CFP last date
01 May 2024
Reseach Article

A Survey of Wireless Sensor Network Attacks

by Ahmed S. Elqusy, Salah E. Essa, Ayman EL-Sayed
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 10
Year of Publication: 2017
Authors: Ahmed S. Elqusy, Salah E. Essa, Ayman EL-Sayed
10.5120/cae2017652565

Ahmed S. Elqusy, Salah E. Essa, Ayman EL-Sayed . A Survey of Wireless Sensor Network Attacks. Communications on Applied Electronics. 6, 10 ( Apr 2017), 10-20. DOI=10.5120/cae2017652565

@article{ 10.5120/cae2017652565,
author = { Ahmed S. Elqusy, Salah E. Essa, Ayman EL-Sayed },
title = { A Survey of Wireless Sensor Network Attacks },
journal = { Communications on Applied Electronics },
issue_date = { Apr 2017 },
volume = { 6 },
number = { 10 },
month = { Apr },
year = { 2017 },
issn = { 2394-4714 },
pages = { 10-20 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume6/number10/725-2017652565/ },
doi = { 10.5120/cae2017652565 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:57:02.617157+05:30
%A Ahmed S. Elqusy
%A Salah E. Essa
%A Ayman EL-Sayed
%T A Survey of Wireless Sensor Network Attacks
%J Communications on Applied Electronics
%@ 2394-4714
%V 6
%N 10
%P 10-20
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There are a lot of application using wireless sensor network, including using in enemy environment. One of the most valuable issues in any WSN is security. The purpose of this paper is to study the security attacks and the defense mechanism over WSN. Trust Management will be clarified and its importance in security.

