Open Access   Article Go Back

A Review on Network Layer Attacks in Wireless Sensor Networks

Parvathy K.1 , S. Rajalakshmi2

Section:Review Paper, Product Type: Journal Paper
Volume-9 , Issue-3 , Page no. 45-48, Mar-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i3.4548

Online published on Mar 31, 2021

Copyright © Parvathy K., S. Rajalakshmi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Parvathy K., S. Rajalakshmi, “A Review on Network Layer Attacks in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.3, pp.45-48, 2021.

MLA Style Citation: Parvathy K., S. Rajalakshmi "A Review on Network Layer Attacks in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 9.3 (2021): 45-48.

APA Style Citation: Parvathy K., S. Rajalakshmi, (2021). A Review on Network Layer Attacks in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 9(3), 45-48.

BibTex Style Citation:
@article{K._2021,
author = {Parvathy K., S. Rajalakshmi},
title = {A Review on Network Layer Attacks in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2021},
volume = {9},
Issue = {3},
month = {3},
year = {2021},
issn = {2347-2693},
pages = {45-48},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5316},
doi = {https://doi.org/10.26438/ijcse/v9i3.4548}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i3.4548}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5316
TI - A Review on Network Layer Attacks in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Parvathy K., S. Rajalakshmi
PY - 2021
DA - 2021/03/31
PB - IJCSE, Indore, INDIA
SP - 45-48
IS - 3
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
745 347 downloads 158 downloads
  
  
           

Abstract

The wireless sensor networks (WSN) are said to be one of the popular networks in using all-inclusive applications like lots of applications in environment monitoring, military applications, health care monitoring, habitat monitoring, etc. .These networks are structured in many or more number of sensor nodes. The Deployment of nodes in these networks are not secure which may cause to security attacks. In this paper, different types of attacks and network layer attacks are discussed in wireless sensor networks and how to enhance and detect the attacks from the WSN by using some of the methods to resolve the problem.

Key-Words / Index Term

Wireless Sensor Networks,Attacks,Network Layer

References

[1] Chelli P, “ Security Issues in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the World Congress on Engineering 2015, Vol. 1, WCE 2015, July 13 3, 2015, London, U.K.
[2] Kanchan Kaushal and Taranvir Kaur, “A Survey on Attacks of WSN and their Security Mechanisms,” International Journal of Computer Applications, Volume 118, No. 18, May 2015.
[3] Sahabul Alam and Debashis De , “ Analysis of security threats in wireless sensor network,” International Journal of Wireless & Mobile Networks (IJWMN), Vol. 6, No. 2, April 2014.
[4] Naser Alajmi , “ Wireless Sensor Networks Attacks and Solutions,” (IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 7, July 2014.
[5] J. Steffi Agino Priyanka, S. Tephillah and A . M. Balamurugan, “Attacks and countermeasures in WSN,” International Journal of Electronics & Communication (IIJEC), Volume 2, Issue 1, January 2014, ISSN 2321-5984.
[6] Jaydip Sen , A Survey on Wireless Sensor Network Security, Vol. 1,No. 2, August 2009, International Journal of Communication Networks and Information Security (IJCNIS)
[7] G.Anand, Dr.H.G.Chandrakanth, Dr.M.N.Giriprasad, SECURITY THREATS & ISSUES IN WIRELESS SENSOR NETWORKS International Journal of Engineering Research and Applications(IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 1,Jan-Feb2012,
[8] Manju Gupta and C. Ram Gupta, Security Issues In Wireless Sensor Network, Vol. 2, No. 2, pp. 355-358, July-December 2011, IJCSC.
[9] Priyanka K. Shah and Kajal V. Shukla Secure Data Aggregation Issues in Wireless Sensor Network: A Survey, Journal of Information and Communication Technologies, ISSN 2047-3168, Volume 2, Issue 1, January 2012.
[10] Modares, H, Kuala Lumpur Salleh, R. Moravejosharieh. Overview of Security Issues in Wireless Sensor Networks Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on 20-22 Sept. 2011.
[11] Rajeshwar Singh1, Singh D.K and Lalan Kumar, A review on security issues in wireless sensor network, ISSN: 0976-8742 & EISSN:0976-8750, Vol. 1, Issue 1, PP-01-07, 2010, JISCE.
[12] T.Kavitha, D.Sridharan Security Vulnerabilities In Wireless Sensor Networks: A Survey, Journal of Information Assurance and Security 5, 031-044, 2010
[13] M. Gruteser, G. Schelle, A. Jain, R. Han, and D. Grunwald, “Privacy-aware location sensor networks”, In Proceedings of the 9th USENIX Workshop on Hot Topics in Operating Systems, (HotOS IX), 2003.
[14] A. Perrig, J. Stankovic, and D. Wagner, “Security in wireless sensor networks”, Communications of ACM , Vol 47, No. 6, pp. 53-57, 2004
[15] E. Shi and A. Perrig, “Designing secure sensor networks”, Wireless Communication Magazine, Vol. 11, No. 6, pp. 38-43, December 2004.
[16] Jaspreet Kaur, Tavleen Kaur”A Comparative Study of Techniques Used in Detection and Prevention of Black Hole Attack inWireless Sensor Networks”,ijreset, Vol. 2 Issue III, March 2014.
[17] Yunzhou Zhang1,2, Xiaohua Zhang1, Zeyu Wang1, Honglei Liu College of Information Science and Engineering , Shenyang SIASUNG Robot & Automation Northeastern University Company, Ltd. Shenyang, P.R.China “Virtual Edge Based Coverage Hole Detection Algorithm in Wireless Sensor Networks” IEEE 2013.
[18] Mohammad Wazid, Student Member, IEEE, Avita Katal, Student Member, IEEE and R H Goudar “TBESP Algorithm for Wireless Sensor Network under Black hole Attack” 2013.
[19] Nishant Sharma1, Upinderpal Singh” Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks” IJCSMC, Vol. 3, Issue. 2, pg.29 – 33, February 2014.
[20] Y. C. Hu, A. Perrig and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks", in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976-1986, 2003.
[21] Vinay Soni, Pratik Modi, Vishvash Chaudhri,” Detecting Sinkhole Attack in Wireless Sensor Network”, Volume 2, Issue 2, February 2013.
[22] D.Sheela, Naveen kumar. C and Dr. G.Mahadevan; “A Non Cryptographic Method of Sinkhole Attack Detection in Wireless Sensor Networks” IEEE-International Conference on Recent Trends in Information Technology,ICRTIT, pp. 527-532, 2011.
[23] S.Sharmila and Dr G Umamaheswari; “Detection of sinkhole Attack in Wireless Sensor Networks using Message Digest Algorithms” International Conference on Process Automation, Control and Computing (PACC), pp. 1-6, 2011.
[24] Abirami.K, Santhi.B,” Sybil attack in Wireless Sensor Network”,IJET.
[25] Yingying chen, “Detecting and localizing identity-based attacks in wireless sensor network”,IEEE Journal, June 2010.