2017
DOI: 10.5120/ijca2017912972
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks

Abstract: For past few years, more interest has been focused on Wireless Sensor Networks (WSN) due to its wide range of applications in various fields. The WSNs are mainly used for sensing the pollution, monitoring the traffic; secure homeland, hospitals, military etc. There are possibilities of attacks in Wireless Sensor networks. Due to these attacks, there is possibility of loss of information. To avoid the data loss and for secure transmission of data, several countermeasures have been introduced. The main focus of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…The neighbor nodes are faked by the adversary. The sinkhole attack able to drop the data packets or forward them to another attack, or tamper it with aggregated data [13], [14].…”
Section: B Sinkhole Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The neighbor nodes are faked by the adversary. The sinkhole attack able to drop the data packets or forward them to another attack, or tamper it with aggregated data [13], [14].…”
Section: B Sinkhole Attacksmentioning
confidence: 99%
“…Other than that, the Sybil attack can affect the data aggregation in the network by claiming a fake ID. The malicious node can also steal an identity to enable them to join into the network [3], [12], [13].…”
Section: Introductionmentioning
confidence: 99%
“…Through this process, a malicious node is inserted into the WSNs to set up false routing information and camouflage it as a regular node. In other words, information is collected from the inserted malicious node, and it is transmitted to a strategic node where packets are analyzed systematically [40].…”
Section: ) Camouflagementioning
confidence: 99%
“…This technique causes a disturbance of the network operation or a denial of service (DoS) [ 29 ]. The active attacks can be initiated on five different layers of communication protocols [ 28 , 30 ]: physical layer attacks (where an attacker easily jams or intercepts any ongoing signal) [ 31 ], link-layer attacks (here, the attack is performed against the Media Access Control Protocol [ 32 ]), network layer attacks (including hello flood, wormhole attack, Sybil attack, selective forwarding, spoofed, and altered or replayed routing information [ 33 , 34 ]), transport layer attack (which mainly concerns flooding and desynchronization [ 33 ]), and the application layer attack, where an attacker attempts to overload the network nodes with sensor stimuli, triggering the network to forward massive volumes of traffic to a base station [ 35 ]. The application layer attacks include clock skewing, selective message forwarding, and data aggregation forwarding [ 36 ].…”
Section: Related Workmentioning
confidence: 99%