A Comparison of Physical Attacks on Wireless Sensor Networks

ABSTRACT Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of physical attacks [1] and most of traditional networks security techniques are unusable on WSNs[2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' physical attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal, final result and effects of the physical attacks on WSNs are introduced. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks; this would enable it security managers to manage the physical attacks of WSNs more effectively.

[1]  Zinaida Benenson,et al.  Tampering with Motes: Real-World Attacks on Wireless Sensor Networks , 2006, Sicherheit.

[2]  G. Gong,et al.  A Survey on Security in Wireless Sensor Networks , 2008 .

[3]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[4]  Shivakant Mishra,et al.  Defending against path-based DoS attacks in wireless sensor networks , 2005, SASN '05.

[5]  Christoph Krauß,et al.  An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[6]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[7]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[8]  Jiang Li,et al.  Attacks and Countermeasures in Sensor Networks: A Survey , 2010 .

[9]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[12]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[13]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[14]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[15]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[16]  T. Kavitha,et al.  Security Vulnerabilities In Wireless Sensor Networks: A Survey , 2010 .

[17]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[18]  Christoph Krauß,et al.  Defending against false-endorsement-based dos attacks in wireless sensor networks , 2008, WiSec '08.

[19]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[20]  Sajal K. Das,et al.  Security in Wireless Sensor Networks: A Survey , 2006 .

[21]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .