Attacks in Wireless Sensor Networks

Author(s):  
George William Kibirige ◽  
Camilius A. Sanga

Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.

2020 ◽  
pp. 1215-1232
Author(s):  
George William Kibirige ◽  
Camilius A. Sanga

Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.


Author(s):  
Lina M. Pestana Leão de Brito ◽  
Laura M. Rodríguez Peralta

As with many technologies, defense applications have been a driver for research in sensor networks, which started around 1980 due to two important programs of the Defense Advanced Research Projects Agency (DARPA): the distributed sensor networks (DSN) and the sensor information technology (SensIT) (Chong & Kumar, 2003). However, the development of sensor networks requires advances in several areas: sensing, communication, and computing. The explosive growth of the personal communications market has driven the cost of radio devices down and has increased the quality. At the same time, technological advances in wireless communications and electronic devices (such as low-cost, low-power, small, simple yet efficient wireless communication equipment) have enabled the manufacturing of sensor nodes and, consequently, the development of wireless sensor networks (WSNs).


2012 ◽  
Vol 463-464 ◽  
pp. 261-265
Author(s):  
Fei Hui ◽  
Xiao Le Wang ◽  
Xin Shi

In this paper, hazardous materials transportation monitoring system is designed, implemented, and tested using Wireless Sensor Networks (WSNs). According to energy consumption and response time during clustering of Wireless Sensor Networks LEACH (Low Energy Adaptive Clustering Hierarchy) routing protocol, we proposed STATIC-LEACH routing protocol based on static clustering, it can effectively reduce energy consumption of the wireless sensor nodes and reduce network latency of cluster. With WSN and GSM/GPRS, low cost and easy deployment remote monitoring is possible without interfering with the operation of the transportation.


Aerospace ◽  
2006 ◽  
Author(s):  
Shashank Priya ◽  
Dan Popa ◽  
Frank Lewis

Wireless sensor networks (WSN) have tremendous potential in many environmental and structural health monitoring applications including, gas, temperature, pressure and humidity monitoring, motion detection, and hazardous materials detection. Recent advances in CMOS-technology, IC manufacturing, and networking utilizing Bluetooth communications have brought down the total power requirements of wireless sensor nodes to as low as a few hundred microwatts. Such nodes can be used in future dense ad-hoc networks by transmitting data 1 to 10 meters away. For communication outside 10 meter ranges, data must be transmitted in a multi-hop fashion. There are significant implications to replacing large transmission distance WSN with multiple low-power, low-cost WSN. In addition, some of the relay nodes could be mounted on mobile robotic vehicles instead of being stationary, thus increasing the fault tolerance, coverage and bandwidth capacity of the network. The foremost challenge in the implementation of a dense sensor network is managing power consumption for a large number of nodes. The traditional use of batteries to power sensor nodes is simply not scalable to dense networks, and is currently the most significant barrier for many applications. Self-powering of sensor nodes can be achieved by developing a smart architecture which utilizes all the environmental resources available for generating electrical power. These resources can be structural vibrations, wind, magnetic fields, light, sound, temperature gradients and water currents. The generated electric energy is stored in the matching media selected by the microprocessor depending upon the power magnitude and output impedance. The stored electrical energy is supplied on demand to the sensors and communications devices. This paper shows the progress in our laboratory on powering stationary and mobile untethered sensors using a fusion of energy harvesting approaches. It illustrates the prototype hardware and software required for their implementation including MEMS pressure and strain sensors mounted on mobile robots or stationary, power harvesting modules, interface circuits, algorithms for interrogating the sensor, wireless data transfer and recording.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zhe Wei ◽  
Shuyan Yu ◽  
Wancheng Ma

In view of the spatiotemporal limitations of traditional healthcare services, the use of wireless communication has become one of the main development directions for the medical system. Compared with the traditional methods, applying the potential and benefits of the wireless sensor networks has more advantages such as low cost, simplicity, and flexible data acquisition. However, due to the limited resources of the individual wireless sensor nodes, traditional security solutions for defending against internal attacks cannot be directly used in healthcare based wireless sensor networks. To address this issue, a negative binomial distribution trust with energy consideration is proposed in this study. The proposed method is lightweight and suitable to be operated on the individual healthcare sensors. Simulations show that it can effectively deal with the internal attacks while taking the energy saving into consideration.


