2011
DOI: 10.4236/jis.2011.22007
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Link Layer Attacks on Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and resource limited sensors [3]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional network security techniques are unusable on WSNs [3]; This is due to wireless and shared nature … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
61
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(61 citation statements)
references
References 19 publications
0
61
0
Order By: Relevance
“…These methods underline the assumption that wormhole nodes cannot sense any detection event. In contrast, an active wormhole attacker can actively sense the symptoms of detection event and can temporarily pause its attack to avoid the detection [39][40][41][42]. To address this situation, we propose a real-time wormhole detection scheme which is well suited for the detection of both passive and active wormhole attackers.…”
Section: Discussionmentioning
confidence: 99%
“…These methods underline the assumption that wormhole nodes cannot sense any detection event. In contrast, an active wormhole attacker can actively sense the symptoms of detection event and can temporarily pause its attack to avoid the detection [39][40][41][42]. To address this situation, we propose a real-time wormhole detection scheme which is well suited for the detection of both passive and active wormhole attackers.…”
Section: Discussionmentioning
confidence: 99%
“…Collision, exhaustion and unfairness are the attacks in data link layer [12]. The network layer is vulnerable to various type of attack such as spoofed, sinkhole, wormhole and hello flood attack.…”
Section: Layer Oriented Attacksmentioning
confidence: 99%
“…This notion of battery conservation extends to the primitives used to enforce security in WSNs. Security protocols strive to be lightweight, in terms of code size and processing requirements, while there is no degradation in their usefulness in achieving this goal [7].…”
Section: Introductionmentioning
confidence: 99%