References
  1. Brindha, P. and Senthil, A., 2016. Security on Wireless Sensor Networks: A Survey,” (IJCSIT) International Journal of Computer Science and Information Technologies, 7(6), pp.2487-2490.
  2. Singh, R., Singh, J. and Singh, R., 2016. WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks. Mobile Information Systems, 2016.
  3. Kaushal, K. and Kaur, T., 2015. A Survey on Attacks of WSN and their Security Mechanisms. International Journal of Computer Applications, 118(18).
  4. Biswas, S. and Adhikari, S., 2015. A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network. International Journal of Computer Applications, 131(17), pp.28-35.
  5. Radha, R. and Santhosh, S.,2013, October. A Novel Security Model for Preventing Passive and Active Attacks in WSNs. In Int. J. Adv. Res. Comput. Commun.
  6. Oh, S.H., Hong, C.O. and Choi, Y.H., 2012. A malicious and malfunctioning node detection scheme for wireless sensor networks. Wireless sensor network, 4(03), p.84.
  7. Virmani, D., Soni, A., Chandel, S. and Hemrajani, M., 2014. Routing attacks in wireless sensor networks: A survey. arXiv preprint arXiv:1407.3987.
  8. Jariwala, V. and Jinwala, D., 2012. A novel approach for secure data aggregation in wireless sensor networks.
  9. Tiloca, M., De Guglielmo, D., Dini, G. and Anastasi, G., 2013, September. SAD-SJ: A self-adaptive decentralized solution against Selective Jamming attack in Wireless Sensor Networks. In Emerging Technologies & Factory Automation (ETFA), 2013 IEEE 18th Conference on (pp. 1-8). IEEE.
  10. Gruteser, M., Schelle, G., Jain, A., Han, R. and Grunwald, D., 2003, May. Privacy-Aware Location Sensor Networks. In HotOS (Vol. 3, pp. 163-168).
  11. Mohammadi, S. and Jadidoleslamy, H., 2011. A comparison of physical attacks on wireless sensor networks. International Journal of Peer to Peer Networks, 2(2), pp.24-42.
  12. Menezes, A.J., Van Oorschot, P.C. and Vanstone, S.A., 1996. Handbook of applied cryptography. CRC press.
  13. Molnar, D. and Wagner, D., 2004, October. Privacy and security in library RFID: Issues, practices, and architectures. In Proceedings of the 11th ACM conference on Computer and communications security (pp. 210-219). ACM.
  14. S. Duri, M. Gruteser, X. Liu, P. Moskowitz, R. Perez, M. Singh, and J. Tang, “Framework for security and privacy in automotive telematics”, In Proceedings of the 2nd ACM International Workshop on Mobile Commerce, 2000.
  15. Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M. and Tang, J.M., 2002, September. Framework for security and privacy in automotive telematics. In Proceedings of the 2nd international workshop on Mobile commerce (pp. 25-32). ACM.
  16. Pathan, A.S.K., 2010. Denial of service in wireless sensor networks: issues and challenges. Nova Science Publishers, Inc.
  17. Wood, A.D. and Stankovic, J.A., 2002. Denial of service in sensor networks. Computer, 35(10), pp.54-62.
  18. Anderson, R. and Kuhn, M., 1996, November. Tamper resistance-a cautionary note. In Proceedings of the second Usenix workshop on electronic commerce (Vol. 2, pp. 1-11).
  19. Anderson, R. and Kuhn, M., 1997, April. Low cost attacks on tamper resistant devices. In International Workshop on Security Protocols (pp. 125-136). Springer Berlin Heidelberg.
  20. Kömmerling, O. and Kuhn, M.G., 1999. Design Principles for Tamper-Resistant Smartcard Processors. Smartcard, 99, pp.9-20.
  21. Sastry, N., Shankar, U. and Wagner, D., 2003, September. Secure verification of location claims. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 1-10). ACM.
  22. Wang, X., Chellappan, S., Gu, W., Yu, W. and Xuan, D., 2005, October. Search-based physical attacks in sensor networks. In Computer Communications and Networks, 2005. ICCCN 2005. Proceedings. 14th International Conference on (pp. 489-496). IEEE.
  23. Deng, J., Han, R. and Mishra, S., 2005. Security, privacy, and fault tolerance in wireless sensor networks. Artech House.
  24. Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V. and Culler, D.E., 2002. SPINS: Security protocols for sensor networks. Wireless networks, 8(5), pp.521-534.
  25. Wang, X., Gu, W., Schosek, K., Chellappan, S. and Xuan, D., 2005. Sensor network configuration under physical attacks. In Networking and Mobile Computing (pp. 23-32). Springer Berlin Heidelberg.
  26. Mukherjee, N., Neogy, S. and Roy, S., 2015. Building Wireless Sensor Networks: Theoretical and Practical Perspectives. CRC Press.
  27. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E., 2002. A survey on sensor networks. IEEE Communications magazine, 40(8), pp.102-114.
  28. Law, Y.W., Hartel, P., den Hartog, J. and Havinga, P., 2005, January. Link-layer jamming attacks on S-MAC. In Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on (pp. 217-225). IEEE.
  29. Law, Y.W., Palaniswami, M., Hoesel, L.V., Doumen, J., Hartel, P. and Havinga, P., 2009. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transactions on Sensor Networks (TOSN), 5(1), p.6.
  30. Ashraf, F., Hu, Y.C. and Kravets, R.H., 2012, October. Bankrupting the jammer in WSN. In Mobile Adhoc and Sensor Systems (MASS), 2012 IEEE 9th International Conference on (pp. 317-325). IEEE.
  31. Wang, Y., Attebury, G. and Ramamurthy, B., 2006. A survey of security issues in wireless sensor networks.
  32. Law, Y.W., Hartel, P., den Hartog, J. and Havinga, P., 2005, January. Link-layer jamming attacks on S-MAC. In Wireless Sensor Networks, 2005. Proceeedings of the Second European Workshop on (pp. 217-225). IEEE.
  33. Singh, G., 2016, April .Security Attacks and Defense Mechanisms in Wireless Sensor Network: A Survey. In IJISET - Int. J. Innov. Sci. Eng. Technol.
  34. Eschenauer, L. and Gligor, V.D., 2002, November. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security (pp. 41-47). ACM.
  35. Karlof, C. and Wagner, D., 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad hoc networks, 1(2), pp.293-315.
  36. Malik, M., Singh, D.Y. and Arora, A., 2013. Analysis of LEACH protocol in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2).
  37. Stankovic, J.A., Abdelzaher, T.E., Lu, C., Sha, L. and Hou, J.C., 2003. Real-time communication and coordination in embedded sensor networks. Proceedings of the IEEE, 91(7), pp.1002-1022.
  38. Al-Shurman, M., Yoo, S.M. and Park, S., 2004, April. Black hole attack in mobile ad hoc networks. In Proceedings of the 42nd annual southeast regional conference (pp. 96-97). ACM.
