Open Access   Article Go Back

Survey of Attacks and Security Schemes in Wireless Sensor Network

Sonam Jai1 , Deepak Singh Tomar2 , Rachana Kamble3

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 122-128, May-2015

Online published on May 30, 2015

Copyright © Sonam Jai, Deepak Singh Tomar , Rachana Kamble . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sonam Jai, Deepak Singh Tomar , Rachana Kamble, “Survey of Attacks and Security Schemes in Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.122-128, 2015.

MLA Style Citation: Sonam Jai, Deepak Singh Tomar , Rachana Kamble "Survey of Attacks and Security Schemes in Wireless Sensor Network." International Journal of Computer Sciences and Engineering 3.5 (2015): 122-128.

APA Style Citation: Sonam Jai, Deepak Singh Tomar , Rachana Kamble, (2015). Survey of Attacks and Security Schemes in Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 3(5), 122-128.

BibTex Style Citation:
@article{Jai_2015,
author = {Sonam Jai, Deepak Singh Tomar , Rachana Kamble},
title = {Survey of Attacks and Security Schemes in Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {122-128},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=491},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=491
TI - Survey of Attacks and Security Schemes in Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Sonam Jai, Deepak Singh Tomar , Rachana Kamble
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 122-128
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2397 2366 downloads 2559 downloads
  
  
           

Abstract

Wireless Sensor Networks are emerging as the latest tier for data monitoring in many applications like commercial, industrial, military etc. Security in WSN’s is one of the major challenges in order to provide protected and authenticated communication between sensor nodes. However providing secure routing in WSN is a matter of fundamental concern. Although a wide variety of routing protocols have been proposed for WSN’s but most of them do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs .Hence it is the major challenge when designing robust security mechanism for WSNs. In this paper ,we examine some of the most common routing attacks, routing protocols and security schemes in WSNs. It is suggested that in order to overcome the challenges of routing attacks in WSNs , some new routing protocols or strategy must be carefully designed so that attacks can be rendered meaningless .

Key-Words / Index Term

WSN, Security, Attack, Routing. Survey

References

[1] Chris Karlof, David Wagner, “Secure Routing in Wireless Sensor Networks", Attacks and Countermeasures”, Ad Hoc Networks (elsevier), Page: 299-302, 2003.
[2] Santi, P. “Topology control in wireless ad hoc and sensor networks” Chichester, England: John Wiley & Sons, 2005.
[3] Jun Zheng and Abbas Jamalipour, “Wireless Sensor Networks: A Networking Perspective”, a book published by A John & Sons, Inc, and IEEE, 2009.
[4] Clement Ogugua Asogwa, Xiaoming Zhang, Degui Xiao, Ahmed Hamed, “Experimental Analysis of AODV, DSR and DSDV Protocols Based on Wireless Body Area Network” Communications in Computer and Information Science,Springer-VerlagBerlin Heidelberg,Volume 312, pp 183-191, 2012.
[5] Faleh Rabeb, Nasri Nejah, Kachouri Abdennaceur,Samet Mounir, “An Extensive Comparison among DSDV, DSR and AODV Protocols in wireless sensor network” IEEE, International Conference on Education and e-Learning Innovations, 2012.
[1] Nasrin Hakim Mithila, “Performance analysis of DSDV, AODV and DSR in Wireless Sensor Network” International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE) Volume 2, Issue 4, pp.395-404, April 2013
[2] Ipsita Panda “A Survey on Routing Protocols of MANETs by Using QoS Metrics” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, pp. 121-129, 2012.
[6] Jamal Al-Karaki, and Ahmed E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Communications Magazine, vol 11, no. 6, pp. 6-28, Dec. 2004.
[7] 13. Kemal Akkaya and Mohamed Younis, “A Survey on Routing Protocols for Wireless Sensor Networks”, Ad hoc Networks, vol. 3, no. 3, pp. 325-349, May 2005.
[8] 5.C. Karlof and D. Wagner, Secure Routing in Sensor Networks: Attacks and Countermeasures, In Proc. of First IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
[9] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less Low Cost Outdoor Localization for Very Small Devices”, IEEE Personal Communication Magazine, vol. 7, no. 5, pp. 28-34, Oct. 2000
[10] A.Babu Karuppiah, T.Meenakshi, T.I.Mano Ranjitha & S.Vivitha, " False Misbehaviour Elimination in Watchdog Monitoring System Using Change Point in a Wireless Sensor Network", An International Journal on Graduate Research in Engineering and Technology (GRET), pp. 31-35, 2013
[11] S. Nishanthi, "Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm", IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013
[12] Silva, A.P.R.D., M.H.T. Martins, B.P.S. Rocha, A.A.F.Loureiro and L.B. Ruiz, "Decentralized Intrusion Detection In Wireless Sensor Networks" Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks, (QSSWMN; 25), pp: 16-23, 2005
[13] Xie, M., S. Han, B. Tian and S. Parvin, "Anomaly detection in wireless sensor networks: A survey" Journal of Network and Computer Application, pp.1302-1325, 2011
[14] Pires, W.R., T.H. De Paula Figueiredo, H.C. Wong and A.A.F. Loureiro, "Malicious node detection in wireless sensor networks", Proceedings. 18th International, Parallel and Distributed Processing Symposium, (PDS’ 04), pp: 1-7, 2004.
[15] Onat, I. and A. Miri, "An Intrusion Detection System For Wireless Sensor Networks", Proceedings of the IEEE International Conference on, Wireless And Mobile Computing, Networking And Communications, IEEE Xplore Press, pp: 253-259, Aug. 22-24, 2005.
[16] Krontiris, I., T. Dimitriou and F.C. Freiling, "Towards Intrusion Detection In Wireless Sensor Networks", Proceeding of the 13th European Wireless Conference, CiteSeer, 2007.
[17] Krontiris, I., T. Dimitriou, T. Giannetsos and M. Mpasoukos, "Intrusion Detection Of Sinkhole Attacks In Wireless Sensor Networks" Proceedings of the 3rd International Conference on Algorithmic Aspects of Wireless Sensor Networks, (AAWSN’ 28), Springer-Verlag Berlin, Heidelberg, pp: 150- 161, 2008.
[18] Stetsko, A., L. Folkman and V. Matyáš, "Neighbor-Based Intrusion Detection For Wireless Sensor Networks". Proceedings of the 6th International Conference on Wireless and Mobile Communications (ICWMC), IEEE Xplore Press, Valencia, pp: 420-425, Sept. 20-25, 2010.
[19] Lemos, M.V.D.S., L.B. Leal and R.H. Filho, "A New Collaborative Approach for Intrusion Detection System on Wireless Sensor Networks", Novel Algorithms Techniques Telecommunication Network, pp. 239-244, 2010.
[20] Shio Kumar Singh, M P Singh, and D K Singh“A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks” International Journal of Computer Trends and Technology (IJCTT) pp. 1-9, May to June 2011.