A Study on Security Attacks in Wireless Sensor Network

Author(s):  
Rajwinder Kaur ◽  
Jasminder Kaur Sandhu
2018 ◽  
Vol 7 (2.4) ◽  
pp. 153
Author(s):  
Harkesh Sehrawat ◽  
Yudhvir Singh ◽  
Vikas Siwach

A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sinkhole attack is one of the security attacks which try to disturb the ongoing communication in wireless sensor network. In sinkhole attack, the intruder or the malicious node try to attract the network traffic towards itself, that sensor nodes will pass data packets through this compromised node thereby manipulating messages which sensor nodes are transferring to the base station. In this paper we analyze the impact of Sinkhole attack on AODV protocol under various conditions. We analyzed the impact of Sinkhole attack on AODV protocol with varying number of attacker nodes.  


The nodes are often placed in a hostile or dangerous environment so WSN will be vulnerable to security attacks. Attacks can be active or passive. Passive attack involves unauthorized attackers who listen to the communication channel and monitor its activities. In active attack, the unauthorized attacker’s listens, monitors and alters the data passing through the communication channel. To address security concerns, cryptography approach has been adopted but this alone cannot cope with some of the routing attacks. As sensor devices are resource constrained, existing cryptography approach may not be applicable, due to the computational complexities that it involves [1] [3]. Hence, author present energy efficient trust based routing strategy, which is a viable alternative for WSN


Author(s):  
Karishma Dobhal ◽  
Rohan Varma ◽  
Varun Barthwal ◽  
M.M.S. Rauthan

Wireless Sensor Network is organized by arranging a huge number of sensor nodes in a region to the investigation of normally remote locations. A Wireless sensor network contains various applications such as landslide detec­tion, automotive application, health, noise level, environmental, vehicular movement, and battlefield. A Sensor node has different components to complete the work for sensing the data, transmitting, and processing the data into the network. Security is a very challenging issue in the WSNs. Various security threats and attacks may affect or damage the functioning (activity) of these networks. Attack divided the main two types active and passive.  This paper focuses on several security attacks like Blackhole, fabrication, Sybil, DoS, sinkhole, wormhole, flood­ing. We have also explained security protocols are 3 categories.  Data-Centric, Geographic, and hierarchical pro­tocol. Other are SPIN, LiSP, LEDs, LLSP, LEACH protocols. We explain the term attack threat, vulnerabilities, and security requirements.


2016 ◽  
Vol 78 (4-3) ◽  
Author(s):  
Raja Waseem Anwar ◽  
Majid Bakhtiari ◽  
Anazida Zainal ◽  
Kashif Naseer Qureshi

The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic. Sinkhole and Blackhole attacks are very common attacks in network, where an attacker advertises un-authorized routing update in network. To deal with these types of attacks, there is a need to tighten the network security and prevent from attackers. In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. The simulation results illustrated that, how these attacks affect the network performance. 


2020 ◽  
Vol 8 (5) ◽  
pp. 1411-1414

Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces high end- to- end delay in the network. A novel technique for detection of misdirection attack in WSN without using cluster heads is proposed in the paper. The proposed detection technique has been implemented using Omnetpp 5.4.1 on four different network scenarios (10, 20, 30, and 40 numbers of nodes) and varying number of malicious nodes. The results of simulation shows that the proposed technique delivers better detection rate with reduced end- to- end delay compared to the detection method which uses cluster heads.


Sign in / Sign up

Export Citation Format

Share Document