Skip to main content
Top

2017 | OriginalPaper | Chapter

Detailed Survey on Attacks in Wireless Sensor Network

Authors : A. R. Dhakne, P. N. Chatur

Published in: Proceedings of the International Conference on Data Engineering and Communication Technology

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Now days, Wireless Sensor Networks (WSNs) have widespread applications in the areas of medicine, military etc. So, it is always important to think on the security of this technology. WSN security is having some scientific and technical challenges. Most existing security techniques need a lot of computation, memory and energy which are considered as limitations in WSNs. This paper gives broad overview on all the attacks (vulnerabilities) that can harm to any wireless sensor networking environment such as physical attacks, attacks that can affect the functioning of different layers of networking, attacks related to privacy, Secrecy and Authentication and at the end this paper tried to give overview on some recent attacks that are going to create problems whenever certain nodes wants to calculate trust value of some other node such as Bad mouthing attack, Good mouthing attack and on-off attack.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference F. Oldewurtel and P. Mahonen. Neural Wireless sensor network ICSNC, 0:28, 2006. F. Oldewurtel and P. Mahonen. Neural Wireless sensor network ICSNC, 0:28, 2006.
2.
go back to reference J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier’s Computer Networks Journal, 52, 2292–2330; 2008. J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier’s Computer Networks Journal, 52, 2292–2330; 2008.
3.
go back to reference C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and protocols, 2003. C. Karlof and D. Wagner, Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier’s AdHoc Networks Journal, Special Issue on Sensor Network Applications and protocols, 2003.
4.
go back to reference Z. Tanveer and Z. Albert. Security issues in wireless sensor networks, ICSNC’06: Proceedings of the International Conference on Systems and Networks communication, Washington, DC, USA, IEEE Computer Society, 2006, 40. Z. Tanveer and Z. Albert. Security issues in wireless sensor networks, ICSNC’06: Proceedings of the International Conference on Systems and Networks communication, Washington, DC, USA, IEEE Computer Society, 2006, 40.
5.
go back to reference J. Rehana, Security of wireless sensor networks. In TKKT— 110.5190 Seminar on Internetworking, Helsinki, 2009. J. Rehana, Security of wireless sensor networks. In TKKT— 110.5190 Seminar on Internetworking, Helsinki, 2009.
6.
go back to reference J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary. Wireless sensor network security: A survey, Security in Distributed, Grid, and Pervasive Computing, 2006. J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary. Wireless sensor network security: A survey, Security in Distributed, Grid, and Pervasive Computing, 2006.
7.
go back to reference Y. W. Law and P. Havinga, How to secure a wireless sensor network. December 2005, 89–95. Y. W. Law and P. Havinga, How to secure a wireless sensor network. December 2005, 89–95.
8.
go back to reference S. Datema. A case study of wireless sensor network attacks. Master’s thesis, Delft University of Technology, 2005. S. Datema. A case study of wireless sensor network attacks. Master’s thesis, Delft University of Technology, 2005.
9.
go back to reference I. Khalil, S. Bagchi, and N. B. Shroff, Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks, International Journal Computer and Telecommunications Networking, Vol. 51, Issue 13, 2007, pp 3750–3722. I. Khalil, S. Bagchi, and N. B. Shroff, Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks, International Journal Computer and Telecommunications Networking, Vol. 51, Issue 13, 2007, pp 3750–3722.
10.
go back to reference Jaydip Sen “A survey on wireless sensor networks security” International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009. Jaydip Sen “A survey on wireless sensor networks security” International Journal of Communication Networks and Information Security (IJCNIS) Vol. 1, No. 2, August 2009.
11.
go back to reference Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication Technology (ICACT), Page(s):6, year 2006. Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, “Security in wireless sensor networks: issues and challenges” Advanced Communication Technology (ICACT), Page(s):6, year 2006.
12.
go back to reference Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks (elsevier), Page: 299–302, year 2003. Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, AdHoc Networks (elsevier), Page: 299–302, year 2003.
13.
go back to reference Yong Wang, Garhan Attebury, and Byrav Ramamurthy “A survey of security issues in wireless sensor networks” 2nd quarter 2006, volume 8, NO. 2 IEEE communication surveys. Yong Wang, Garhan Attebury, and Byrav Ramamurthy “A survey of security issues in wireless sensor networks” 2nd quarter 2006, volume 8, NO. 2 IEEE communication surveys.
14.
go back to reference T. Aura, P. Nikander, and J. Leiwo, Dos-resistant authentication with client puzzles, 2001, 170–177. T. Aura, P. Nikander, and J. Leiwo, Dos-resistant authentication with client puzzles, 2001, 170–177.
15.
go back to reference W. T. Zhu, Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme, IEEE International Conference on Network Computing and Information Security (NCIS), vol. 2, 2011, 156–160. W. T. Zhu, Node Replication Attacks in Wireless Sensor Networks: Bypassing the Neighbor-Based Detection Scheme, IEEE International Conference on Network Computing and Information Security (NCIS), vol. 2, 2011, 156–160.
16.
go back to reference B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2005, 49–63. B. Parno, A. Perrig, and V. Gligor, Distributed detection of node replication attacks in sensor networks, Proceedings of IEEE Symposium on Security and Privacy, 2005, 49–63.
17.
go back to reference J. Deng, R. Han, and S. Mishra, Countermeasures against traffic analysis in wireless sensor networks, Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004. J. Deng, R. Han, and S. Mishra, Countermeasures against traffic analysis in wireless sensor networks, Technical Report CU-CS-987-04, University of Colorado at Boulder, 2004.
Metadata
Title
Detailed Survey on Attacks in Wireless Sensor Network
Authors
A. R. Dhakne
P. N. Chatur
Copyright Year
2017
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-1678-3_31

Premium Partner