Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security Issues in Wireless Sensor Network


Affiliations
1 Department of Computer Science & Engineering, North Eastern Regional Institute of Science & Technology, Deemed University under MHRD Govt. of India, Nirjuli, Arunachal Pradesh, India
     

   Subscribe/Renew Journal


The sensor nodes in a wireless sensor network are scattered in an area so as to sense, process and transmit information in an environment. Due to several factors such as the range of radio transmission in the network, skeptical communication and abandoned nature of sensor nodes as well as easy access to the network, wireless sensor network is prone to numerous security threats. In this paper, we will highlight various security attacks and their effect on the wireless sensor network. Furthermore these security attacks are classified into several categories as well as the mechanisms to detect and prevent these attacks are also discussed.

Keywords

Wireless Sensor Network, Security Attacks.
Subscription Login to verify subscription
User
Notifications
Font Size


  • U. Sharma, and N. Bahl, “A review on security issues and attacks in wireless sensor network,” International Journal of Advanced Research in Computer Science, vol. 8, no. 4, pp. 387-391, May 2017.
  • R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah, and K. N. Qureshi, “Security issues and attacks in wireless sensor network,” World Applied Sciences Journal, vol. 30, no. 10, pp. 1224-1227, 2014.
  • H. Chawla, H. Kaur, and C. Kaur, “Review on security issues in wireless sensor networks,” International Journal of Current Engineering and Technology, vol. 6, no. 3, pp. 942-948, June 2016.
  • A. Singh, and K. Gupta, “Review of security issues in mobile wireless sensor networks,” Int. J. Advanced Networking and Applications,vol. 7, no. 5, pp. 2887-2892, 2016.
  • Pooja, and R. K. Chauhan, “Review on security attacks and countermeasures in wireless sensor networks,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, pp. 1275-1283, May-June 2017.
  • K. Chelli, “Security issues in wireless sensor networks: Attacks and countermeasures,” Proceedings of the World Congress on Engineering, vol. 1, WCE, London, U.K., July 1-3, 2015.
  • L. Kaur, and J. Malhotra, “Review on security issues and attacks in wireless sensor networks,” International Journal of Future Generation Communication and Networking, vol. 8, no. 4, pp. 81-88, 2015.
  • S. K. Singh, M. P. Singh, and D. K. Singh, “A survey on network security and attack defense mechanism for wireless sensor networks,” International Journal of Computer Trends and Technology, vol. 1, no. 2, pp. 131-139, May to June Issue, 2011.
  • P. Maidamwar, and N. Chavhan, “A survey on security issues to detect wormhole attack in wireless sensor network,” International Journal on AdHoc Networking Systems (IJANS), vol. 2, no. 4, pp. 37-50, Oct. 2012.
  • V. B. Srinivas, and S. Umar, “Spoofing attacks in wireless sensor networks,” IJCSET, vol. 3, no. 6, pp. 201-210, June 2013.
  • M. Wazid, A. Katal, R. S. Sachan, R. H. Goudar, and D. P. Singh, “Detection and prevention mechanism for blackhole attack in wireless sensor network,” International Conference on Communication and Signal Processing, pp. 576-581, April 3-5, 2013.
  • B. K. Mishra, M. C. Nikam, and P. Lakkadwala, “Security against black hole attack in wireless sensor network: A review,” Fourth International Conference on Communication Systems and Network Technologies, pp. 615-620, 2014.
  • Y. Liu, M. Dong, K. Ota, and A. Liu, “ActiveTrust: Secure and trustable routing in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 2013-2027, September 2016.
  • M. Michal´ık, “Base station for wireless sensor network,” Diploma Thesis, Masarykova Univerzita, Fakulta Informatiky, autumn 2013.
  • K. S. Yadav, and M. Tamboli, “Defending against path-based denial of service attack in wireless sensor network,” International Conference on Examination in Modern Technology and Engineering (ICEMTE), vol. 5, no. 3, pp. 46-51, 2017.
  • J. Deng, R. Han, and S. Mishra, “Countermeasures against traffic analysis attacks in wireless sensor networks,” Computer Science Department, University of Colorado at Boulder, Colorado, USA.
  • S. Hadim, and N. Mohamed, “Middleware: Middleware challenges and approaches for wireless sensor networks,” IEEE Distributed Systems Online, vol. 7, no. 3, March 2006, art. no. 0603-o3001.
  • H.-N. Dai, Q. Wang, D. Li, and Raymond Chi-Wing Wong, “On eavesdropping attacks in wireless sensor networks with directional antennas,” International Journal of Distributed Sensor Networks, vol. 9, no. 8, 2013.
