Assessing the Severity of Attacks in Wireless Networks

Sensor networks is an evolving technology and a hot exploration subject among scientists due to their tractability and individuality of network substructures, such as base stations, wireless access points, and moveable nodes. Sensor networks are widely used for solicitations, such as construction, traffic observation, and territory monitoring and several other scenarios. Wireless sensor network (WSN) makes a network malleable enough to go over concrete structures and it also evades lot of cabling. The primary encounters faced in WSN are security, and the hiatus in security leads to other constrains in energy efficiency, network life, and communication overhead. The hiatus in safekeeping the network is mostly because deficiency of the overriding of wave propagation, and computing constraints. In this paper, we have deliberated about numerous diversities of attacks in WSN, and their aftermath to the network.

[1]  Giovanni Vigna,et al.  NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[2]  Richard P. Martin,et al.  The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study , 2006, DCOSS.

[3]  Stefan Savage,et al.  TCP congestion control with a misbehaving receiver , 1999, CCRV.

[4]  Claude Castelluccia,et al.  Code injection attacks on harvard-architecture devices , 2008, CCS.

[5]  Jeril Kuriakose,et al.  Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks , 2015, SSCC.

[6]  Jussi Kangasharju,et al.  Real-world sybil attacks in BitTorrent mainline DHT , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[7]  Panayiotis Kotzanikolaou,et al.  Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[8]  Jeril Kuriakose,et al.  A Review on Mobile Sensor Localization , 2014, SSCC.

[9]  Xun Wang,et al.  iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[10]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .