Open Access   Article Go Back

Attacks in Wireless Sensor Network- A Review

Amandeep Kaur1 , Sandeep Singh Kang2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-5 , Page no. 157-162, May-2016

Online published on May 31, 2016

Copyright © Amandeep Kaur , Sandeep Singh Kang . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Amandeep Kaur , Sandeep Singh Kang, “Attacks in Wireless Sensor Network- A Review,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.5, pp.157-162, 2016.

MLA Style Citation: Amandeep Kaur , Sandeep Singh Kang "Attacks in Wireless Sensor Network- A Review." International Journal of Computer Sciences and Engineering 4.5 (2016): 157-162.

APA Style Citation: Amandeep Kaur , Sandeep Singh Kang, (2016). Attacks in Wireless Sensor Network- A Review. International Journal of Computer Sciences and Engineering, 4(5), 157-162.

BibTex Style Citation:
@article{Kaur_2016,
author = {Amandeep Kaur , Sandeep Singh Kang},
title = {Attacks in Wireless Sensor Network- A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2016},
volume = {4},
Issue = {5},
month = {5},
year = {2016},
issn = {2347-2693},
pages = {157-162},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=924},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=924
TI - Attacks in Wireless Sensor Network- A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Amandeep Kaur , Sandeep Singh Kang
PY - 2016
DA - 2016/05/31
PB - IJCSE, Indore, INDIA
SP - 157-162
IS - 5
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1464 1399 downloads 1516 downloads
  
  
           

Abstract

In wireless multi-hop sensor networks, an intruder may launch some attacks due to packet dropping in order to disrupt the communication. To tolerate or mitigate such attacks, some of the schemes have been proposed. But very few can effectively and efficiently identify the intruders. The Packet Droppers and Modifiers are common attacks in wireless sensor networks. It is very difficult to identify such attacks and this attack interrupts the communication in wireless multi-hop sensor networks. Today wireless communication technique has become an essential tool in any application that requires communication between one or more sender(s) and multiple receivers. Since multiple users can use this technique simultaneously over a single channel, security has become a huge concern. Even though there are numerous ways to secure a wireless network and protect the network from numerous attacks, providing 100% security and maintaining confidentiality is a huge challenge in recent trends. This paper is all about various attacks that can affect WSN. Some attacks disturb nodes, some disturbs network, some drops packets, some theft information. Different remedies and precautions are taken to overcome different attacks.

Key-Words / Index Term

WSN, Node, Routing, Attack

References

[1] Er. Satish Kumar, "A Study of Wireless Sensor Networks- A Review", International Journal of Computer Sciences and Engineering, Volume-04, Issue-03, Page No (23-27), Mar -2016
[2] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
[3] Sonam Jai, Deepak Singh Tomar and Rachana Kamble, "Survey of Attacks and Security Schemes in Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Volume-03, Issue-05, Page No (122-128), May -2015
[4] N.Vanitha1, G.Jenifa, “Detection of Packet Droppers in Wireless Sensor Networks Using Node Categorization Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 3, March 2013
[5] A. Babu Karuppiah1* and S. Rajaram, “False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN”, Advances in Military Technology, Vol. 9, No. 1, June 2014
[6] S.Ranjitha and D. Prabakar and S. Karthik, "A Study on Security issues in Wireless Sensor Networks", International Journal of Computer Sciences and Engineering, Volume-03, Issue-09, Page No (50-53), Sep -2015
[7] Devdatt Nadre, Balaso N. Jagdale, “Security for Source Node Privacy in Wireless Sensor Network”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 2, February 2015