A Comprehensive Comparison of Attacks in Wireless Sensor Networks
Abstract
Wireless Sensor Networks (WSNs) are vulnerable to different kinds of attacks and most of traditional networks security techniques are unusable on WSNs; due to untrusted transmissions, deployment in open and hostile environments, unattended nature and limited resources. So, security is a vital and complex requirement for these networks. This paper focuses on security of WSNs and its main purpose is discussing on WSNs' attacks in different layers, including of physical layer attacks, link layer attacks, routing layer attacks, transport layer attacks and application layer attacks. It classifies and compares different attacks based on their nature and goals; i.e. this paper is expressing purpose and capabilities of attackers and it is presenting goals and result of different attacks on WSNs.
Keywords
Full Text:
PDFReferences
J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier's Computer Networks Journal, 52, 2292-2330; 2008.
I. Akyildiz, W. Su, Y. Sankarasubramania and E. Cayirci; A Survey On Sensor Networks; IEEE Communications Magazine, Vol. 40, No. 8, pp. 102–116; 2002.
D.Thakral and N.Dureja; A Review on Security Issues in Wireless Sensor Networks; International Journal of Advanced Research in Computer Science and Software Engineering; Vol. 2, Issue 7; 2012.
W. Znaidi, M. Minier and J. P. Babau; An Ontology for Attacks in Wireless Sensor Networks; INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE (INRIA); 2008.
K. Sharma and M. K. Ghose; Wireless Sensor Networks: An Overview on its Security Threats; IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs; 2010.
K. Xing, S. Sundhar, R. Srinivasan, M. Rivera, J. Li and X. Cheng; Attacks and Countermeasures in Sensor Networks: A Survey; Springer, Network Security; 2005.
T. A. Zia; A Security Framework for Wireless Sensor Networks; Doctor of Philosophy Thesis; The School of Information Technologies, University of Sydney; 2008.
G.padmavathi and D.Shanmugapriya; A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks; International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1; 2009.
Y. Zhou, Y. Fang and Y. Zhang; Security Wireless Sensor Networks: A Survey; IEEE Communication Surveys; 2008.
Y. Wang, G. Attebury and B. Ramamurthy; A Survey of Security Issues in Wireless Sensor Networks; IEEE Communication Surveys; 2006.
T. Kavitha and D. Sridharan; Security Vulnerabilities in Wireless Sensor Networks: A Survey; Journal of Information Assurance and Security; 2009.
A. Perrig, J. Stankovic and D. Wagner; Security in Wireless Sensor Networks; In Communications of the ACM Vol. 47, No. 6, 2004.
S.Mohammadi and H.Jadidoleslamy; A Comparison of Physical Attacks on Wireless Sensor Networks; International Journal of Peer to Peer Networks (IJP2P), Vol.2, No.2, pp. 24-42; 2011.
W. Xu, K. Ma, W. Trappe and Y. Zhang; Jamming Sensor Networks: Attack and Defense Strategies; IEEE Network; 2006.
J. Deng, R. Han and S. Mishra; Defending against Path-based DoS Attacks in Wireless Sensor Networks; in SASN ’05: Proceeding 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks; 2005.
S.Mohammadi, R.A.Ebrahimi and H.Jadidoleslamy; A Comparison of Link Layer Attacks on Wireless Sensor Networks; international Journal of Information Security (JIS), Vol. 2, No. 2, pp. 69-84; 2011.
S.Mohammadi, R.A.Ebrahimi and H.Jadidoleslamy; A Comparison of Routing Attacks on Wireless Sensor Networks; International Journal of Information Assurance and Security (JIAS), Vol. 6, pp. 195-215; 2011.
C. Karlof and D. Wagner; Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures; Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols; 2003.
Y.Hu, A.Perrig and D.B.Johnson; Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols; Carnegie Mellon University; Rice University; San Diego, California, USA; 2003.
A. Saini and H. Kumar; Comparison between Various Black Hole Detection Techniques in MANET; National Conference on Computational Instrumentation (NCCI); 2010.
I. Ullah and S. U. Rehman; Analysis of Black Hole attack On MANETs Using Different MANET Routing Protocols; Master Thesis, Electrical Engineering, Thesis no: MEE-2010-2698; School of Computing Blekinge Institute of Technology, Sweden; 2010.
R. Maheshwari, J. Gao and S. R. Das; Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information; IEEE INFOCOM; 2007.
C. Tumrongwittayapak and R. Varakulsiripunth; Detecting Sinkhole Attacks in Wireless Sensor Networks; ICROS-SICE International Conference; 2009.
J. R. Douceur; the Sybil Attack; Proceeding 1st ACM Int’l. Workshop Peer-to-Peer Systems; 2002.
S.Mohammadi and H.Jadidoleslamy; A Comparison of Transport and Application Layers Attacks on Wireless Sensor Networks; International Journal of Information Assurance and Security (JIAS), Vol.6, pp. 331-345; 2011.
Refbacks
- There are currently no refbacks.