Security Attacks in Wireless Sensor Networks: A Survey

Security is one of the major concerns in sensor networks. Wireless sensor network comprises of huge amount of nodes called as tiny sensor nodes. The nodes are required to exchange information with different nodes via wireless links in short intervals. The information may be potentially private regarding people and business processes. These networks suffer from adversary due to distributed behavior and deployment in distant areas. The networks are governed by some constraints at sensor node level like less battery power, less memory capacity, and low transmission range while at network level, they are governed by ad hoc networking and irregular connectivity. The paper analyzes the challenges, main security issues, security breaches in wireless sensor networks and lists their defensive measures.

[1]  Mohsen Sharifi,et al.  A Survey on Wireless Sensor Networks Security , 2007 .

[2]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[3]  Neeli R. Prasad,et al.  Security Framework for Wireless Sensor Networks , 2006, Wirel. Pers. Commun..

[4]  Remus Brad,et al.  Attacks And Counterattacks On Wireless Sensor Networks , 2014, ArXiv.

[5]  Shi-Jinn Horng,et al.  Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network , 2014, Wirel. Networks.

[6]  Claudio Soriente,et al.  Participatory privacy: Enabling privacy in participatory sensing , 2012, IEEE Network.

[7]  Md. Abdul Hamid,et al.  A group-based security scheme for wireless sensor networks , 2012, Ann. des Télécommunications.

[8]  William H. Sanders,et al.  A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures , 2014, IEEE Transactions on Smart Grid.

[9]  Mohsen Guizani,et al.  Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[10]  Gregorio Díaz,et al.  Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP , 2007 .

[11]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Milos Manic,et al.  Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks , 2014, IEEE Transactions on Industrial Informatics.

[13]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[14]  Salil S. Kanhere,et al.  IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[15]  Ing-Ray Chen,et al.  Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[16]  Rajashekhar C. Biradar,et al.  Trusted Neighbors Based Secured Routing Scheme in Wireless Sensor Networks Using Agents , 2014, Wirel. Pers. Commun..

[17]  George S. Oreku,et al.  Improved Feistel-based ciphers for wireless sensor network security , 2008 .

[18]  Christopher Leckie,et al.  Privacy-preserving data aggregation in Participatory Sensing Networks , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[19]  Milos Manic,et al.  Autonomic Intelligent Cyber-Sensor to Support Industrial Control Network Awareness , 2014, IEEE Transactions on Industrial Informatics.

[20]  John R. Williams,et al.  Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.