Survey on different attacks in Wireless Sensor Networks and their prevention system

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract – Wireless Sensor Network (WSN) is a large network of sensor nodes. Wireless Sensor Networks are very popular and have their special characteristics such as limited battery, limited power and limited storage that makes the energy consumption. Although there are some limitations but there are many advantages of Wireless Sensor Networks. Some advantages are robustness, scalability, flexibility. WSN also reduces the cabling cost. Now a days WSN is mostly used in modern technologies to gain the output in most efficient way. Some applications of WSN are area monitoring, health care monitoring, Earth sensing, Landslide detection etc. In this paper we are detecting and preventing black hole attack, gray hole attack, misdirection attack and DOS attack. For prevention of all these attacks we are using one protocol which is LEACH protocol. LEACH protocol means Low Energy Adaptive Clustering Hierarchy. This protocol uses limited energy which increases the network lifetime.

[1]  Yuanan Liu,et al.  The detection and defence of DoS attack for wireless sensor network , 2012 .

[2]  A. P. Renold,et al.  Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Communication and Informatics.

[3]  Shashikala,et al.  A survey on secured routing protocols for wireless sensor network , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[4]  Jalel Ben-Othman,et al.  Detecting DoS attacks in WSN based on clustering technique , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[5]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.