A Survey of Architectural Issues and Different Kinds of Attacks in Diversified Deployments of Wireless Sensor Networks

This paper focuses on the survey of various kinds of attacks in wireless sensor networks. The attacks of particular interest in almost all deployments of wireless sensor networks are Black hole and Wormhole attack. The area of particular interest is the attack detection in wireless sensor network. The wormhole attack is particularly challenging to deal with since the opponent does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. The contribution of this paper is two-fold. It discusses various techniques to detect and nullify the warmhole attacks in wireless sensor networks. It also discusses the key aspects of arechitectureal issues particularly in application layer that are of critical concern in wireless sensor networks.

[1]  Chen He,et al.  A cluster-based energy efficient MAC protocol for multi-hop cognitive radio sensor networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[2]  Ming Liu,et al.  The last minute: Efficient Data Evacuation strategy for sensor networks in post-disaster applications , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Lei Zhao,et al.  Energy Efficient Design of WSN Based on an Accurate Power Consumption Model , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[4]  R. C. Hansdah,et al.  An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[5]  Chiara Buratti,et al.  A mathematical model for performance analysis of IEEE 802.15.4 Non-Beacon Enabled Mode , 2008, 2008 14th European Wireless Conference.

[6]  P. S. Rao,et al.  Zigbee Based WSN with IP Connectivity , 2012, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation.