Open Access   Article Go Back

A Review Paper on Various Attacks on Wireless Sensor Networks

M. Dahiya1 , A. Sangwan2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 29-35, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.2935

Online published on Apr 30, 2019

Copyright © M. Dahiya, A. Sangwan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Dahiya, A. Sangwan, “A Review Paper on Various Attacks on Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.29-35, 2019.

MLA Style Citation: M. Dahiya, A. Sangwan "A Review Paper on Various Attacks on Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 7.4 (2019): 29-35.

APA Style Citation: M. Dahiya, A. Sangwan, (2019). A Review Paper on Various Attacks on Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 7(4), 29-35.

BibTex Style Citation:
@article{Dahiya_2019,
author = {M. Dahiya, A. Sangwan},
title = {A Review Paper on Various Attacks on Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {29-35},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3989},
doi = {https://doi.org/10.26438/ijcse/v7i4.2935}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.2935}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3989
TI - A Review Paper on Various Attacks on Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - M. Dahiya, A. Sangwan
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 29-35
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
627 529 downloads 211 downloads
  
  
           

Abstract

As we know wireless sensor network have many advantages such as its high speed and high quality which increase its use in modern time. As so the security in wireless sensor network became the most important factor. There are many security issues but the most important is “eavesdropping”. Eavesdropping is a type of attack in which the information being transmitted is attained or captured by some other devices. It is not possible to tell if a system had faced some kind of eavesdropping or not. In this paper various advantages and disadvantages will be discussed. There will be some application of WSNS and some introduction of eavesdropping issue with some techniques to detect this issue. We will also see various other attacks which leads to effect the security of wireless sensor networks. This paper will help in improving security in wireless sensor networks. This paper will further help in improving accuracy of wireless sensor networks. This paper will also light up various advantages and disadvantage of the technique which is being used for improving the security of wireless sensor networks.

Key-Words / Index Term

Wireless sensor networks (WSNS), eavesdropping and security enhancement

References

[1]. .Xu, Q., Ren, P., Song, H., & Du, Q. (2016). Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations. IEEE Access, 4, 2840-2853.
[2]. 2) Di Pietro, R., Guarino, S., Verde, N., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks –A survey. Computer Communications, 51, 1-20. [12] Di Pietro, R., & Viejo, A. (2011).Location privacy and resilience in wireless sensor networks querying.Computer Communications, 34(3), 515-523.
[3]. 3) Chen, X., Zhang, Z., Chen, H., & Zhang, H. (2015). Enhancing wireless information and power transfer by exploiting multi-antenna techniques.IEEE Communications Magazine, 53(4), 133-141.
[4]. 4) Li, C., & Lee, C. (2012). A novel user authentication and privacy-preserving scheme with smart cards for wireless communications.Mathematical and Computer Modelling, 55(1-2), 35-44.
[5]. He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications.Computer Communications, 34(3), 367-374. doi: 10.1016/j.comcom.2010.02.031
[6]. .6 )Demakis, C., &Merinos, L. (2004). Security in third-generation mobile systems.IEE Colloquium on Security in Networks, 27, 638-650. doi: 10.1016/j.comcom.2003.12.004. Plößl, K., &Federrath, H. (2008). A privacy-aware and efficient security infrastructure for vehicular ad hoc networks.Computer Standards & Interfaces, 30(6), 390-397.
[7]. Raj, A. B., Ramesh, M. V., Kulkarni, R. V., & T., H. (2012). Security Enhancement in Wireless Sensor Networks Using Machine Learning.2012 IEEE 14th International Conference on High-Performance Computing and Communication & 2012 IEEE 9th International Conference on Embedded Software and Systems, 1264-1269. 1196 Dr. Charanjit Singh and Dr. RajbirKaur, MitthatmeerKaur
[8]. Karlof, C., & Wagner, D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 1(2-3), 293-315
[9]. A.H. Farooqi and F.A. Khan, Intrusion Detection Systems for Wireless Sensor Networks: A Survey, in FGCN/ACN 2009, CCIS, vol. 56, pp. 234-241.
[10]. Y. Zhang, N. Meratnia, and P. Havinga, "Outlier Detection Techniques for Wireless Sensor Networks: A Survey", IEEE Commun. Surveys Tutorials, vol. 12, no. 2, 2010.
[11]. T. Bhattasali, and R. Chaki, A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network, in 4th International Conference on Network Security and Applications (CNSA-2011), Springer, 2011, pp. 268- 280.
[12]. Nabil Ali Alrajeh, S. Khan, and Bilal Shams, Intrusion Detection Systems in Wireless Sensor Networks: A Review, International Journal of Distributed Sensor Networks Volume 2013 (2013), Article ID 167575
[13]. S. Khan, N. Mast, and J. Loo, “Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks,” , vol. 12, pp. 1–8, 2009.
[14]. M. Ngadi, A.H. Abdullah, and S. Mandala, “A survey on MANET intrusion detection”, International J.Computer Science and Security, volume 2, number 1, pages 1-11, 2008.
[15]. Y. Zhang, W. Lee, and Y.A. Huang, “Intrusion detection techniques for mobile wireless networks”, J. Wireless Networks, vol. 9, num. 5, pp. 545-556, 2003.
[16]. S. Khan, K. K. Loo, and Z. U. Din, “Framework for intrusion detection in IEEE 802.11 wireless mesh networks,” , vol. 7, no. 4, pp. 435–440, 2010.
[17]. N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron,“Monitoring behavior in home using a smart fall sensor”, IEEE-EMBS Special Topic Conference on Micro-technologies in Medicine and Biology, October 2000, pp. 607–610.
[18]. K. Nagarathna, Kiran Y. B, J D. Mallapur, S. Hiremath (2012) worked on “Trust Based Secured Routing in Wireless Multimedia Sensor Networks”, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.
[19]. Theodore Zahariadis, Helen Leligou, Panagiotis Karkazis, Panagiotis Trakadas, Ioannis Papaefstathiou, Charalambos Vangelatos, Lionel Besson, “Design And Implementation Of A Trust-Aware Routing Protocol For Large Wsns”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010.
[20]. Idris M.Atakli ,Hongking Hu, Yu Chan, “ Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evalution ,” The Symposis on Simulation of systems Security(SSSS 08),Ottawa,Canada, April 14 17,2008.
[21]. Janani.C and Mrs. P.Chitra, “Trust Evaluation Based Security In Wireless Sensor Network”, (IJITR) International Journal Of Innovative Technology And Research, Volume No. 1, Issue No. 1, December-January 2013, 054-060.