Attacks on Wireless Sensor Network: A Survey

Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattende d environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited i n computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained en vironment. With a widespread growth in the potential applicati ons of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and is sues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Net work in this paper.

[1]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[2]  Luis E. Palafox,et al.  Security in Wireless Sensor Networks , 2008 .

[3]  Jayaprakash Kar,et al.  A Survey on Security Mechanisms and Attacks in Wireless Sensor Networks , 2014 .

[4]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[5]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[6]  Kotagiri Ramamohanarao,et al.  Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks , 2007, 2007 15th IEEE International Conference on Networks.

[7]  M.M. Alam,et al.  An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting , 2004, E-Tech 2004.

[8]  Luis E. Palafox,et al.  Chapter XXXIV Security in Wireless Sensor Networks , 2008 .

[9]  T. K. Bandopadhyaya,et al.  Journal of Theoretical and Applied Information Technology , 2022 .

[10]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[11]  Ashish Gupta,et al.  ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES , 2014 .

[12]  Naser Alajmi,et al.  Wireless Sensor Networks Attacks and Solutions , 2014, ArXiv.

[13]  Jatinder Singh,et al.  A MAC Layer Based Defense Architecture for Reduction of Quality (RoQ) Attacks in Wireless LAN , 2010, ArXiv.

[14]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[15]  Jatinder Singh,et al.  A cross-layer based intrusion detection technique for wireless networks , 2012, Int. Arab J. Inf. Technol..

[16]  N. Sarma,et al.  SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY , 2010 .

[17]  A VaniB.,et al.  Security Attacks and its Countermeasures in Wireless Sensor Networks , 2014 .

[18]  Jean Bacon,et al.  A survey of Wireless Sensor Network technologies: research trends and middleware’s role , 2005 .

[19]  Youxian Sun,et al.  Wireless sensor networks solutions for real time monitoring of nuclear power plant , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).

[20]  Mohamed-Lamine Messai Classification of Attacks in Wireless Sensor Networks , 2014, ArXiv.

[21]  Debashis De,et al.  Analysis of Security Threats in Wireless Sensor Network , 2014, ArXiv.

[22]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[23]  Hosam Soleman,et al.  SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS , 2014 .

[24]  Krishnendu Chakrabarty,et al.  Sensor deployment and target localization based on virtual forces , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[25]  Abdul Hanan Abdullah,et al.  Security Issues and Attacks in Wireless Sensor Network , 2014 .