE Sensors Journal. 2022 Oct 28;23(18):20519-35.
12. Nguyen DT, Trinh ML, Nguyen MT, Vu TC, Nguyen TV, Dinh LQ, Nguyen MD. Security Issues in IoT-Based Wireless Sensor Networks: Classifications and Solutions. Future Internet. 2025 Aug 1;17(8):350.
13. Zhukabayeva T, Zholshiyeva L, Mardenov Y, Buja A, Khan S, Alnazzawi N. Real- Time Detection and Response to Wormhole and Sinkhole Attacks in Wireless Sensor Networks. Technologies. 2025 Aug 7;13(8):348.
14. Wang L, Petrova K, Yang ML. Trust models in wireless sensor networks for defending against denial-of-service attacks: a literature review. Applied Sciences. 2025 Mar 12;15(6):3075.

Recent Trends in Sensor Research & Technology
| Volume | 13 |
| 01 | |
| Received | 11/04/2026 |
| Accepted | 17/04/2026 |
| Published | 25/04/2026 |
| Publication Time | 14 Days |
Login
PlumX Metrics