CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks

by G. Santhi, R. Sowmiya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 7
Year of Publication: 2017
Authors: G. Santhi, R. Sowmiya
10.5120/ijca2017912972

G. Santhi, R. Sowmiya . A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks. International Journal of Computer Applications. 159, 7 ( Feb 2017), 7-11. DOI=10.5120/ijca2017912972

@article{ 10.5120/ijca2017912972,
author = { G. Santhi, R. Sowmiya },
title = { A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 7 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number7/27011-2017912972/ },
doi = { 10.5120/ijca2017912972 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:05:06.951403+05:30
%A G. Santhi
%A R. Sowmiya
%T A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 7
%P 7-11
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For past few years, more interest has been focused on Wireless Sensor Networks (WSN) due to its wide range of applications in various fields. The WSNs are mainly used for sensing the pollution, monitoring the traffic; secure homeland, hospitals, military etc. There are possibilities of attacks in Wireless Sensor networks. Due to these attacks, there is possibility of loss of information. To avoid the data loss and for secure transmission of data, several countermeasures have been introduced. The main focus of this paper is to provide a detailed survey on various attacks and the countermeasures employed to safeguard the network from malicious attacks.

References
  1. Daniel E. Burgner , Luay A, “Wahsheh "Security of Wireless Sensor Networks”, Eighth International Conference on Information Technology: New Generations, 2011.
  2. Abhishek Jain, Kamal Kant and M. R. Tripathy, “Security Solutions for Wireless Sensor Networks”, Second International Conference on Advanced Computing & Communication Technologies, 2012.
  3. Kahina CHELLI, 2015, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering 2015 Vol I WCE 2015, July 1 - 3, 2015, London, U.K.
  4. Dhulkar, Ruchita, Ajit Pokharkar, and Mrs Rohini Pise, “Survey on different attacks in Wireless Sensor Networks and their prevention system”, 2015.
  5. David Martins, and Herve Guyennet, “Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey”, IEEE, 2010.
  6. Hu YC, Perrig A, Johnson DV,” Wormhole attacks in Wireless Networks”, IEEE journal on selected areas in communications, 370-380, 2006.
  7. Magotra, Shikha, and Kush Kumar,” Detection of HELLO flood attack on LEACH protocol”, IEEE International Advance Computing Conference (IACC), 2014.
  8. David R. Raymond and Scott F. Midkiff, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses”, IEEE Pervasive Computing, Vol. 7, No. 1, pp. 74-81, 2008.
  9. Newsome J, Shi E, Song D, Perrig A, “Sybil attacks in sensor networks: analyses and defences”, Third International symposium on Information processing in sensor networks, 259-268, 2004.
  10. Mahmood, Ahmed R., Hussein H. Aly, and Mohamed N. El-Derini, “Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks”, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 38-45, 2011.
  11. Wang X,Gu W. Schosek K, Chellapan S, Xuan D, “Sensor Network configuration under physical attacks”, ICCNMC, lecture notes in computer science, Springer, vol.3619, 23-32, 2005.
  12. Mohammadi, Shahriar, and Hossein Jadidoleslamy, “A comparison of link layer attacks on wireless sensor networks”, arXiv preprint arXiv:1103.5589, 2005.
  13. Yanli Yu, Keqiu Li, Wanlei Zhou, and Ping Li, “Trust mechanisms in wireless sensor networks: attack analysis and countermeasures,” Journal of Network and Computer Applications, Elsevier, 2011.
  14. Karlof C, Wagner D, “Secure routing in Wireless Sensor Networks: Attacks and Countermeasures”, Adhoc networks, 293-395, 2003.
  15. Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE, “SPINS: Security protocols for sensor networks, Wirless Networks”, 521-534, 2002.
  16. Kavitha, C., “A survey on secured routing protocols for wireless sensor network”, In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), pp. 1-8, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Network attacks Security challenges Secure routing protocols