CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Analysis of Security Requirements, Attacks and Vulnerabilities at Transport Layer in Wireless Sensor Networks

by Sunil Ghildiyal, Anupam Semwal, Jainendra Singh Rana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 137 - Number 8
Year of Publication: 2016
Authors: Sunil Ghildiyal, Anupam Semwal, Jainendra Singh Rana
10.5120/ijca2016908853

Sunil Ghildiyal, Anupam Semwal, Jainendra Singh Rana . Analysis of Security Requirements, Attacks and Vulnerabilities at Transport Layer in Wireless Sensor Networks. International Journal of Computer Applications. 137, 8 ( March 2016), 13-16. DOI=10.5120/ijca2016908853

@article{ 10.5120/ijca2016908853,
author = { Sunil Ghildiyal, Anupam Semwal, Jainendra Singh Rana },
title = { Analysis of Security Requirements, Attacks and Vulnerabilities at Transport Layer in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 137 },
number = { 8 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume137/number8/24294-2016908853/ },
doi = { 10.5120/ijca2016908853 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:37:48.969036+05:30
%A Sunil Ghildiyal
%A Anupam Semwal
%A Jainendra Singh Rana
%T Analysis of Security Requirements, Attacks and Vulnerabilities at Transport Layer in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 137
%N 8
%P 13-16
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For about last two decades research and development processes in area of Electronics and Sensors have resulted as significant advancements in electronics and technology, small size, cost effectiveness have resulted sensor nodes as crucial part of real world problem solution applications. The wireless sensor nodes are spread over an area to record the facts of situations like fire, flood and then forward same to meaningful data to the a node, which is generally cluster head node for calculations, resulting an alert to take necessary measures to control the situation. In last few years, WSN have increased significantly in variety of areas and applications, resulted the contemporary demand of high, consistent security mechanism. Also, there is variety of attacks on WSN at their different layers. These tiny, low processing sensor nodes are not strong enough in terms of power, handling attack issues etc. On other hand, applications based on these sensors demand on-time streamed data or information is to be collected and then to send same on a reliable, secure delivery mechanism. Tiny sensors with limited hardware, processing are not able to afford old and in practice security protocols or algorithms to face or sustain the attacks. Many attacks impact WSNs. at their different layers an affect sensor’s roles like signaling, framing, transmission etc. Many attacks have been identified at each layer of WSN which are intended, pre-planned attacks to obstacle the availability of service, restricting the sensor node’s utilization in solution of a for problem. This paper is mainly focused on WSN structure, threats, attacks and security requirements and security measures against attacks; especially various types of attacks starting from physical layer and data link, network layers, subsequently and particularly variety of attacks at transport layer in details with some effective suggestions as prevention or protection against those attacks.

References
  1. D. K. Chaitanya “Analysis of DoS attacks on WSN using simulation” Middlesex University.
  2. Ritu Sharma et. al. “Analysis of security protocols in wireless sensor networks” Int. Journal Advanced Networking and Applications Vol 02, Issue 03.
  3. Deepak Ganesan et al. “ Parallel and Distributed Computing issues in WSN”, Journal of Parallel and Distri.Computing, Volume 64, Issue 7, July 2004
  4. Horst Hellbruck, Max Pagely, Alexander Krollery “Using and Operating Wireless Sensor Network Testbeds with WISEBED” 2011 The 10th.IFIP Annual Mediterranean Ad hoc Networking Workshop
  5. Hemanta Kumar kalitha and Avijit Kar “Wireless Sensor Network Security Analysis” IJNGN Vol 1, Dec 2009
  6. T. Kavitha, D. Sridharan “Security Vulnerabilities in wireless Sensor Networks” IJAS 5 (2010) 031-44
  7. Tahir Naeem et.al. Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks, International Journal of Digital Content Technology and its Applications, Page 89-90 Volume 3, Number 1, year 2009.
  8. John Paul Walters et. al. “Wireless Sensor Network Security: A Survey”, Security in Distributed, Grid and Pervasive Computing Yang Xiao (Eds), Page3-5, 10-15, year 2006
  9. Wood, A. D. and Stankovic, J.A. (2002) “ Denial of Service in Sensor Networks” IEEE Computer, vol. 35, no. 10, 2002, pp 54–62.
  10. Raymond, D. R. and Midkiff, S. F. (2008) “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses” IEEE Pervasive Computing, January-March 2008, pp 74-81.
  11. Xu, W., Trappe, W., Zhang, Y., and Wood, T. “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks’ ACM MobiHoc’05, May 25–27, 2005, Urbana-Champaign, Illinois, USA, pp 46-57.
  12. Anthony D. Wood, John A. Stankovic “ Denial of Service in Sensor networks” University of Virginia 0018-9162/02/$17.00 ©2002 IEEE
  13. Prabhudutta mohanty, Sangram Panigrahi, Nityananda sarma and siddhartha sankar satapathy “Security issues in WSN: a survey” Int. Journal of Theoretical and Applied Information Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Security Processing Attack Bandwidth Vulnerabilities Networks