Routing Attacks in Wireless Sensor Networks: A Survey

Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. The security of a wireless sensor network is compromised because of the random deployment of sensor nodes in open environment, memory limitations, power limitations and unattended nature. This paper focuses on various attacks that manifest in the network and provides a tabular representation of the attacks, their effects and severity. The paper depicts a comparison of attacks basis packet loss and packet corruption. Also, the paper discusses the known defence mechanisms and countermeasures against the attacks.

[1]  Bo Yu,et al.  CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..

[2]  Shahriar Mohammadi,et al.  A Comparison of Link Layer Attacks on Wireless Sensor Networks , 2011, ArXiv.

[3]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Margo I. Seltzer,et al.  Distributed, secure load balancing with skew, heterogeneity and churn , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[5]  Martina Zitterbart,et al.  Security in Sensor Networks , 2010, it Inf. Technol..

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[8]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[10]  Deepali Virmani,et al.  Reliability Analysis to overcome Black Hole Attack in Wireless Sensor Network , 2014, ArXiv.

[11]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[12]  Virendra Pal Singh,et al.  Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks , 2013 .

[13]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[14]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[15]  Ning Liu,et al.  An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[16]  G. Padmavathi,et al.  A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks , 2009, ArXiv.

[17]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[18]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[19]  Zdravko Karakehayov Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .

[20]  Jie Wu,et al.  A Survey of Sybil Attacks in Networks , 2013 .

[21]  Patrick Lincoln,et al.  TCP SYN Flooding Defense , 1999 .

[22]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[23]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[24]  Yang Xiang,et al.  The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures , 2012 .

[25]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[26]  Saudi Arabia,et al.  Denial of Service Attacks in Wireless Ad hoc Networks , 2010 .

[27]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[28]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[29]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.