Attacks on WSN and its Limitations
DOI:
https://doi.org/10.26438/ijcse/v5i11.158161Keywords:
Authentication, Privacy, Sybil, Cryptographic Methodologies, Wireless Sensor Network, WSN, Sensor, Limitations, Sink Hole, Black Hole, Selective Forwarding AttackAbstract
In recent times Security has started to be the key factor in data transmission. Recent advances in networking and wireless sensing has enabled the discovery in networking and wireless sensing and has enabled the discovery of new algorithms and techniques for wireless sensor networks. A Wireless Sensor Network (WSN) comprises several sensor nodes such as magnetic, thermal, and infrared and the radar is setup in a particular geographical area. The capabilities of WSN include to manipulate and control the physical and environmental entities such as – humidity, temperature, sound, pressure, light etc. and pass this information to various other sensors present in the network in order to pass the information from the source to the sink. These wireless sensor networks have diverse applications ranging from medical care to military or educational purposes but these networks are also prone to many adversaries and attacks. Some of the most common attacks on a wireless sensor network are spoofing or replayed routing information. Certain techniques and algorithms have been introduced or developed which might not make a WSN attack-proof in all situations but may be very affective in certain situations. Selective forwarding attack is one of the most harmful attack as it can harm the complete network. A selective forwarding attack is a type of attack in which the nodes capture some data by interfering in the transmission path and steal some precious information which could be anything from secret passwords to encrypting keys and pass the rest to the destined node. The ability of capturing the required data and passing the rest of the information to the sink makes it undetectable in a network. In WSN certain techniques and algorithms have been introduced to detect selective forwarding attacks.
References
Shafiqul Abidin “WSN : Confidentiality, Integrity, Authenticity and Freshness (CIAF)”.
Geethu P C,Rameez Mohammed A.”Defence Against Selective Forwarding Attack in Wireless Sensor Networks”.IEEE-2013,4th ICCCNT-2013,july 4-6,Tiruchengode, India.
Naser M Alajmi, Khaled M. Elleithy.”Selective Forwarding Detection(SFD) in Wireless Sensor Networks”.
Binod Kumar Mishra,Mohan C. Nikam,Prashant Lakkadwala.”Security Against Black Hole Attack In Wireless Sensor Network-A Review”. 2014 Fourth Conference on Communication Sustems And Network Technologies”IEEE-2014.
V. Subramonian, H-M. Huang, S. Datar, and C. Lu, “Priority Scheduling in tinyos case study,”.Department of Computer Science,Washington University, St. Louis. MO.
Shafiqul Abidin, “A Novel Construction of Secure RFID Authentication Protocol”, International Journal of Security, Computer Science Journal, Malaysia, Vol. 8, Issue 8, pp33-36, October 2014.
S.Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, M.B. Srivastava, “On communication security in wireless adhoc sensor networks,” in proceedings of 11th IEEE International Workshop on Enablimg Technologies: Infrasturcture for Collaborative Enterprises(WETICE’02),2002,pp.139-144.
Mayank Saraogi, “Security In Wireless Sensor Networks “, University of Tennessee, Knoxville.
Abhishek Jain, Kamal Kant and M. R. Tripathy, “Security Solutions for Wireless Sensor Networks” 2012, Second International Conference on Advanced Computing & Communication Technologies.
I. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: A survey”. Computer Networks, 38(4):393-422.
P. Sengar, N. Bhardwaj, "A Survey on Security and Various Attacks in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.78-84, 2017.
J. Hill , R Szewczyk, A. Woo, S. Hollar, D.E. Culler, K. Pister, “System architecture directions for networked sensos”. Proceedings of 9th International Conference On Architectural Support for Programing Languages and Operating Systems, New York, ACM Press 2000,pp 93-104.
Manu Ahuja and Shafiqul Abidin “Performance Analysis of Vehicular Ad-hoc Network”, International Journal of Computer Applications, USA, Vol 151 - No. 7, pp 28-30, October 2016.
Bulbenkiene, V., Jakovlev, S., Mumgaudis, and G., Priotkas, G., “Energy loss model in Wireless Sensor Networks,” IEEE Digital Information Processing and communication (ICDIPC), 2012 Second International conference, PP 36-38, 10-12 July 2012.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
