Open Access   Article Go Back

Attacks on WSN and its Limitations

Shafiqul Abidin1 , Mohd Izhar2

  1. Department of Information Technology, HMRITM (GGSIP University), Delhi, India.
  2. Department of Computer Science and Engineering, HMRITM (GGSIP University), Delhi, India.

Correspondence should be addressed to: shafiqulabidin@yahoo.co.in.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 158-161, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.158161

Online published on Nov 30, 2017

Copyright © Shafiqul Abidin, Mohd Izhar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Shafiqul Abidin, Mohd Izhar, “Attacks on WSN and its Limitations,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.158-161, 2017.

MLA Style Citation: Shafiqul Abidin, Mohd Izhar "Attacks on WSN and its Limitations." International Journal of Computer Sciences and Engineering 5.11 (2017): 158-161.

APA Style Citation: Shafiqul Abidin, Mohd Izhar, (2017). Attacks on WSN and its Limitations. International Journal of Computer Sciences and Engineering, 5(11), 158-161.

BibTex Style Citation:
@article{Abidin_2017,
author = {Shafiqul Abidin, Mohd Izhar},
title = {Attacks on WSN and its Limitations},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2017},
volume = {5},
Issue = {11},
month = {11},
year = {2017},
issn = {2347-2693},
pages = {158-161},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1558},
doi = {https://doi.org/10.26438/ijcse/v5i11.158161}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i11.158161}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1558
TI - Attacks on WSN and its Limitations
T2 - International Journal of Computer Sciences and Engineering
AU - Shafiqul Abidin, Mohd Izhar
PY - 2017
DA - 2017/11/30
PB - IJCSE, Indore, INDIA
SP - 158-161
IS - 11
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
695 318 downloads 252 downloads
  
  
           

Abstract

In recent times Security has started to be the key factor in data transmission. Recent advances in networking and wireless sensing has enabled the discovery in networking and wireless sensing and has enabled the discovery of new algorithms and techniques for wireless sensor networks. A Wireless Sensor Network (WSN) comprises several sensor nodes such as magnetic, thermal, and infrared and the radar is setup in a particular geographical area. The capabilities of WSN include to manipulate and control the physical and environmental entities such as – humidity, temperature, sound, pressure, light etc. and pass this information to various other sensors present in the network in order to pass the information from the source to the sink. These wireless sensor networks have diverse applications ranging from medical care to military or educational purposes but these networks are also prone to many adversaries and attacks. Some of the most common attacks on a wireless sensor network are spoofing or replayed routing information. Certain techniques and algorithms have been introduced or developed which might not make a WSN attack-proof in all situations but may be very affective in certain situations. Selective forwarding attack is one of the most harmful attack as it can harm the complete network. A selective forwarding attack is a type of attack in which the nodes capture some data by interfering in the transmission path and steal some precious information which could be anything from secret passwords to encrypting keys and pass the rest to the destined node. The ability of capturing the required data and passing the rest of the information to the sink makes it undetectable in a network. In WSN certain techniques and algorithms have been introduced to detect selective forwarding attacks.

Key-Words / Index Term

Authentication; Privacy; Sybil; Cryptographic Methodologies; Wireless Sensor Network; WSN; Sensor; Limitations; Sink Hole; Black Hole; Selective Forwarding Attack.

References

[1] Shafiqul Abidin “WSN : Confidentiality, Integrity, Authenticity and Freshness (CIAF)”.
[2] Geethu P C,Rameez Mohammed A.”Defence Against Selective Forwarding Attack in Wireless Sensor Networks”.IEEE-2013,4th ICCCNT-2013,july 4-6,Tiruchengode, India.
[3] Naser M Alajmi, Khaled M. Elleithy.”Selective Forwarding Detection(SFD) in Wireless Sensor Networks”.
[4] Binod Kumar Mishra,Mohan C. Nikam,Prashant Lakkadwala.”Security Against Black Hole Attack In Wireless Sensor Network-A Review”. 2014 Fourth Conference on Communication Sustems And Network Technologies”IEEE-2014.
[5] V. Subramonian, H-M. Huang, S. Datar, and C. Lu, “Priority Scheduling in tinyos case study,”.Department of Computer Science,Washington University, St. Louis. MO.
[6] Shafiqul Abidin, “A Novel Construction of Secure RFID Authentication Protocol”, International Journal of Security, Computer Science Journal, Malaysia, Vol. 8, Issue 8, pp33-36, October 2014.
[7] S.Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, M.B. Srivastava, “On communication security in wireless adhoc sensor networks,” in proceedings of 11th IEEE International Workshop on Enablimg Technologies: Infrasturcture for Collaborative Enterprises(WETICE’02),2002,pp.139-144.
[8] Mayank Saraogi, “Security In Wireless Sensor Networks “, University of Tennessee, Knoxville.
[9] Abhishek Jain, Kamal Kant and M. R. Tripathy, “Security Solutions for Wireless Sensor Networks” 2012, Second International Conference on Advanced Computing & Communication Technologies.
[10] I. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: A survey”. Computer Networks, 38(4):393-422.
[11] P. Sengar, N. Bhardwaj, "A Survey on Security and Various Attacks in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.78-84, 2017.
[10] J. Hill , R Szewczyk, A. Woo, S. Hollar, D.E. Culler, K. Pister, “System architecture directions for networked sensos”. Proceedings of 9th International Conference On Architectural Support for Programing Languages and Operating Systems, New York, ACM Press 2000,pp 93-104.
[12] Manu Ahuja and Shafiqul Abidin “Performance Analysis of Vehicular Ad-hoc Network”, International Journal of Computer Applications, USA, Vol 151 - No. 7, pp 28-30, October 2016.
[13] Bulbenkiene, V., Jakovlev, S., Mumgaudis, and G., Priotkas, G., “Energy loss model in Wireless Sensor Networks,” IEEE Digital Information Processing and communication (ICDIPC), 2012 Second International conference, PP 36-38, 10-12 July 2012.