A Detailed Review about Attacks on WSNs
AUTHORS
N. Thirupathi Rao,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
Debnath Bhattacharyya,Department of Computer Science and Engineering, Vignan’s Institute of Information Technology, Visakhapatnam, AP, India
ABSTRACT
Remote sensor systems have an arrangement of calculations and conventions with self-building up abilities. The current sensors or the sensors used in these sensor networks will work wirelessly by locating at various locations of the actual requirement. The major advantage of these sensor networks are that these network nodes can be placed at various locations where it will be more difficult for the human beings or persons to enter and collect data. In such dangerous places also these nodes can be placed and can collect the data from time to time. As a result of such important facilities, the utilization such node sin these networks are becoming very high and the usage of such networks had grown a lot. In these current days, the networks which were built with the combination of such nodes and networks are built and the attackers always are ready to tap or attack such networks and hack the data. Once the data had collected and can be used for various other benefits and the actual user or the network established person or the company had to lose the data and also can be used such important data for various other anti social issues. Hence, the attacks on these nodes and networks can be treated seriously and can be considered with various preventive measures. In the current paper an attempt has been made to present some important points and issues to be noted for the establishment and working of the network. Different assaults are performed in this system, for example, inactive and dynamic assaults or insider and outcast assaults. The remotely arrange required continuously security as information respectability, secrecy, legitimacy and so forth.
KEYWORDS
Security, networks, sensors, attacks, cyber threats, physical attacks on nodes, nodes, issues
REFERENCES
[1] https://www.elprocus.com/introduction-to-wireless-sensor-networks-types-and-applications/ [Last Accessed on 10-05-(2019)]
[2] NM. Nair, JS. Terence, “Survey on Distributed Data Storage Schemes in Wireless Sensor Networks", Indian Journal of Computer Science and Engineering (IJCSE), Vol.4, No.6, pp.1-6, (2014).
[3] P.Sengar, N. Bharadwaj, “A Survey on Security and Various Attacks in Wireless Sensor Network”, IJCSE, Vol.5, No.4, Pp.78-84.
[4] Jennifer Yick, Biswanath Mukherjee, Dipak Ghosal, “Wireless sensor network survey”, Science direct, Vol.52, Issue.12, pp.2292– 2330, (2008).DOI: 10.1016/j.comnet.2008.04.002(CrossRef)(Google Scholar)
[5] AS. Mandloi, V. Choudhary, "An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.1, pp.6-10, (2013). DOI: 10.5120/9555-4013(CrossRef)(Google Scholar)
[6] Sanchita Gupta, PoojaSaini, "Modified Pairwise Key Predistribution Scheme with Deployment Knowledge in Wireless Sensor Network", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.21-23, (2013).
[7] N. Meenaksi, P. Rodrigues, "Tsunami Detection and forewarning system using Wireless Sensor Network - a Survey", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.76-79, (2014).
[8] ChanchalYadav, SS. Hegde, NC. Anjana, Sandeep Kumar, “Security Techniques in Wireless Sensor Networks: A Survey”, International Journal of Advanced Research in Computer and Communication Engineering, Vol.4, Issue.4, pp.289-295, (2015). DOI: 10.1109/MWC.2004.1368893(CrossRef)(Google Scholar)
[9] JaydipSen, “A Survey on Wireless Sensor Network Security”, International Journal of Communication Networks and Information Security, Vol.1, No.2, pp.1-16, (2009).
[10] Hye Yun Kim, Seong Cheol Kim, Hyun Joo Park.Priority and Delay Aware packet transmission MAC Protocol for Wireless Sensor Networks, International Journal of Security Technology for Smart Device. Vol. 5. No. 2. Oct. (2018).GVPress. pp. 9-14.
[11] Sengphil Hong “Enhanced Re-route Filtering Scheme for Data Reporting in Wireless Sensor Networks”, International Journal of Wireless and Mobile Communication for Industrial Systems. Vol. 3. No. 2. Oct. (2016).GVPress. pp. 1-8.DOI: 10.1109/tnet.2009.2026901(CrossRef)(Google Scholar)
[12] SystemRekha Purohit and Prabhat Mathur, “Role of Wireless Sensor Networks in Communication with Artificial Intelligence”, International Journal of Wireless and Mobile Communication for Industrial Systems. Vol. 3. No. 2. Oct. (2016).GVPress. pp. 33-38.
[13] Chen Yu, Sonali Gupta, and Arun Agrawal, “Location based Technique to prevent Sybil attack in wireless sensor networks”, International Journal of Reliable Information and Assurance. Vol. 5. No. 1. Jun. (2017).GVPress. pp. 1-8.
[14] Hyun Joo Park, Seong Cheol Kim, Hye Yun Kim, “Delay Aware Data Gathering Mechanism in Wireless Sensor Networks”, International Journal of Security Technology for Smart Device. Vol. 5. No. 2. Oct. (2018).GVPress. pp. 15-20.