scispace - formally typeset
Proceedings ArticleDOI

Security attacks in wireless sensor networks: A survey

Manish Patel, +1 more
- pp 329-333
TLDR
This paper discussed about all the attacks on wireless sensor networks, some of the mitigation schemes to defend these attacks, and how to defend against these attacks.
Abstract
Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.

read more

Citations
More filters
Journal ArticleDOI

Data Collection for Security Measurement in Wireless Sensor Networks: A Survey

TL;DR: An overview of WSNs is provided and classify the attacks in W SNs based on protocol stack layers and attack detection methods of eleven mainstream attacks are researched for WSN security measurement.
Journal ArticleDOI

Wearable Medical Sensor-Based System Design: A Survey

TL;DR: Various services, applications, and systems that have been developed based on WMSs are discussed and a list of desirable design goals that WMS-based systems should satisfy are suggested.
Journal ArticleDOI

Hierarchical routing protocols for wireless sensor network: a compressive survey

TL;DR: This survey focuses on the deep analysis of WSN hierarchical routing protocols and carefully chooses the most relevant state-of-the-art protocols in order to compare and highlight the advantages, disadvantage and performance issues of each routing technique.
Journal Article

Intrusion Detection System for Internet of Things

TL;DR: A Lightweight Intrusion Detection System to detect Hello flood attack and Sybil attack in IoT network is proposed.
Book ChapterDOI

IoT and Sensor Networks Security

TL;DR: The Wireless Sensor Network is paid to, which represents the most used sensors network in many domains such as Smart Home, providing an overview about its main technical challenges, attacks, and related countermeasures.
References
More filters
Proceedings ArticleDOI

Packet leashes: a defense against wormhole attacks in wireless networks

TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Proceedings ArticleDOI

The Sybil attack in sensor networks: analysis & defenses

TL;DR: It is demonstrated that the Sybil attack can be exceedingly detrimental to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, etc.
Proceedings Article

Using Directional Antennas to Prevent Wormhole Attacks.

TL;DR: A cooperative protocol whereby nodes share directional information to prevent wormhole endpoints from masquerading as false neighbors is presented, which greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.
Journal ArticleDOI

A survey on jamming attacks and countermeasures in WSNs

TL;DR: The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field.
Proceedings ArticleDOI

An RSSI-based scheme for sybil attack detection in wireless sensor networks

TL;DR: This work presents a robust and lightweight solution for sybil attack problem based on received signal strength indicator (RSSI) readings of messages and shows that even though RSSI is time-varying and unreliable in general and radio transmission is non-isotropic, it is feasible to overcome these problems.
Related Papers (5)