Skip to main content

2017 | OriginalPaper | Buchkapitel

Detailed Survey on Attacks in Wireless Sensor Network

verfasst von : A. R. Dhakne, P. N. Chatur

Erschienen in: Proceedings of the International Conference on Data Engineering and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Now days, Wireless Sensor Networks (WSNs) have widespread applications in the areas of medicine, military etc. So, it is always important to think on the security of this technology. WSN security is having some scientific and technical challenges. Most existing security techniques need a lot of computation, memory and energy which are considered as limitations in WSNs. This paper gives broad overview on all the attacks (vulnerabilities) that can harm to any wireless sensor networking environment such as physical attacks, attacks that can affect the functioning of different layers of networking, attacks related to privacy, Secrecy and Authentication and at the end this paper tried to give overview on some recent attacks that are going to create problems whenever certain nodes wants to calculate trust value of some other node such as Bad mouthing attack, Good mouthing attack and on-off attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat F. Oldewurtel and P. Mahonen. Neural Wireless sensor network ICSNC, 0:28, 2006. F. Oldewurtel and P. Mahonen. Neural Wireless sensor network ICSNC, 0:28, 2006.
2.
Zurück zum Zitat J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier’s Computer Networks Journal, 52, 2292–2330; 2008. J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier’s Computer Networks Journal, 52, 2292–2330; 2008.
3.
Zurück zum Zitat C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and protocols, 2003. C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and protocols, 2003.
4.
Zurück zum Zitat Z. Tanveer and Z. Albert. Security issues in wireless sensor networks, ICSNC’06: Proceedings of the International Conference on Systems and Networks communication, Washington, DC, USA, IEEE Computer Society, 2006, 40. Z. Tanveer and Z. Albert. Security issues in wireless sensor networks, ICSNC’06: Proceedings of the International Conference on Systems and Networks communication, Washington, DC, USA, IEEE Computer Society, 2006, 40.
5.
Zurück zum Zitat J. Rehana, Security of wireless sensor networks. In TKKT— 110.5190 Seminar on Internetworking, Helsinki, 2009. J. Rehana, Security of wireless sensor networks. In TKKT— 110.5190 Seminar on Internetworking, Helsinki, 2009.
6.
Zurück zum Zitat J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary. Wireless sensor network security: A survey, Security in Distributed, Grid, and Pervasive Computing, 2006. J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary. Wireless sensor network security: A survey, Security in Distributed, Grid, and Pervasive Computing, 2006.
7.
Zurück zum Zitat Y. W. Law and P. Havinga, How to secure a wireless sensor network. December 2005, 89–95. Y. W. Law and P. Havinga, How to secure a wireless sensor network. December 2005, 89–95.
8.
Zurück zum Zitat S. Datema. A case study of wireless sensor network attacks. Master’s thesis, Delft University of Technology, 2005. S. Datema. A case study of wireless sensor network attacks. Master’s thesis, Delft University of Technology, 2005.
9.
Zurück zum Zitat I. Khalil, S. Bagchi, and N. B. Shroff, Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks, International Journal Computer and Telecommunications Networking, Vol. 51, Issue 13, 2007, pp 3750–3722. I. Khalil, S. Bagchi, and N. B. Shroff, Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks, International Journal Computer and Telecommunications Networking, Vol. 51, Issue 13, 2007, pp 3750–3722.
10.
Zurück zum Zitat Jaydip Sen “A survey on wireless sensor networks security” International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009. Jaydip Sen “A survey on wireless sensor networks security” International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009.
11.
Zurück zum Zitat Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication Technology (ICACT), Page(s):6, year 2006. Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication Technology (ICACT), Page(s):6, year 2006.
12.
Zurück zum Zitat Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks (elsevier), Page: 299–302, year 2003. Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks (elsevier), Page: 299–302, year 2003.
13.
Zurück zum Zitat Yong Wang, Garhan Attebury, and Byrav Ramamurthy “A survey of security issues in wireless sensor networks” 2nd quarter 2006, volume 8, NO. 2 IEEE communication surveys. Yong Wang, Garhan Attebury, and Byrav Ramamurthy “A survey of security issues in wireless sensor networks” 2nd quarter 2006, volume 8, NO. 2 IEEE communication surveys.
14.
Zurück zum Zitat T. Aura, P. Nikander, and J. Leiwo, Dos-resistant authentication with client puzzles, 2001, 170–177. T. Aura, P. Nikander, and J. Leiwo, Dos-resistant authentication with client puzzles, 2001, 170–177.
15.
Zurück zum Zitat W. T. Zhu, Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme, IEEE International Conference on Network Computing and Information Security (NCIS), vol. 2, 2011, 156–160. W. T. Zhu, Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme, IEEE International Conference on Network Computing and Information Security (NCIS), vol. 2, 2011, 156–160.
16.
Zurück zum Zitat B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2005, 49–63. B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2005, 49–63.
17.
Zurück zum Zitat J. Deng, R. Han, and S. Mishra, Countermeasures against traffic analysis in wireless sensor networks, Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004. J. Deng, R. Han, and S. Mishra, Countermeasures against traffic analysis in wireless sensor networks, Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004.
Metadaten
Titel
Detailed Survey on Attacks in Wireless Sensor Network
verfasst von
A. R. Dhakne
P. N. Chatur
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1678-3_31