A Review : Security Threats and Defensive Strategis in WSN

Authors(3) :-Zaiba Ishrat, Kunwar Babar Ali, Muazzam Laiq

Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. Wireless Sensor Networks consist of a large number of pocket- sized sensors deployed in autonomous manner in the area under surveillance. These sensor networks are used in sensitive, unattended and remote environment. WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the use of insecure wireless communication channels. These constraints make security in WSNs a challenge. This paper studies the security problems of WSN based on its resource restricted design and deployment characteristics and the security requirements for designing a secure WSN. Also, this study documents the well-known attacks at the different layers of WSN and some counter measures against those attacks.

Authors and Affiliations

Zaiba Ishrat
EC, IIMT College Of Engineering, Greater Noida, Uttar Pradesh ,India
Kunwar Babar Ali
CS,Noida international University,Greater Noida , Uttar Pradesh ,India
Muazzam Laiq
EC, IIMT College Of Engineering, Greater Noida, Uttar Pradesh ,India

WSN, Warmhole, Sink hole, Hello flood attack, Jamming

  1. Padmavathi, Dr G., and Mrs Shanmugapriya (2009), A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv:0909.057
  2. Kavitha, C. (2012), A survey on secured routing protocols for wireless sensor network, In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), pp. 1-8
  3. Padmavathi, Dr G., and Mrs Shanmugapriya (2009), A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv:0909.057
  4. Jain A, Kant K, Tripathy M (2012) Security solutions for wireless sensor networks in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on IEEE pp: 430-433.
  5. aniel E. Burgner, Luay A. Wahsheh, "Security of Wireless Sensor Networks", 2011 Eighth International Conference onIne formation Technology: New Generations (ITNG), Las Vegas,NV, pp. 315-320, 2011.
  6. Daniel E. Burgner, Luay A. Wahsheh, "Security of Wireless Sensor Networks", 2011 Eighth International Conference onIne formation Technology: New Generations (ITNG), Las Vegas,NV, pp. 315-320, 2011.
  7. Modares, Hero, Rosli Salleh, and Amirhossein Moravejosharieh (2011), Overview of security issues in wireless sensor networks, In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on, pp. 308-311. IEE
  8. Padmavathi, Dr G., and Mrs Shanmugapriya (2009), A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv:0909.057
  9. Singh, Shio Kumar, M. P. Singh, and D. K. Singh. (2010), A survey of energy-efficient hierarchical cluster-based routing in wireless sensor networks, International Journal of Advanced Networking and Application (IJANA) 2.02 : 570-580
  10. Gurudatt Kulkarni, Rupali Shelk, Kiran Gaikwad, Vikas Solanke, Sangita Gujar, Prasad Khatawkar, "Wireless sensor network security threats", Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), Bangalore, pp. 131-135, 2013.
  11. S.V.Annlin Jeba, B. Paramasivan and D.Usha, "Security Threats and its Countermeasures in Wireless Sensor Networks: An Overview", International Journal of Computer Applications, Volume 29, Issue 6, pp. 15-22, September 2011.
  12. R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,"
  13. Commun. ACM, vol. 26, no. 1, 1983, pp. 96–99. J. N. Al-Karaki and A. E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey," IEEE Wireless Commun., vol. 11, no. 6, Dec. 2004, pp. 6–28.
  14. Virendra Pal Singh, Sweta Jain and Jyoti Singhai, "Hello Flood Attack and its Countermeasures in Wireless Sensor Networks", International Journal of Computer Science Issues (IJCSI), Volume 7, Issue 3, No 11, pp. 23-27, May 2010.
  15. Patel MM, Aggarwal A (2016) Two phase wormhole detection approach for dynamic wireless sensor networks in Wireless Communications Signal Processing and Networking (WiSPNET), 2016 International Conference on IEEE pp: 2109-2112.
  16. Leela Krishna Bysani and Ashok Kumar Turuk, "A Survey on Selective Forwarding Attack in Wireless Sensor Networks", IEEE International Conference on Devices and Communications (ICDeCom), pp. 1-5, February 2011
  17. Oh, Seo Hyun, Chan O. Hong, and Yoon Hwa Choi (2012), A malicious and malfunctioning node detection scheme for wireless sensor networks. Wireless Sensor Network 4, no. 03 pp. 84.
  18. Gagandeep and Aashima, "Study on Sinkhole Attacks in Wireless Adhoc Network", International Journal on Computer Science and Engineering, ISSN: 0975-3397, Volume 4, Issue 06, pp. 1078-1085, June 2012.
  19. Mulla RI, Patil R (2016) Review of attacks on wireless sensor network and their classification and security. Imperial J Interdiscipl Res 7: 2.
  20. Yulong Zou, Gongpu Wang, "Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack", IEEE Transactions on Industrial Informatics, Vol. 12, Issue: 2, pp. 780-787, 2015.
  21. Ghildiyal, Sunil, Amit Kumar Mishra, Ashish Gupta, and Neha Garg, Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks. IJRET: International Journal of Research in Engineering and Technology pp.2319-1163
  22. Jyoti Ahlawat, Mukesh Chawla and Kavita Sharma, "Attacks and Countermeasures in Wireless Sensor Network", International Journal of Computer Science and Communication Engineering (IJCSCE), pp. 66-69. 2012.
  23. Yong Wang, Garhan Attebury "A survey of security issue in wireless sensor network" IEEE Communications Surveys, • 2nd Quarter 2006
  24. I. F. Akyildiz et al., "A Survey on Sensor Setworks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–114.
  25. W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Info. Theory, vol. 22, no. 6, Nov. 1976, pp.644–54.
  26. R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Commun. ACM, vol. 26, no. 1, 1983, pp. 96–99.

Publication Details

Published in : Volume 4 | Issue 1 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 199-206
Manuscript Number : IJSRSET1184148
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Zaiba Ishrat, Kunwar Babar Ali, Muazzam Laiq, " A Review : Security Threats and Defensive Strategis in WSN, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 1, pp.199-206, January-February.2018
URL : http://ijsrset.com/IJSRSET1184148

Follow Us

Contact Us