A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks

For past few years, more interest has been focused on Wireless Sensor Networks (WSN) due to its wide range of applications in various fields. The WSNs are mainly used for sensing the pollution, monitoring the traffic; secure homeland, hospitals, military etc. There are possibilities of attacks in Wireless Sensor networks. Due to these attacks, there is possibility of loss of information. To avoid the data loss and for secure transmission of data, several countermeasures have been introduced. The main focus of this paper is to provide a detailed survey on various attacks and the countermeasures employed to safeguard the network from malicious attacks.

[1]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[2]  Krishan Kumar,et al.  Detection of HELLO flood attack on LEACH protocol , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Xun Wang,et al.  Sensor network configuration under physical attacks , 2005, Int. J. Ad Hoc Ubiquitous Comput..

[5]  Shahriar Mohammadi,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.

[6]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[7]  Ahmed R. Mahmood,et al.  Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks , 2011, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA).

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Ruchita Dhulkar,et al.  Survey on different attacks in Wireless Sensor Networks and their prevention system , 2015 .

[10]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[11]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[12]  Shashikala,et al.  A survey on secured routing protocols for wireless sensor network , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[13]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[14]  Kahina Chelli,et al.  Security Issues in Wireless Sensor Networks : Attacks and Countermeasures , 2015 .

[15]  Hervé Guyennet,et al.  Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.