Skip to main content
Top

2016 | OriginalPaper | Chapter

Assessing the Severity of Attacks in Wireless Networks

Authors : Jeril Kuriakose, V Amruth, R Jaya Krishna, Devesh Kumar Srivastava

Published in: Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Sensor networks is an evolving technology and a hot exploration subject among scientists due to their tractability and individuality of network substructures, such as base stations, wireless access points, and moveable nodes. Sensor networks are widely used for solicitations, such as construction, traffic observation, and territory monitoring and several other scenarios. Wireless sensor network (WSN) makes a network malleable enough to go over concrete structures and it also evades lot of cabling. The primary encounters faced in WSN are security, and the hiatus in security leads to other constrains in energy efficiency, network life, and communication overhead. The hiatus in safekeeping the network is mostly because deficiency of the overriding of wave propagation, and computing constraints. In this paper, we have deliberated about numerous diversities of attacks in WSN, and their aftermath to the network.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Francillon, Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM Conference on Computer and communications security, Alexandria, Virginia, USA (2008) Francillon, Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM Conference on Computer and communications security, Alexandria, Virginia, USA (2008)
2.
go back to reference Reza, S., et al.: Quantifying location privacy: the case of sporadic location exposure. Privacy Enhancing Technologies. Springer, Berlin (2011) Reza, S., et al.: Quantifying location privacy: the case of sporadic location exposure. Privacy Enhancing Technologies. Springer, Berlin (2011)
3.
go back to reference Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer, Berlin (2006) Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer, Berlin (2006)
4.
go back to reference Hu, Yih-Chun, Perrig, Adrian, Johnson, David B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef Hu, Yih-Chun, Perrig, Adrian, Johnson, David B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef
5.
go back to reference Dimitris, G., et al.: Preventing impersonation attacks in MANET with multi-factor authentication. In: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005. Third International Symposium on IEEE WIOPT (2005) Dimitris, G., et al.: Preventing impersonation attacks in MANET with multi-factor authentication. In: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005. Third International Symposium on IEEE WIOPT (2005)
6.
go back to reference Giovanni, V., et al.: NetSTAT: A network-based intrusion detection approach. In: Computer Security Applications Conference, 1998. Proceedings of 14th Annual. IEEE (1998) Giovanni, V., et al.: NetSTAT: A network-based intrusion detection approach. In: Computer Security Applications Conference, 1998. Proceedings of 14th Annual. IEEE (1998)
7.
go back to reference Savage, Stefan, et al.: TCP congestion control with a misbehaving receiver. ACM SIGCOMM Comput. Commun. Rev. 29(5), 71–78 (1999)CrossRef Savage, Stefan, et al.: TCP congestion control with a misbehaving receiver. ACM SIGCOMM Comput. Commun. Rev. 29(5), 71–78 (1999)CrossRef
8.
go back to reference Kuriakose, Jeril, et al.: Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. Security in Computing and Communications. Springer Intl. Publishing, pp. 402–411 (2015) Kuriakose, Jeril, et al.: Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. Security in Computing and Communications. Springer Intl. Publishing, pp. 402–411 (2015)
9.
go back to reference Bing, W., et al.: A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, pp. 103–135. Springer, US (2007) Bing, W., et al.: A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, pp. 103–135. Springer, US (2007)
10.
go back to reference Wang, X., et al.: iloc: An invisible localization attack to internet threat monitoring systems. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) (Mini-conference), April 2008 Wang, X., et al.: iloc: An invisible localization attack to internet threat monitoring systems. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) (Mini-conference), April 2008
11.
go back to reference Liang, W., Jussi, K.: Real-world sybil attack in Bit torrent mainlinedht. IEEE GLOBECOM (2012) Liang, W., Jussi, K.: Real-world sybil attack in Bit torrent mainlinedht. IEEE GLOBECOM (2012)
12.
go back to reference Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer Berlin Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer Berlin
13.
go back to reference Kuriakose, J., et al.: A review on localization in wireless sensor networks. Advances in signal processing and intelligent recognition systems, pp. 599–610. Springer Intl. Publishing (2014) Kuriakose, J., et al.: A review on localization in wireless sensor networks. Advances in signal processing and intelligent recognition systems, pp. 599–610. Springer Intl. Publishing (2014)
14.
go back to reference Jeril, K., et al.: A review on mobile sensor localization. Security in Computing and Communications, pp. 30–44. Springer, Berlin (2014) Jeril, K., et al.: A review on mobile sensor localization. Security in Computing and Communications, pp. 30–44. Springer, Berlin (2014)
Metadata
Title
Assessing the Severity of Attacks in Wireless Networks
Authors
Jeril Kuriakose
V Amruth
R Jaya Krishna
Devesh Kumar Srivastava
Copyright Year
2016
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-2638-3_70