Open Access Open Access  Restricted Access Subscription or Fee Access

An Analysis of Wireless Sensor Network Attack Classification

D. Spirjakin

Abstract


Major importance of the security is Wireless Sensor Networks (WSNs). Wireless environments give more design challenges due to unreliable casual communication. WSNs contains the huge interest to propose security solutions for civilian and military applications. This quantifies the attack’s potential impact when it is constrained to stay hidden from the detector. In this paper, we present challenges of security, and classification of attacks in WSNs.


Keywords


Wireless Security, Attacks, Sensor Attacks.

Full Text:

PDF

References


Bárász, Mihály, et al. "Passive attack against the M2AP mutual authentication protocol for RFID tags." Proc. of First International EURASIP Workshop on RFID Technology. 2007.

Bysani, Leela Krishna, and Ashok Kumar Turuk. "A survey on selective forwarding attack in wireless sensor networks." 2011 International Conference on Devices and Communications (ICDeCom). IEEE, 2011.

David Boyle, Thomas Newe, “Securing Wireless Sensor Networks: Security Architectures”, Journal of networks, Volume 3, No. 1, 2008.

Dhulkar, Ruchita, Ajit Pokharkar, and Mrs Rohini Pise, “Survey on different attacks in Wireless Sensor Networks and their prevention system”, 2015

https://www.researchgate.net/publication/311328870_A_SURVEY_OF_NODE_CAPTURE_ATTACKS_IN_WIRELESS_SENSOR_NETWORKS

Kahina CHELLI, 2015, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering 2015 Vol I WCE 2015, July 1 - 3, 2015, London, U.K.

Kavitha, C., “A survey on secured routing protocols for wireless sensor network”, In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), pp. 1-8, 2012.

Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless sensor networks: security issues, challenges and solutions." International Journal of Information and Computation Technology (IJICT) 4.8 (2014): 859-868.

Mahmood, Ahmed R., Hussein H. Aly, and Mohamed N. El-Derini, “Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks”, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 38-45, 2011.

Ming Hu, Randy K. Smith, Phillip G. Bradford, “Security for Fixed Sensor Networks”, ACMSE ’04, ACM, 2004, pp. 212-213.

Mohamed-Lamina Messiah “Classification of Attacks in Wireless Sensor Network” International Congress on Telecommunication and Application’14 University of A.MIRA Berjaya, Algeria, 23-24 APRIL 2014

Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv: 0909.0576 (2009).

Perrig, J. Newsome, E. Shi, D. Song: The Sybil Attack in Sensor Networks: Analysis and Defences, 3rd Int. Symposium on Information Processing in Sensor Networks 2004 (ACM Press, New York, USA 2004) pp. 259–268

Shet, N. S. V., K. Chandrasekaran, and K. C. Shet. "Implementation of Connectivity and Handover through Wireless Sensor Node based Techniques." arXiv preprint arXiv: 1001.5339 (2010).

V.C. Manju, "A Survey on Wireless Sensor Network Attacks", International Journal of Engineering and Innovative Technology Vol. 2, (2012)


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.