Sensors ◽  
2019 ◽  
Vol 20 (1) ◽  
pp. 23 ◽  
Author(s):  
Hao Fu ◽  
Yinghong Liu ◽  
Zhe Dong ◽  
Yuanming Wu

In cluster-based wireless sensor networks, cluster heads (CHs) gather and fuse data packets from sensor nodes; then, they forward fused packets to the sink node (SN). This helps wireless sensor networks balance energy effectively and efficiently to prolong their lifetime. However, cluster-based WSNs are vulnerable to selective forwarding attacks. Compromised CHs would become malicious and launch selective forwarding attacks in which they drop part of or all the packets from other nodes. In this paper, a data clustering algorithm (DCA) for detecting a selective forwarding attack (DCA-SF) is proposed. It can capture and isolate malicious CHs that have launched selective forwarding attacks by clustering their cumulative forwarding rates (CFRs). The DCA-SF algorithm has been strengthened by changing the DCA parameters (Eps, Minpts) adaptively. The simulation results show that the DCA-SF has a low missed detection rate of 1.04% and a false detection rate of 0.42% respectively with low energy consumption.


2016 ◽  
Vol 2016 ◽  
pp. 1-9 ◽  
Author(s):  
Danyang Qin ◽  
Shuang Jia ◽  
Songxiang Yang ◽  
Erfu Wang ◽  
Qun Ding

Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS) is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.


2009 ◽  
Vol 10 (04) ◽  
pp. 459-479 ◽  
Author(s):  
SK. MD. MIZANUR RAHMAN ◽  
KHALIL EL-KHATIB

The nature of wireless communication makes it susceptible to a number of security threats, disclosing the identities of the communicating parties in the network. By revealing the identity of nodes in the network, outside parties can setup severe targeted attacks on specific nodes. Such targeted attacks are more harmful to sensor networks as sensing nodes (sensors) have limited computing and communication power prohibiting them from using robust security mechanisms. Anonymous communication is one of the key primitives for ensuring the privacy of communicating parties in a group or network. In this paper, we propose a novel secure anonymous communication protocol based on pairing over elliptic curves for wireless sensor networks (WSNs). Using this protocol, only the legitimate nodes in the sensor network can authenticate each other without disclosing their real identities. The proposed protocol is extremely efficient in terms of key storage space and communication overhead. Security analysis of our protocol shows that it provides complete anonymity for communicating nodes. The analysis also shows that the proposed protocol is robust against a number of attacks including the masquerade attack, wormhole attack, selective forwarding attack and message manipulation attack.


2018 ◽  
Vol 22 ◽  
pp. 01005
Author(s):  
Murat Dener

In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize time and vital objectives. While ensuring security, it is also necessary to consider other important criteria such as memory usage, energy and latency of Sensor Networks. In this study, encryption is described in Wireless Sensor Networks and Skipjack, XXTEA and AES encryption algorithms are compared using TOSSIM simulation program in TinyOS operating system considering memory usage, energy and delay criteria. The study is considered to be useful academicians who study security in Wireless Sensor Networks.


2012 ◽  
Vol 226-228 ◽  
pp. 1807-1810 ◽  
Author(s):  
Shou Zhi Huang ◽  
Xue Zeng Zhao

Wireless sensor networks (WSNs) based on ZigBee technology are currently popular low-energy, low-cost, short-distance communication technologies that can be applied in many areas, such as industry, environment, agriculture, etc. Energy efficiency is one of the most important research points for WSNs. In this paper, we analyze the existing WSNs protocols, especially LEACH, and propose an energy-efficient cluster head and router selecting protocol (EECRS). EECRS combines both cluster-based and energy-threshold routing protocols to balance the energy consumption of the sensor nodes in the whole network in order to extend the network lifetime. And through the simulation via NS2 software, it is shown that EECRS improves the network performance, network lifetime and data received per energy mount consumption, compared with LEACH protocol.


Sign in / Sign up

Export Citation Format

Share Document