A Review : Security Threats and Defensive Strategis in WSN

Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. Wireless Sensor Networks consist of a large number of pocketsized sensors deployed in autonomous manner in the area under surveillance. These sensor networks are used in sensitive, unattended and remote environment. WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. This paper studies the security problems of WSN based on its resource restricted design and deployment characteristics and the security requirements for designing a secure WSN. Also, this study documents the well-known attacks at the different layers of WSN and some counter measures against those attacks. Keyword : WSN, Warmhole, Sink hole, Hello flood attack, Jamming

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  Manish M. Patel,et al.  Two phase wormhole detection approach for dynamic wireless sensor networks , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[3]  Vikas Solanke,et al.  Wireless sensor network security threats , 2013, ARTCom 2013.

[4]  Yoon Hwa Choi,et al.  A Malicious and Malfunctioning Node Detection Scheme for Wireless Sensor Networks , 2012 .

[5]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[6]  Amit Kumar Mishra,et al.  ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .

[7]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[8]  Gongpu Wang,et al.  Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack , 2015, IEEE Transactions on Industrial Informatics.

[9]  Ashok Kumar Turuk,et al.  A Survey on Selective Forwarding Attack in Wireless Sensor Networks , 2011, 2011 International Conference on Devices and Communications (ICDeCom).

[10]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[11]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[12]  B. Paramasivan,et al.  Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview , 2011 .

[13]  Raisa I. Mulla,et al.  Review of Attacks on Wireless Sensor Network and their Classification and Security , 2016 .

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Shio Kumar Singh,et al.  A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor , 2010 .

[16]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[17]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[18]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[19]  Shashikala,et al.  A survey on secured routing protocols for wireless sensor network , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).