A Comparison of Link Layer Attacks on Wireless Sensor Networks

Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and resource limited sensors [3]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional network security techniques are unusable on WSNs [3]; This is due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. Therefore security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN’s constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs’ link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; furthermore, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable IT security managers to manage the link layer attacks of WSNs more effectively.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[4]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[5]  Harish Kumar,et al.  COMPARISON BETWEEN VARIOUS BLACK HOLE DETECTION TECHNIQUES IN MANET , 2010 .

[6]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[7]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[8]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[9]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[10]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[11]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[12]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[13]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[14]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[15]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[16]  Ruttikorn Varakulsiripunth,et al.  Detecting Sinkhole attacks in wireless sensor networks , 2009, 2009 ICCAS-SICE.

[17]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[18]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[19]  Irshad Ullah,et al.  Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .

[20]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[21]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[22]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[23]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[24]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[25]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .