We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Threat Model Approach for Classification of Network Layer Attacks in WSN

by Bhavna Arora
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 9
Year of Publication: 2013
Authors: Bhavna Arora
10.5120/10492-5249

Bhavna Arora . A Threat Model Approach for Classification of Network Layer Attacks in WSN. International Journal of Computer Applications. 63, 9 ( February 2013), 5-10. DOI=10.5120/10492-5249

@article{ 10.5120/10492-5249,
author = { Bhavna Arora },
title = { A Threat Model Approach for Classification of Network Layer Attacks in WSN },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 9 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 5-10 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number9/10492-5249/ },
doi = { 10.5120/10492-5249 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:15:09.235940+05:30
%A Bhavna Arora
%T A Threat Model Approach for Classification of Network Layer Attacks in WSN
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 9
%P 5-10
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor networks (WSN) comprise an emerging technology which has received a significant attention from the research community. Several small and low cost devices are included in the sensor networks which are self organizing ad hoc systems. WSNs are susceptible to many types of attacks at various layers of networks but due to limited resources most of traditional networks security techniques are unusable on WSNs. Hence security is a vital requirement for these networks. In this paper, the focus is on security of WSNs. A threat model has been considered; divided into four parts and has been used for evaluation of security at various layers of WSN. The paper also introduces the goals and effects of attacks in WSN based on the purpose and capabilities of the attackers. In addition, this paper discusses known approaches of security detection and defensive mechanisms against the layered attacks.

References
  1. Mohammadi Shahriar, Hossein J. , “A Comparison Of Link Layer Attacks On Wireless Sensor Networks”, International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC), Vol.3, No.1.March 2011
  2. Habib Asif, ,"Sensor Network security issues at network layer", Proceeding of 2nd International Conference on Advances in Space Technologies Islamabad, Pakistan, 29th – 30th November 2008
  3. Sen Jaydip, “Routing Security Issues in Wireless Sensor Networks: Attacks and Defences”, Book Chapter, “Sustainable Wireless Sensor Networks”,2010
  4. Mohanty Prabhudutta, Panigrahi Sangram, Sarma Nityananda and Siddhartha Satapathy Sankar, “Security Issues In Wireless Sensor Network Data Gathering Protocols: A Survey”, Journal Of Theoretical And Applied Information Technology, JATIT.14-27. © 2005 – 2010
  5. Bhavna Arora Makin and Prof. Devanand, “An Intra-Cluster Trust-Based Secure Data Aggregation Framework for Wireless Sensor Networks”, International Journal for Next Generation Computing,Vol.2, No.1 March 2011, pp 325-338
  6. Carman, D.W. , Krus, P.S. & Matt, B.J., ," Constraints and approaches for distributed sensor network security". Technical Report No : 00-010, NAI Labs, Associates Inc., Glenwood, MD, USA. Network,2000.
  7. Perrig A. , Szewczyk R. , Tygar J. D. , V. Wen and Culler D. E. , “SPINS: security protocols for sensor networks ”, Wireless Networks, vol. 8, no. 5, pp. 521-34. 2002.
  8. Bhavna Arora Makin and Prof. Devanand, “Trust Based Secure Data Aggregation Protocol in Wireless Sensor Networks”, IUP Journal of Information Technology, Vol. VI, No. 3, pp. 7-22, September 2010.
  9. Stallings, W., “Cryptography and Network Security Principles and Practice”, Cryptography Book, 2nd Edition, Prentice- Hall, 0-13-869017-0, 2000.
  10. Khelifa Benahmed, Hafid Haffaf and Madjid Merabti, “Monitoring of Wireless Sensor Networks”, Book Chapter, “Sustainable Wireless Sensor Networks”,2010.
  11. Karlof Chris and Wagner David ,“Secure routing in wireless sensor networks: attacks and countermeasures”, Proceedings of the First IEEE International Workshop on In Sensor Network Protocols and Applications,2003.
  12. Wang Yong , Garhan Attebury, Byrav Ramamurthy,“A Survey of Security Issues In Wireless Sensor Networks”, CSE, Journal Articles, paper 84, 2006.
  13. Giannetsos Athanasios, “Security Threats in Wireless Sensor Networks: Implementation of Attacks & Defense Mechanisms”, Ph.D Dissertation Submitted to the Department of Electronic Systems and the Committee on Graduate Studies of Aalborg University in Wireless Communications,2011.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Network (WSN) Layers of WSN Attacks Detection Defensive Mechanism Threat Model