Classification of Attacks in Wireless Sensor Networks

In wireless sensor networks (WSNs), security has a vital importance. Recently, there was a huge interest to propose security solutions in WSNs because of their applications in both civilian and military domains. Adversaries can launch different types of attacks, and cryptography is used to countering these attacks. This paper presents challenges of security and a classification of the different possible attacks in WSNs. The problems of security in each layer of the network's OSI model are discussed.

[1]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[2]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[3]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[4]  Ning Hu,et al.  Security for fixed sensor networks , 2004, ACM-SE 42.

[5]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[6]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[7]  Fei Hu,et al.  Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.

[8]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[9]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[10]  Rajeev Shorey,et al.  Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions , 2005 .

[11]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[12]  I. Khemapech,et al.  A Survey of Wireless Sensor Networks Technology , 2005 .

[13]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[14]  Petr Svenda,et al.  Smart Dust Security - Key Infection Revisited , 2006, STM.