An Analysis of Wireless Sensor Network Attack Classification
Abstract
Major importance of the security is Wireless Sensor Networks (WSNs). Wireless environments give more design challenges due to unreliable casual communication. WSNs contains the huge interest to propose security solutions for civilian and military applications. This quantifies the attack’s potential impact when it is constrained to stay hidden from the detector. In this paper, we present challenges of security, and classification of attacks in WSNs.
Keywords
Full Text:
PDFReferences
Bárász, Mihály, et al. "Passive attack against the M2AP mutual authentication protocol for RFID tags." Proc. of First International EURASIP Workshop on RFID Technology. 2007.
Bysani, Leela Krishna, and Ashok Kumar Turuk. "A survey on selective forwarding attack in wireless sensor networks." 2011 International Conference on Devices and Communications (ICDeCom). IEEE, 2011.
David Boyle, Thomas Newe, “Securing Wireless Sensor Networks: Security Architectures”, Journal of networks, Volume 3, No. 1, 2008.
Dhulkar, Ruchita, Ajit Pokharkar, and Mrs Rohini Pise, “Survey on different attacks in Wireless Sensor Networks and their prevention system”, 2015
https://www.researchgate.net/publication/311328870_A_SURVEY_OF_NODE_CAPTURE_ATTACKS_IN_WIRELESS_SENSOR_NETWORKS
Kahina CHELLI, 2015, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering 2015 Vol I WCE 2015, July 1 - 3, 2015, London, U.K.
Kavitha, C., “A survey on secured routing protocols for wireless sensor network”, In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), pp. 1-8, 2012.
Kumar, Vikash, Anshu Jain, and P. N. Barwal. "Wireless sensor networks: security issues, challenges and solutions." International Journal of Information and Computation Technology (IJICT) 4.8 (2014): 859-868.
Mahmood, Ahmed R., Hussein H. Aly, and Mohamed N. El-Derini, “Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks”, 2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), pp. 38-45, 2011.
Ming Hu, Randy K. Smith, Phillip G. Bradford, “Security for Fixed Sensor Networks”, ACMSE ’04, ACM, 2004, pp. 212-213.
Mohamed-Lamina Messiah “Classification of Attacks in Wireless Sensor Network” International Congress on Telecommunication and Application’14 University of A.MIRA Berjaya, Algeria, 23-24 APRIL 2014
Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv: 0909.0576 (2009).
Perrig, J. Newsome, E. Shi, D. Song: The Sybil Attack in Sensor Networks: Analysis and Defences, 3rd Int. Symposium on Information Processing in Sensor Networks 2004 (ACM Press, New York, USA 2004) pp. 259–268
Shet, N. S. V., K. Chandrasekaran, and K. C. Shet. "Implementation of Connectivity and Handover through Wireless Sensor Node based Techniques." arXiv preprint arXiv: 1001.5339 (2010).
V.C. Manju, "A Survey on Wireless Sensor Network Attacks", International Journal of Engineering and Innovative Technology Vol. 2, (2012)
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.