Abstract
Wireless Sensor Networks (WSNs) are gaining a lot of attention from researchers due to their massive applications. Network security is one of the important requirements of those applications. This chapter analyses possible network attacks that are essential for researchers to understand while developing robust security countermeasure. In this study, a systematic overview of different kinds of attacks for WSNs has been carried out and a critical analysis of the existing research results is presented. In this chapter, we also observe jamming attack consequence on WNSs in depth by investigating the effect of jamming attack on performance of WSN’s communication using binary spreading sequences. The binary sequences in this chapter are generated according to the IEEE 802.15.4a standard. Mathematical expressions of probability of bit error in a communication channel are derived considering the effects of noise and channel fading. Further, we investigate the effects of using interleaver and deinterleaver on bit error rate (BER) in the case of jamming. Matlab simulation results are presented to confirm the validity of the derived theoretical expressions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
López, J., Zhou, J.: Wireless Sensor Network Security, vol. 1. IOS Press Inc. (2008)
Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Network 20, 41–47 (2006)
Znaidi, W., Minier, M., Babau, J.-P.: An Ontology for Attacks in Wireless Sensor Networks (2008)
Yee Wei, L., Marimuthu, P., Lodewijk Van, H., Jeroen, D., Pieter, H., Paul, H.: Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sen. Netw. 5, 1–38 (2009)
Law, Y.W., van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Presented at the Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA (2005)
Xiao, Y.: Security in Sensor Networks. Uerbach Publications (2006)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24, 370–380 (2006)
Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In: IEEE International Conference on Wireless and Mobile Computing Networking and Communications, WIMOB 2008, pp. 526–531 (2008)
Kim, H., Oliveira, R., Bhargava, B., Song, J.: A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks. Wireless Personal Communications 70, 1339–1351 (2013)
Jian, L., Fang-min, L.: An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. In: Fifth International Conference on Information Assurance and Security, IAS 2009, pp. 507–510 (2009)
Shila, D.M., Yu, C., Anjali, T.: Mitigating selective forwarding attacks with a channel-aware approach. IEEE Transactions on Wireless Communications, WMNS 9, 1661–1675 (2010)
Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp. 824–828 (2009)
Xiaoming, L., Spear, M., Levitt, K., Matloff, N.S., Wu, S.F.: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. In: Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, pp. 403–411 (2008)
Sakya, G., Sharma, V., Jain, P.C.: Analysis of SMAC protocol for missioon critical applications in wireless sensor networks. In: 2013 IEEE 3rd International on Advance Computing Conference (IACC), pp. 488–492 (2013)
Manzo, M., Roosta, T., Sastry, S.: Time synchronization attacks in sensor networks. Presented at the Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA (2005)
Erdene-Ochir, O., Minier, M., Valois, F., Kountouris, A.: Resiliency of wireless sensor networks: Definitions and analyses. In: 2010 IEEE 17th International Conference on Telecommunications (ICT), pp. 828–835 (2010)
Ponomarchuk, Y., Dae-Wha, S.: Intrusion detection based on traffic analysis in wireless sensor networks. In: 2010 19th Annual Wireless and Optical Communications Conference (WOCC), pp. 1–7 (2010)
Skorobogatov, S.P.: Semi-invasive attacks-a new approach to hardware security analysis, Technical report, University of Cambridge, Computer Laboratory (2005)
Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, pp. 25-36 (2009)
Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks [Security and privacy in emerging wireless networks]. IEEE Wireless Communications 17, 56–62 (2010)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)
Berber, S., Yuan, Y., Suh, B.: Modeling and Simulation of a Physical Layer for WSNs based on Binary Sequences
Chih-Lin, I., Pollini, G.P.: The tree-search resource auction multiple access (TRAMA) protocol for wireless personal communications. In: 1994 IEEE 44th Vehicular Technology Conference, vol. 2, pp. 1170–1174 (1994)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Tayebi, A., Berber, S.M., Swain, A. (2015). Wireless Sensor Network Attacks: An Overview and Critical Analysis with Detailed Investigation on Jamming Attack Effects. In: Mason, A., Mukhopadhyay, S., Jayasundera, K. (eds) Sensing Technology: Current Status and Future Trends III. Smart Sensors, Measurement and Instrumentation, vol 11. Springer, Cham. https://doi.org/10.1007/978-3-319-10948-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-10948-0_10
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10947-3
Online ISBN: 978-3-319-10948-0
eBook Packages: EngineeringEngineering (R0)