Attacks in Wireless Sensor Network- A Review
Keywords:
WSN, Node, Routing, AttackAbstract
In wireless multi-hop sensor networks, an intruder may launch some attacks due to packet dropping in order to disrupt the communication. To tolerate or mitigate such attacks, some of the schemes have been proposed. But very few can effectively and efficiently identify the intruders. The Packet Droppers and Modifiers are common attacks in wireless sensor networks. It is very difficult to identify such attacks and this attack interrupts the communication in wireless multi-hop sensor networks. Today wireless communication technique has become an essential tool in any application that requires communication between one or more sender(s) and multiple receivers. Since multiple users can use this technique simultaneously over a single channel, security has become a huge concern. Even though there are numerous ways to secure a wireless network and protect the network from numerous attacks, providing 100% security and maintaining confidentiality is a huge challenge in recent trends. This paper is all about various attacks that can affect WSN. Some attacks disturb nodes, some disturbs network, some drops packets, some theft information. Different remedies and precautions are taken to overcome different attacks.
References
Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016
Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
Sonam Jai, Deepak Singh Tomar and Rachana Kamble, "Survey of Attacks and Security Schemes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-05, Page No (122-128), May -2015
N.Vanitha1, G.Jenifa, “Detection of Packet Droppers in Wireless Sensor Networks Using Node Categorization Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013
A. Babu Karuppiah1* and S. Rajaram, “False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN”, Advances in Military Technology, Vol. 9, No. 1, June 2014
S.Ranjitha and D. Prabakar and S. Karthik, "A Study on Security issues in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (50-53), Sep -2015
Devdatt Nadre, Balaso N. Jagdale, “Security for Source Node Privacy in Wireless Sensor Network”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
