We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network

by Suparna Biswas, Subhajit Adhikari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 17
Year of Publication: 2015
Authors: Suparna Biswas, Subhajit Adhikari
10.5120/ijca2015907654

Suparna Biswas, Subhajit Adhikari . A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network. International Journal of Computer Applications. 131, 17 ( December 2015), 28-35. DOI=10.5120/ijca2015907654

@article{ 10.5120/ijca2015907654,
author = { Suparna Biswas, Subhajit Adhikari },
title = { A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 17 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number17/23543-2015907654/ },
doi = { 10.5120/ijca2015907654 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:38.953930+05:30
%A Suparna Biswas
%A Subhajit Adhikari
%T A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 17
%P 28-35
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main objective of the paper is to present different types of Security attacks, their effects and defense mechanisms in Wireless Sensor Network which is vulnerable to security attacks and threats due to its characteristics and limitations. Security attacks are identified and classified from different perspectives e.g. based on network layer in which the attack occurs, specifically network layer wise security features and the network security basics, based on attacker location, based on transmission of information, based on different protocol stack layers etc. and the different security measures that can be applied to defend against different attacks. This survey paper focuses on various aspects of different security attacks, their effects and defense mechanisms corresponding to each attack etc. So this paper helps researchers to have a very strong idea about the security issues, existing attacks and they can also use the ideas and concepts to build more secure wireless sensor network system in future. A direction can be obtained to develop new security mechanisms to protect new possible attacks along with existing ones.

