Security Attacks in Wireless Sensor Networks: A Survey

被引:0
作者
Patel, Manish M. [1 ]
Aggarwal, Akshai [1 ]
机构
[1] Gujarat Technol Univ, Ahmadabad, Gujarat, India
来源
2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP) | 2013年
关键词
Wireless sensor networks; Security; Wormhole; Jamming; Selective Forwarding; Sinkhole; Sybil;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Network (WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional security solutions. There are lot of attacks on these networks which can be classified as routing attacks and data traffic attacks. Some of the data attacks in sensor nodes are wormhole, jamming, selective forwarding, sinkhole and Sybil attack. In this paper, we discussed about all these attacks and some of the mitigation schemes to defend these attacks.
引用
收藏
页码:329 / 333
页数:5
相关论文
共 32 条
[21]  
Sharmila S., INT C PROC AUT CONTR, P1
[22]  
Sheela D., 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT 2011), P527, DOI 10.1109/ICRTIT.2011.5972397
[23]  
Stojmenovic I, 2010, WIRELESS SENSOR ACTU, P1
[24]   Detection of Reactive Jamming in Sensor Networks [J].
Strasser, Mario ;
Danev, Boris ;
Capkun, Srdjan .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2010, 7 (02)
[25]  
Sun H. - M., 2007, EFFICIENT COUNTERMEA, P1
[26]   Digital Investigation of Wormhole Attacks in Wireless Sensor Networks [J].
Triki, Bayrem ;
Rekhis, Slim ;
Boudriga, Noureddine .
2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, :179-186
[27]  
Tumrongwittayapak Chanatip, 2009, ICROS SICE INT JOINT, P1966
[28]  
Wang Weichao., 2004, P ACM WORKSHOP WIREL, P51
[29]  
Wang Xin-sheng, 2009, LIGHTWEIGHT DEFENSE, P226
[30]  
Yu B., 2006, P 2 INT WORKSHOP SEC, P1