A Survey of Network Attacks in Wireless Sensor Networks
In Today’s modern world, with the advent of advances in Technology. Wireless Sensor Networks (WSN) is an emerging and the most widely used medium for communication due to its large number of advantages over traditional wired networks. WSN consists of thou
- PDF / 1,981,554 Bytes
- 14 Pages / 439.37 x 666.142 pts Page_size
- 12 Downloads / 213 Views
and Sourabh Bharti
Department of Information Technology, Indira Gandhi Delhi Technical University for Women, Kashmere Gate, Delhi 110006, India [email protected]
Abstract. In Today’s modern world, with the advent of advances in Technology. Wireless Sensor Networks (WSN) is an emerging and the most widely used medium for communication due to its large number of advantages over traditional wired networks. WSN consists of thousands of sensor nodes which are connected to each other in a network. However, WSN are more prone to security threats and attacks because WSN have very low memory, power and computation capabilities. WSN are susceptible to various types of attacks which can occur on any layer in the protocol stack. But network layer is more prone to the attacks. Therefore, we are focusing on network layer attacks in this paper. Keywords: Attacks Wireless Sensor Network Security Spoofing Selective forwarding Black hole Sink hole Wormhole Acknowledgement spoofing
1 Introduction WSN is an interconnection of hundreds or even thousands of sensor nodes that are geographically dispersed over a wide area. The sensor nodes in WSN have data acquisition and data processing capabilities which enables them to record and monitor the physical and operational conditions of real world environment and this collected data is reported to a central node at a regular and timely interval. The conditions of real world environment which WSN measure includes wind, temperature, air quality index, pressure etc. WSN have a large domain of applications that includes intrusion detection, power system monitoring, traffic monitoring, Gas monitoring to very critical applications such as Disaster emergency response, forest fire monitoring, Tsunami detection, Military battlefield surveillance, air pollution monitoring, Healthcare application and so on. However, as we know that every network regardless even if it is a wired network or if it is a wireless network, is susceptible to attacks. WSN is no different. WSN have very low memory, power and computation capabilities. Therefore we cannot apply heavy algorithms requiring large memory and computational power to WSN which makes the attacks on WSN more severe and dangerous than attacks wired networks. WSN are often deployed in open environments where they interact with the people, which makes them more prone to malicious attacks. The attackers can use this as an advantage to compromise the security of network. For example, the attackers can flood © Springer Nature Singapore Pte Ltd. 2020 C. Badica et al. (Eds.): ICICCT 2020, CCIS 1170, pp. 50–63, 2020. https://doi.org/10.1007/978-981-15-9671-1_4
A Survey of Network Attacks in WSN
51
the network with large amount of traffic consisting useless or old messages which will consume all the memory and battery power of the nodes and halt the communication in the network. Therefore, security of the WSN is a major concern and proper defenses are required to counter the attacks [1].
2 WSN Model WSN consists of four components: Sensor node
Data Loading...