Security Attacks and Its Countermeasures in Wireless Sensor Networks - A

被引:0
|
作者
Kiruthika, B. [1 ]
Abinaya, S. [1 ]
Ezhilarasie, R. [1 ]
Umamakeswari, A. [1 ]
机构
[1] SASTRA Univ, Sch Comp, Thanjavur 613401, Tamil Nadu, India
来源
RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES | 2015年 / 6卷 / 03期
关键词
WSN; Security; Attacks; Sensor nodes; Security issues;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Advancements in hardware manufacturing and the enhancements of effective software mechanisms has led to development of networks consisting of cost-effective sensor nodes communicating via wireless medium. These networks are termed as Wireless Sensor Networks (WSN). Although many communication protocols are designed for routing, security is a threat to these networks. In this paper, we present an overview of wireless networks, how they differ from other networks and the underlying security issues are discussed. The conventional attacks on WSN are summarised and survey presents several security issues related to it.
引用
收藏
页码:1374 / 1387
页数:14
相关论文
共 50 条
  • [31] Security in Wireless Sensor Networks
    Aranzazu Suescun, Catalina
    SISTEMAS & TELEMATICA, 2009, 7 (13): : 43 - 73
  • [32] The Impact of Network Layer Attacks in Wireless Sensor Networks
    Ioannou, Christiana
    Vassiliou, Vasos
    2016 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2016, : 20 - 28
  • [33] Issues in Wireless Sensor Networks with an Emphasis on Security
    Sharma, Kartik
    Sharma, Sheeba
    ICCCE 2018, 2019, 500 : 419 - 425
  • [34] Security Issues in Wireless Sensor Networks: A Survey
    Chowdhury, Mahfuzulhoq
    Kader, Md Fazlul
    Asaduzzaman
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (05): : 97 - 115
  • [35] Firewalling Wireless Sensor Networks: Security by Wireless
    Martinovic, Ivan
    Gollan, Nicos
    Schmitt, Jens B.
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 753 - 760
  • [36] Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey
    Hong, Sunghyuck
    Lim, Sunho
    Song, Jaeki
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (04): : 805 - 821
  • [37] Security to wireless sensor networks against malicious attacks using Hamming residue method
    Majid Alotaibi
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [38] Security to wireless sensor networks against malicious attacks using Hamming residue method
    Alotaibi, Majid
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [39] A Cluster-Based Mitigation Strategy Against Security Attacks in Wireless Sensor Networks
    Khan, Jahangir
    Shah, Ansar Munir
    Nawaz, Babar
    Mahmood, Khalid
    Saeed, Muhammad Kashif
    ul Hassan, Mehmood
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 409 - 414
  • [40] The STAC (Security Toolbox: Attacks & Countermeasures) ontology
    Gyrard, Amelie
    Bonnet, Christian
    Boudaoud, Karima
    PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 165 - 166