The Relative performance of Security protocols and attacks in Wireless Sensor Network
Wireless Sensor Network is organized by arranging a huge number of sensor nodes in a region to the investigation of normally remote locations. A Wireless sensor network contains various applications such as landslide detection, automotive application, health, noise level, environmental, vehicular movement, and battlefield. A Sensor node has different components to complete the work for sensing the data, transmitting, and processing the data into the network. Security is a very challenging issue in the WSNs. Various security threats and attacks may affect or damage the functioning (activity) of these networks. Attack divided the main two types active and passive. This paper focuses on several security attacks like Blackhole, fabrication, Sybil, DoS, sinkhole, wormhole, flooding. We have also explained security protocols are 3 categories. Data-Centric, Geographic, and hierarchical protocol. Other are SPIN, LiSP, LEDs, LLSP, LEACH protocols. We explain the term attack threat, vulnerabilities, and security requirements.