A Review on Network Layer Attacks in Wireless Sensor Networks
DOI:
https://doi.org/10.26438/ijcse/v9i3.4548Keywords:
Wireless Sensor Network, Attacks, Network LayerAbstract
The wireless sensor networks (WSN) are said to be one of the popular networks in using all-inclusive applications like lots of applications in environment monitoring, military applications, health care monitoring, habitat monitoring, etc. .These networks are structured in many or more number of sensor nodes. The Deployment of nodes in these networks are not secure which may cause to security attacks. In this paper, different types of attacks and network layer attacks are discussed in wireless sensor networks and how to enhance and detect the attacks from the WSN by using some of the methods to resolve the problem.
References
[1] Chelli P, “ Security Issues in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the World Congress on Engineering 2015, Vol. 1, WCE 2015, July 13 3, 2015, London, U.K.
[2] Kanchan Kaushal and Taranvir Kaur, “A Survey on Attacks of WSN and their Security Mechanisms,” International Journal of Computer Applications, Volume 118, No. 18, May 2015.
[3] Sahabul Alam and Debashis De , “ Analysis of security threats in wireless sensor network,” International Journal of Wireless & Mobile Networks (IJWMN), Vol. 6, No. 2, April 2014.
[4] Naser Alajmi , “ Wireless Sensor Networks Attacks and Solutions,” (IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 7, July 2014.
[5] J. Steffi Agino Priyanka, S. Tephillah and A . M. Balamurugan, “Attacks and countermeasures in WSN,” International Journal of Electronics & Communication (IIJEC), Volume 2, Issue 1, January 2014, ISSN 2321-5984.
[6] Jaydip Sen , A Survey on Wireless Sensor Network Security, Vol. 1,No. 2, August 2009, International Journal of Communication Networks and Information Security (IJCNIS)
[7] G.Anand, Dr.H.G.Chandrakanth, Dr.M.N.Giriprasad, SECURITY THREATS & ISSUES IN WIRELESS SENSOR NETWORKS International Journal of Engineering Research and Applications(IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1,Jan-Feb2012,
[8] Manju Gupta and C. Ram Gupta, Security Issues In Wireless Sensor Network, Vol. 2, No. 2, pp. 355-358, July-December 2011, IJCSC.
[9] Priyanka K. Shah and Kajal V. Shukla Secure Data Aggregation Issues in Wireless Sensor Network: A Survey, Journal of Information and Communication Technologies, ISSN 2047-3168, Volume 2, Issue 1, January 2012.
[10] Modares, H, Kuala Lumpur Salleh, R. Moravejosharieh. Overview of Security Issues in Wireless Sensor Networks Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on 20-22 Sept. 2011.
[11] Rajeshwar Singh1, Singh D.K and Lalan Kumar, A review on security issues in wireless sensor network, ISSN: 0976-8742 & EISSN:0976-8750, Vol. 1, Issue 1, PP-01-07, 2010, JISCE.
[12] T.Kavitha, D.Sridharan Security Vulnerabilities In Wireless Sensor Networks: A Survey, Journal of Information Assurance and Security 5, 031-044, 2010
[13] M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-aware location sensor networks”, In Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems, (HotOS IX), 2003.
[14] A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks”, Communications of ACM , Vol 47, No. 6, pp. 53-57, 2004
[15] E. Shi and A. Perrig, “Designing secure sensor networks”, Wireless Communication Magazine, Vol. 11, No. 6, pp. 38-43, December 2004.
[16] Jaspreet Kaur, Tavleen Kaur”A Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack inWireless Sensor Networks”,ijreset, Vol. 2 Issue III, March 2014.
[17] Yunzhou Zhang1,2, Xiaohua Zhang1, Zeyu Wang1, Honglei Liu College of Information Science and Engineering , Shenyang SIASUNG Robot & Automation Northeastern University Company, Ltd. Shenyang, P.R.China “Virtual Edge Based Coverage Hole Detection Algorithm in Wireless Sensor Networks” IEEE 2013.
[18] Mohammad Wazid, Student Member, IEEE, Avita Katal, Student Member, IEEE and R H Goudar “TBESP Algorithm for Wireless Sensor Network under Black hole Attack” 2013.
[19] Nishant Sharma1, Upinderpal Singh” Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks” IJCSMC, Vol. 3, Issue. 2, pg.29 – 33, February 2014.
[20] Y. C. Hu, A. Perrig and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks", in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976-1986, 2003.
[21] Vinay Soni, Pratik Modi, Vishvash Chaudhri,” Detecting Sinkhole Attack in Wireless Sensor Network”, Volume 2, Issue 2, February 2013.
[22] D.Sheela, Naveen kumar. C and Dr. G.Mahadevan; “A Non Cryptographic Method of Sinkhole Attack Detection in Wireless Sensor Networks” IEEE-International Conference on Recent Trends in Information Technology,ICRTIT, pp. 527-532, 2011.
[23] S.Sharmila and Dr G Umamaheswari; “Detection of sinkhole Attack in Wireless Sensor Networks using Message Digest Algorithms” International Conference on Process Automation, Control and Computing (PACC), pp. 1-6, 2011.
[24] Abirami.K, Santhi.B,” Sybil attack in Wireless Sensor Network”,IJET.
[25] Yingying chen, “Detecting and localizing identity-based attacks in wireless sensor network”,IEEE Journal, June 2010.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
