An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques (original) (raw)

Abstract

Wireless Sensor Network (WSN) is the network of the future. As it gradually gains ground by transforming our lives and environments into a Smart World, it will definitely call for attention from selfish minded Attackers. The first section of this paper introduces the Wireless Sensor Network, its constraints, architecture, and mode of operation. It goes ahead to discuss the applications of WSN in health, agriculture, military, transportation, environment, industries. However, WSN automatically inherits the security challenges of the traditional network. The Network security goals which are Confidentiality, Integrity, Availability, and Authentication sometimes called the CIA of Network security is discussed with respect to WSN. This is followed by the security challenges of WSN, these challenges are categorized into two (2), Passive and Active Attacks, Passive attack is interested in the message, data or information that traverses the network without hindering the network channel or m...

Figures (5)

Key takeaways

sparkles

AI

  1. Wireless Sensor Networks (WSNs) are integral to developing Smart environments across multiple sectors.
  2. The CIAA security goals—Confidentiality, Integrity, Availability, and Authenticity—are crucial for WSNs.
  3. WSNs face both passive and active attacks, including node replication and denial-of-service attacks.
  4. Mitigation techniques must be implemented at each layer of the WSN protocol stack to ensure security.
  5. Applications of WSNs span health, agriculture, military, and environmental monitoring, showcasing their versatility.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

References (13)

  1. A. Diaz and P. Sanchez, "Simulation of Attacks for Security in Wireless Sensor Network," Sensors, vol. 16, no. 11, p. 1932, 2016.
  2. M. A. Matin and M. M. Islam, "Overview of Wireless Sensor Network," Wirel. Sens. Networks -Technol. Protoc., pp. 3-24, 2012.
  3. E. Karapistoli and A. A. Economides, "Wireless sensor network security visualization," 2012 IV Int. Congr. Ultra Mod. Telecommun. Control Syst., vol. 2013, pp. 850-856, 2012.
  4. K. Chelli, " Security Issues in Wireless Sensor Networks: Attacks and Countermeasures," vol. I, 2015.
  5. S. Yinbiao et al., "Internet of Things: Wireless Sensor Networks," Int. Electron. Commision, no. December, pp. 1-78, 2014.
  6. T. K. Pankaj Chauhan, "Power Optimization in Wireless Sensor Networks: A Perspective," Int. J. Eng. Tech. Res., vol. 3, no. 5, pp. 415-419, 2015.
  7. S. Zhang, "A Review of Wireless Sensor Networks and Its Applications," no. August, pp. 386- 389, 2012.
  8. Wazir Zada Khan, Mohammed Y. Aalsalem, Mohammed Naufal Bin Mohammed, Saad, and Yang Xiang, "Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey," Int. J. Distrib. Sens. Networks, vol. 2013, pp. 1-22, 2013.
  9. S. Ahmad Salehi, M. A. Razzaque, P. Naraei, and A. Farrokhtala, "Security in Wireless Sensor Networks: Issues and challenges," 2013 IEEE Int. Conf. Sp. Sci. Commun., vol. 4, no. 1, pp. 356-360, 2013.
  10. O. Gökhan Eğilmez, Gürsel A. Süer, Özgüner, "World ' s largest Science, Technology & Medicine Open Access book publisher" Des. Control Appl. Mechatron. Syst. Eng., pp. 135- 152, 2012.
  11. A. G. A. Alquraishee and J. Kar, "A survey on security mechanisms and attacks in wireless sensor networks," Contemp. Eng. Sci., vol. 7, no. 1, pp. 135-147, 2014.
  12. C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
  13. R. W. Anwar, M. Bakhtiari, A. Zainal, A. Hanan Abdullah, and K. N. Qureshi, "Security issues and attacks in a wireless sensor network," World Appl. Sci. J., vol. 30, no. 10, pp. 1224-1227, 2014.