  39. Dokurer, S., 2006. Simulation of Black hole attack in wireless Ad-hoc networks. Atılım University.
  40. Karakehayov, Z., 2005. Using REWARD to detect team black-hole attacks in wireless sensor networks. Wksp. Real-World Wireless Sensor Networks, pp.20-21.
  41. Ajiwen, C.A.I., Ping, Y.I., Jialin, C.H.E.N., Zhiyang, W.A.N.G. and Ning, L.I.U., 2010.An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network. In 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
  42. Yadav, S., Gupta, K. and Silakari, S., 2010. Security issues in wireless sensor networks. journal of information systems and communication, 1(2), p.1.
  43. Hu, Y.C., Perrig, A. and Johnson, D.B., 2003, April. Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (Vol. 3, pp. 1976-1986). IEEE.
  44. Eriksson, J., Krishnamurthy, S.V. and Faloutsos, M., 2006, November. Truelink: A practical countermeasure to the wormhole attack in wireless networks. In Network Protocols, 2006. ICNP'06. Proceedings of the 2006 14th IEEE International Conference on (pp. 75-84). IEEE.
  45. Choi, J.C. and Lee, C.W., 2006, September. Energy modeling for the cluster-based sensor networks. In Computer and Information Technology, 2006. CIT'06. The Sixth IEEE International Conference on (pp. 218-218). IEEE.
  46. Chang, W. and Wu, J., 2012. A Survey of Sybil Attacks in Networks. Sensor Networks for Sustainable Development.
  47. Newsome, J., Shi, E., Song, D. and Perrig, A., 2004, April. The sybil attack in sensor networks: analysis & defenses. In Proceedings of the 3rd international symposium on Information processing in sensor networks (pp. 259-268). ACM.
  48. Ledlie, J. and Seltzer, M., 2005, March. Distributed, secure load balancing with skew, heterogeneity and churn. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 2, pp. 1419-1430). IEEE.
  49. Douceur, J.R., 2002, March. The sybil attack. In International Workshop on Peer-to-Peer Systems (pp. 251-260). Springer Berlin Heidelberg.
  50. Bhattacharyya, D., Kim, T.H. and Pal, S., 2010. A comparative study of wireless sensor networks and their routing protocols. Sensors, 10(12), pp.10506-10523.
  51. Alzaid, H., Foo, E. and Nieto J.G., 2008, January. Secure data aggregation in wireless sensor network: a survey. In Proceedings of the sixth Australasian conference on Information Security-Volume 81 (pp. 93-105). Australian Computer Society, Inc.).
  52. Hamid, A. and Hong, C.S., 2006, February. Defense against lap-top class attacker in wireless sensor network. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference (Vol. 1, pp. 5-pp). IEEE.
  53. Giruka, V.C., Singhal, M., Royalty, J. and Varanasi, S., 2008. Security in wireless sensor networks. Wireless communications and mobile computing, 8(1), pp.1-24.
  54. Khozium, M.O., 2008. Hello flood countermeasure for wireless sensor networks. International Journal of Computer Science and Security, 2(3), pp.57-65.
  55. Rathod, V. and Mehta, M., 2011. Security in wireless sensor network: a survey. Ganpat University Journal of Engineering and Technology, 1(1), pp.35-44.
  56. Sharma, K. and Ghose, M.K., 2010. Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, pp.42-45.
  57. Shukla, J. and Kumari, B., 2013. Security Threats and Defense Approaches in Wireless Sensor Networks: An Overview. International Journal of Application or Innovation in Engineering & Management (IJAIEM), 2.
  58. Sharma, K., Ghose, M.K., Kumar, D., Singh, R.P.K. and Pandey, V.K., 2010. A comparative study of various security approaches used in wireless sensor networks. International journal of advanced science and technology, 17, pp.31-44.
  59. Carman, D.W., Kruus, P.S. and Matt, B.J., 2000. Constraints and approaches for distributed sensor network security (final). DARPA Project report, (Cryptographic Technologies Group, Trusted Information System, NAI Labs), 1(1).
  60. Sharma, K. and Ghose, M.K., 2010. Wireless sensor networks: An overview on its security threats. IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs, pp.42-45.
  61. Mohammadi, S. and Jadidoleslamy, H., 2011. A comparison of link layer attacks on wireless sensor networks. arXiv preprint arXiv:1103.5589.
  62. Snekkenes, E., 2001, October. Concepts for personal location privacy policies. In Proceedings of the 3rd ACM conference on Electronic Commerce (pp. 48-57). ACM.
  63. Xiao, B., Yu, B. and Gao, C., 2007. CHEMAS: Identify suspect nodes in selective forwarding attacks. Journal of Parallel and Distributed Computing, 67(11), pp.1218-1230.
  64. Hu, Y.C., Perrig, A. and Johnson, D.B., 2003, September. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30-40). ACM.
  65. Aura, T., Nikander, P. and Leiwo, J., 2000, April. DOS-resistant authentication with client puzzles. In International workshop on security protocols (pp. 170-177). Springer Berlin Heidelberg.
  66. Lupu, T.G., 2009, September. Main types of attacks in wireless sensor networks. In I. Rudas, M. Demiralp and N. Mastorakis eds., WSEAS International Conference. Proceedings. Recent Advances in Computer Engineering (No. 9). WSEAS.
  67. Pathan, A.S.K., Lee, H.W. and Hong, C.S., 2006, February. Security in wireless sensor networks: issues and challenges. In Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference (Vol. 2, pp. 6-pp). IEEE.
  68. Maharana, R. and Khilar, P.M., 2013. An improved authentication protocol for hierarchical wireless sensor networks using ECC. International Journal of Computer Applications, 67(22).
  69. Zia, T. and Zomaya, A., 2006, October. Security issues in wireless sensor networks. In Systems and Networks Communications, 2006. ICSNC'06. International Conference on (pp. 40-40). IEEE.
  70. Rathod, V. and Mehta, M., 2011. Security in wireless sensor network: a survey. Ganpat University Journal of Engineering and Technology, 1(1), pp.35-44.
  71. Nack, F., 2010. An Overview on Wireless Sensor Networks. Institute of Computer Science (ICS), Freie Universität Berlin.
  72. Parno, B., Perrig, A. and Gligor, V., 2005, May. Distributed detection of node replication attacks in sensor networks. In Security and Privacy, 2005 IEEE Symposium on (pp. 49-63). IEEE.
  73. Ganeriwal, S., Čapkun, S., Han, C.C. and Srivastava, M.B., 2005, September. Secure time synchronization service for sensor networks. In Proceedings of the 4th ACM workshop on Wireless security (pp. 97-106). ACM.
  74. Padmavathi, D.G. and Shanmugapriya, M., 2009. A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Security Defense mechanisms attack’s types.