CFP last date
20 May 2024
Reseach Article

A Survey on Attacks of WSN and their Security Mechanisms

by Kanchan Kaushal, Taranvir Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 18
Year of Publication: 2015
Authors: Kanchan Kaushal, Taranvir Kaur
10.5120/20842-3437

Kanchan Kaushal, Taranvir Kaur . A Survey on Attacks of WSN and their Security Mechanisms. International Journal of Computer Applications. 118, 18 ( May 2015), 1-4. DOI=10.5120/20842-3437

@article{ 10.5120/20842-3437,
author = { Kanchan Kaushal, Taranvir Kaur },
title = { A Survey on Attacks of WSN and their Security Mechanisms },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 18 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number18/20842-3437/ },
doi = { 10.5120/20842-3437 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:01.453985+05:30
%A Kanchan Kaushal
%A Taranvir Kaur
%T A Survey on Attacks of WSN and their Security Mechanisms
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 18
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

WSNs perform an important role in many applications, such as battlefields surveillance, patient health monitoring, home automation, traffic control, environmental observation and building intrusion surveillance. WSNs are convenient, cost effective, and give ease of integration with other networks and their components. However, wireless technology also creates new threats. Since WSNs communicate by using radio frequencies therefore the risk of interference is more than with wired networks. If the message to be passed is not in an encrypted form, or is encrypted by using a weak algorithm, the attacker can read it, and it is the compromise to the confidentiality. Security objectives include: protecting confidentiality, assuring integrity, providing authentication and supporting availability of the information and information systems. In this paper we describe the types of existing security threats and how existing techniques can be used to prevent or mitigate these attacks in WSNs.

References
  1. T. Roosta, S. Shieh, S. Sastry, "Taxonomy of Security Attacks in Sensor Networks", 1st IEEE Int. Conference on System Integration and Reliability Improvements, , Hanoi (2006) pp. 13–15, 2006. .
  2. A. Perrig, J. Newsome, E. Shi, D. Song , "The Sybil Attack in Sensor Networks: Analysis and Defences", 3rd Int. Symposium on Information Processing in Sensor Networks , (ACM Press, New York, USA 2004) pp. 259–268, 2004.
  3. J. Deng, R. Han, S. Mishra "Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks", First IEEE/Cerate Net Conference on Security and Privacy in Communication Networks (SecureComm), Athens (2005) pp. 113–124, 2005.
  4. K. Gandol, C. Mourtel, F. Olivier, "Electromagnetic Analysis: Concrete Results", Published in C_ . K. Ko_c, D. Naccache, and C. Paar, Eds Cryptographic Hardware and Embedded Systems { CHES 2001, vol. 2162 of Lecture Notes in Computer Science, pp. 251{261, Springer-Verlag, 2001.
  5. Jennifer Yick, Biswanath Mukherjee, and Deepak Ghosal, "Wireless sensor network survey," Computer Networks, vol. 52, pp. 2292-2330, Elsevier, April 2008.
  6. Kalpana Sharma, M K Ghose, "Wireless Sensor Networks: An Overview on its Security Threats", IJCA Special Issue on "Mobile Ad-hoc Networks" MANETs, 2010.
  7. Ahmad Abed, Alhameed Alkhatib, and Gurvinder Singh Baicher "Wireless Sensor Network Architecture," International Conference on Computer Networks and Communication Systems, IPCSIT, vol. 35, 2012.
  8. Vikash Kumar, Anshu Jain and P N Barwal, "Wireless Sensor Networks: Security Issues, Challenges and Solutions", International Journal of Information & Computation Technology, ISSN 0974-2239 Vol 4, No 8, pp. 859-868, 2014.
  9. Anthony D. Wood and John A. Stankovic, "A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks", Unpublished.
  10. Y. -C. Hu, A. Perrig, D. B. Johnson: Adriane: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Annual ACM Int. Conference on Mobile Computing and Networking (MobiCom) 2002.
  11. Ju young Kim, Ronnie D. Caytiles, Kyung Jung Kim, "A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks", Journal of Security Engineering.
  12. K. Kifayat, M. Merabti, Q. Shi, D. Llewellyn-Jones: Group-based secure communication for large scale wireless sensor networks, J. Information Assurance Security. Vol 2, 139–147, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Network security Attacks on WSN Security mechanisms prevention of attacks from security threats.