  • C. D. Devi, and B. Santhi, “Study on security protocols in wireless sensor networks,” International Journal of Engineering and Technology (IJET), vol. 5, no. 1, pp. 200-207, Feb-March 2013.
  • K. Shabana, N. Fida, F. Khan, S. R. Jan, and M. U. Rehman, “Security issues and attacks in wireless sensor networks,” International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), vol. 5, no. 7, pp. 81-87, July 2016.
  • V. Soni, P. Modi, and V. Chaudhri, “Detecting sinkhole attack in wireless sensor network,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, no. 2, pp. 29-32, Feb. 2013.
  • T.-G. Lupu, “Main types of attacks in wireless sensor networks,” 9th WSEAS International Conference on Signal, Speech and Image Processing, and 9th WSEAS International Conference on Multimedia, Internet & Video Technologies, pp. 180-185, Budapest, Hungary, 2009.
  • S. Kaplantzis, A. Shilton, N. Mani, and Y. Ahmet S¸ekercio˘glu, “Detecting selective forwarding attacks in wireless sensor networks using support vector machines,” Electrical and Computer Systems Engineering, pp. 335-340, Monash University Clayton, Victoria 3800, Australia.
  • G. Singh, “Security attacks and defense mechanisms in Wireless sensor network: A survey,” IJISET - International Journal of Innovative Science, Engineering & Technology, vol. 3 Issue 4, pp. 129-136, April 2016.
  • R. Shree, and R. A. Khan, “Wormhole attack in wireless sensor network,” International Journal of Computer Networks and Communications Security, vol. 2, no.1, pp. 22-26, Jan. 2014.
  • Y. Xu, G. Chen, J. Ford, and F. Makedon, “Detecting wormhole attacks in wireless sensor networks published in critical infrastructure protection,” Edited by E. Goetz and S. Shenoi, International Federation for Information Processing, a Springer Series in Computer Science, pp. 267-279, 2008.
  • A. Mpitziopoulos, D. Gavalas, and G. Pantziou, “Defending wireless sensor networks from jamming attacks,” The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’07), Athens, Greece, 2007.
  • M. Bendjima, and M. Feham, “Wormhole attack detection in wireless sensor networks,” SAI Computing Conference, July 13-15, London, UK, 2016.
  • R. Singh, J. Singh, and. R. Singh, “Hello flood attack countermeasures in wireless sensor networks,” International Journal of Computer Science and Mobile Applications, vol. 4, no. 5, pp. 1-9, May 2016.
  • A. Dubey, D. Meena, and S. Gaur, “A survey in hello flood attack in wireless sensor networks,” International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 1, pp. 1882-1887, Jan. 2014
  • D. Buch, and D. C. Jinwala, “Denial of service attacks in wireless sensor networks,” International Conference on Current Trends in Technology, Nuicone, December 2010.
  • S. Patil, and S. Chaudhari, “Dos attack prevention technique in wireless sensor networks,” 7th International Conference on Communication, Computing and Virtualization, vol. 79, pp. 715-721, 2016, Mumbai, India.
  • G. W. Kibirige, and C. Sanga, “A survey on detection of sinkhole attack in wireless sensor network,” Department of Informatics, vol. 13, no. 5, pp. 1-9, May 2015.
  • B. Yu, and B. Xiao, “Detecting selective forwarding attacks in wireless sensor networks,” 20th International Conference on Parallel and Distributed Processing, Rhodes Island, Greece, 2006.

Abstract Views: 327

PDF Views: 9




  • Security Issues in Wireless Sensor Network

Abstract Views: 327  |  PDF Views: 9

Authors

Moirangthem Marjit Singh
Department of Computer Science & Engineering, North Eastern Regional Institute of Science & Technology, Deemed University under MHRD Govt. of India, Nirjuli, Arunachal Pradesh, India
Nishigandha Dutta
Department of Computer Science & Engineering, North Eastern Regional Institute of Science & Technology, Deemed University under MHRD Govt. of India, Nirjuli, Arunachal Pradesh, India

Abstract


The sensor nodes in a wireless sensor network are scattered in an area so as to sense, process and transmit information in an environment. Due to several factors such as the range of radio transmission in the network, skeptical communication and abandoned nature of sensor nodes as well as easy access to the network, wireless sensor network is prone to numerous security threats. In this paper, we will highlight various security attacks and their effect on the wireless sensor network. Furthermore these security attacks are classified into several categories as well as the mechanisms to detect and prevent these attacks are also discussed.

Keywords


Wireless Sensor Network, Security Attacks.

References