Security Attacks in Wireless Sensor Networks: A Survey

被引:0
|
作者
Patel, Manish M. [1 ]
Aggarwal, Akshai [1 ]
机构
[1] Gujarat Technol Univ, Ahmadabad, Gujarat, India
关键词
Wireless sensor networks; Security; Wormhole; Jamming; Selective Forwarding; Sinkhole; Sybil;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.
引用
收藏
页码:329 / 333
页数:5
相关论文
共 50 条
  • [21] A Survey of Middleware and Security approaches for Wireless Sensor Networks
    Sain, Mangal
    Kumar, Pardeep
    Lee, Hoon Jae
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 64 - 69
  • [22] Power Conservation and Security in Wireless Sensor Networks - A Survey
    Amirthavalli, K.
    Sivakumar, P.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [23] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey
    Sinha, Preeti
    Jha, V. K.
    Rai, Amit Kumar
    Bhushan, Bharat
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
  • [24] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034
  • [25] Security Issues and Attacks in Wireless Sensor Networks: Some Case Studies
    Rao, N. Thirupathi
    Bhattacharyya, Debnath
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2018, 12 (05): : 1 - 9
  • [26] Security mechanisms analysis of wireless sensor networks specific routing attacks
    Su, Zhong
    Lin, Chuang
    Ren, FengYuan
    Zhan, XiaoSu
    2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 579 - +
  • [27] Information attacks and security in wireless sensor networks of industrial SCADA systems
    Finogeev, Alexey G.
    Finogeev, Anton A.
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2017, 5 : 6 - 16
  • [28] Reliable Transmission Scheme Against Security Attacks in Wireless Sensor Networks
    Siasi, Nazli
    Aldalbahi, Adel
    Jasim, Mohammed A.
    2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [29] Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to Castalia
    Bernardeschi, Cinzia
    Dini, Gianluca
    Palmieri, Maurizio
    Racciatti, Francesco
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 815 - 824
  • [30] Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks
    Redwan, Hassen
    Kim, Ki-Hyung
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 3 - 9