Classification of Attacks on Wireless Sensor Networks: A Survey

Wireless Sensor Networks (WSN) is one of the fastest rising emerging technologies that find widespread use in various applications comprising of military, health, agriculture, habitat etc. Seen as sensor network deployed at sites which can be considered as remote and hostile, the technology is seriously faced with challenges to the network and functional security at the cost of their inherent limitations in energy capacity and computing power. In this paper we have delved upon and summarized earlier research on security challenges poised to WSNs, classified the threats and then presented a generic WSN security model keeping in line with the intended security targets to be met. We have also tried to give a realistic theoretical analysis of our WSN security model against these threats.

[1]  C. Adjih,et al.  Attacks Against OLSR : Distributed Key Management for Security , 2022 .

[2]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[3]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[4]  Chadi Assi,et al.  On the resiliency of mobile ad hoc networks to MAC layer misbehavior , 2005, PE-WASUN '05.

[5]  Muhammad Noman Riaz Clustering Algorithms of Wireless Sensor Networks : A Surevy , 2018 .

[6]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[7]  Leandros Tassiulas,et al.  Overcoming misbehavior in mobile ad hoc networks: an overview , 2005, CROS.

[8]  Mukta Sharma Attacks and Countermeasures , 2018 .

[9]  Chadi Assi,et al.  DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks , 2007, Comput. Commun..

[10]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[11]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[12]  Michael Walfish,et al.  DDoS defense by offense , 2006, SIGCOMM 2006.

[13]  Shiyong Zhang,et al.  A New Routing Attack in Mobile Ad Hoc Networks , 2005 .

[14]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[15]  Nael B. Abu-Ghazaleh,et al.  An application-driven perspective on wireless sensor network security , 2006, Q2SWinet '06.

[16]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[18]  S. Rajkumar A Survey on Security Attacks in Wireless Sensor Network , 2012 .

[19]  Yuguang Fang,et al.  Securing wireless sensor networks: a survey , 2008, IEEE Communications Surveys & Tutorials.

[20]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[22]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[23]  William Stallings,et al.  Cryptography and network security , 1998 .

[24]  Nitin H. Vaidya,et al.  Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.

[25]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[26]  Shio Kumar Singh,et al.  A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks , 2011 .

[27]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[28]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[29]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[30]  Yih-Chun Hu,et al.  Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[31]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[32]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[33]  Rajendra V. Boppana,et al.  Evaluation of a statistical technique to mitigate malicious control packets in ad hoc networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[34]  Dr Pradip M. Jawandhiya A Survey of Mobile Ad Hoc Network Attacks , 2019 .

[35]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[36]  C. Gupta,et al.  SECURITY ISSUES IN WIRELESS SENSOR NETWORK , 2011 .