References
  1. Yuck, J., Mukherjee, B., & Ghosal, D. “Wireless sensor network survey”, Computer networks, 52(12), 2292-2330 (2008).
  2. Dargie, Waltenegus W., and Christian Poellabauer, “Fundamentals of wireless sensor networks: theory and practice”. John Wiley & Sons, (2010).
  3. Methley, Steve, “Essentials of wireless mesh networking”, Cambridge University Press, 2009.
  4. Virmani, Deepali, et al., “Routing Attacks in Wireless Sensor Networks: A Survey”, arXiv preprint arXiv: 1407.3987 (2014).
  5. Kavitha, T., and D. Sridharan, “Security vulnerabilities in wireless sensor networks: A survey”, Journal of information Assurance and Security 5.1 (2010): 31-44.
  6. D. Singla, C. Diwaker, “Analysis of Security Attacks in Wireless Sensor Networks”, International Journal of Software and Web Sciences (IJSWS), ISSN (Print): 2279-0063, ISSN (Online): 2279-0071
  7. Prabu, M., et al., “DOS Attacks and Defenses at the Network Layer in AD-HOC and Sensor Wireless Networks, Wireless AD-HOC Sensor Networks: A Short Survey”, Middle-East Journal of Scientific Research 23.5 (2015): 779-784.
  8. Mohanty, Prabhudutta, et al., “SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY”, Journal of Theoretical & Applied Information Technology 13 (2010).
  9. Dhara, Buch, and Jinwala Devesh., “Denial of Service Attacks in Wireless Sensor Networks”, NUiCone 2010. 2010.
  10. Mohammadi, Shahriar, and HosseinJadidoleslamy, “A comparison of physical attacks on wireless sensor networks”, International Journal of Peer to Peer Networks 2.2 (2011): 24-42.
  11. Butani, Bhavana, Piyush Kumar Shukla, and Sanjay Silakari, “An Exhaustive Survey on Physical Node Capture Attack in WSN”, International Journal of Computer Applications 95.3 (2014).
  12. Mohammadi, Shahriar, and HosseinJadidoleslamy, “A comparison of link layer attacks on wireless sensor networks”, arXiv preprint arXiv:1103.5589 (2011).
  13. Shafiei, Hosein, et al. “Detection and mitigation of sinkhole attacks in wireless sensor networks”, Journal of Computer and System Sciences 80.3 (2014): 644-653.
  14. Rawat, Danda B., ed. “Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications”, IGI Global, 2013.
  15. Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. “Wormhole attacks in wireless networks”, Selected Areas in Communications, IEEE Journal on 24.2 (2006): 370-380.
  16. Kellner, Ansgar, Omar Alfandi, and Dieter Hogrefe, “A survey on measures for secure routing in wireless sensor networks”, International Journal of Sensor Networks and Data Communications 1 (2012): 1-17.
  17. Singh, Shio Kumar, M. P. Singh, and D. K. Singh, “A survey on network security and attack defense mechanism for wireless sensor networks”, International Journal of Computer Trends and Technology 1.2 (2011): 9-17.
  18. Malik, Monika, and Yudhvir Singh, “A Review: DoS and DDoS Attacks” (2015).
  19. Korgaonkar, Prachi, Ashish Patil, and Nilesh Khochare, “NetSHIELD: Countermeasure Tool for Network Layer Attacks”, International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) 1.8 (2012): 91-94.
  20. Maidamwar, Priya, and NekitaChavhan, “A Survey On Security Issues to Detect Wormhole Attack in Wireless sensor Network”, International Journal on Ad hoc Networking Systems 2.4 (2012).
  21. Sen, Jaydip, “A survey on wireless sensor network security”, arXiv preprint arXiv:1011.1529 (2010).
  22. Ghildiyal, Sunil, et al., “Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks”, IJRET: International Journal of Research in Engineering and Technology: 2319-1163.
  23. Anil M. Hingmire, “Enhancing Security of Wireless Sensor Network”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 2, March 2013
  24. Raymond, David R., and Scott F. Midkiff, “Denial-of-service in wireless sensor networks: Attacks and defenses”, Pervasive Computing, IEEE 7.1 (2008): 74-81.
  25. Murthy, C. Siva Ram, and B. S. Manoj, “Ad hoc wireless networks: Architectures and protocols”. Pearson education, 2004.
  26. Zhang, Linyuan, et al., “Byzantine Attack and Defense in Cognitive Radio Networks: A Survey” (2015).
  27. Khan, Shafiullah, and Al-Sakib Khan Pathan, “Wireless Networks and Security: Issues, Challenges and Research Trends”, Springer Science & Business Media, 2013.
  28. Pathan, Al-Sakib Khan, ed., “The State of the Art in Intrusion Prevention and Detection”, CRC Press, 2014.
  29. Elçi, Atilla, ed., “Theory and Practice of Cryptography Solutions for Secure Information Systems”, IGI Global, 2013.
  30. Isha, Arun Malik, and Gaurav Raj., “DOS Attacks on TCP/IP Layers in WSN”.
  31. Karmakar, Gour, and Laurence S. Dooley., “Mobile multimedia communications: Concepts, applications, and challenges”, Information Science Reference, 2008.
  32. Zhang, Yan, Jun Zheng, and Miao Ma, eds. “Handbook of research on wireless security”, IGI Global, (2008).
  33. Rahman, Nabila, Matthew Wright, and Donggang Liu., “Fast and energy-efficient technique for jammed region mapping in wireless sensor networks”, arXiv preprint arXiv:1401.7002 (2014).
  34. Wireless Technologies: Concepts, Methodologies, Tools and Applications:Volume 1, Management Association, Information Resources, IGI Global, 31-Aug, (2011).
  35. Zhu, Yanmin, Xiangpeng Li, and Bo Li, “Optimal Adaptive Antijamming in Wireless Sensor Networks”, International Journal of Distributed Sensor Networks 2012 (2012).
  36. Nielsen, Hanne Riis, and Dieter Gollmann, eds., “Secure IT Systems”: 18th Nordic Conference, NordSec, Ilulissat, Greenland, October 18-21, Proceedings. Vol. 8208. Springer, (2013).
  37. Zurawski, Richard, ed., “Embedded systems design and verification”, CRC Press, (2009).
  38. Guo, Qin, et al., “Secure network coding against wiretapping and Byzantine attacks”, EURASIP Journal on Wireless Communications and Networking 2010 (2010): 17.
  39. Kai Xing, ShyaamSundharRajamadam Srinivasan, Manny Rivera, Jiang Li, Xiuzhen Cheng, “Attacks and Countermeasures in Sensor Networks: A Survey”, Springer, (2005).
  40. Kuorilehto, Mauri, et al., “Ultra-low energy wireless sensor networks in practice: Theory, realization and deployment”, John Wiley & Sons, (2008).
  41. Basagni, Stefano, et al., eds., “Mobile Ad Hoc networking: the cutting edge directions”, Vol. 35. John Wiley & Sons, (2013).
  42. Pareek, Anamika, and Mayank Sharma, “Detection and Prevention of Sybil Attack in MANET using MAC Address”, International Journal of Computer Applications 122.21 (2015).
  43. Yang Xiao, ‎Hui Chen, ‎Frank Haizhon Li , “Handbook on sensor networks”, Singapore:: World Scientific, 2010.
  44. R Sowmya1, Mrs. Shoba, Detection and Prevention of Misdirection Attack by Third Party Monitoring in WSN, International Journal of Research In Science & Engineering, Volume: 1 Special Issue: 2.
  45. Wood, Anthony D., and John Stankovic, “Denial of service in sensor networks”, Computer 35.10 (2002):54-62.
  46. Wahid, Abdul, and Pavan Kumar, “A Survey on Attacks, Challenges and Security Mechanisms in Wireless Sensor Network”, International Journal for Innovative Research in Science and Technology 1.8 (2015): 189-196.
  47. Rathod, Vishal, and Mrudang Mehta, “Security in wireless sensor network: a survey”, Ganpat University Journal of Engineering & Tech., 1.1 (2011): 35-44.
  48. Chaudhari, Ms Nimisha Chunilal, “Key Management in Wireless Sensor Network A Survey”, International Journal of Application or Innovation in Engineering & Management (IJAIEM).
  49. S. Dhawale, Dr. B.G. Hogade, “Node Authentication for Wireless Sensor Network Security”, ”, Volume 5, Issue 3, International Journal of Advanced Research in Computer Science and Software Engineering, (2015).
  50. Chan, Haowen, and Adrian Perrig, “Security and privacy in sensor networks”, Computer 36.10 (2003): 103-105.
  51. Perrig, Adrian, John Stankovic, and David Wagner., “Security in wireless sensor networks”, Communications of the ACM 47.6: 53-57, (2004).
  52. Alzaid, Hani, Ernest Foo, and Juan Gonzalez Nieto., “Secure data aggregation in wireless sensor network: a survey”, Proceedings of the sixth Australasian conference on Information security-Volume 81. Australian Computer Society, Inc., (2008).
  53. Jariwala, Vivaksha, and DeveshJinwala, “A Novel Approach for Secure Data Aggregation in Wireless Sensor Networks”,arXiv preprint arXiv:1203.4698 (2012).
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensors Network security structured unstructured CIA active attack passive attack protocol stack.