Skip to main content

Wireless Sensor Network Attacks: An Overview and Critical Analysis with Detailed Investigation on Jamming Attack Effects

  • Chapter

Part of the book series: Smart Sensors, Measurement and Instrumentation ((SSMI,volume 11))

Abstract

Wireless Sensor Networks (WSNs) are gaining a lot of attention from researchers due to their massive applications. Network security is one of the important requirements of those applications. This chapter analyses possible network attacks that are essential for researchers to understand while developing robust security countermeasure. In this study, a systematic overview of different kinds of attacks for WSNs has been carried out and a critical analysis of the existing research results is presented. In this chapter, we also observe jamming attack consequence on WNSs in depth by investigating the effect of jamming attack on performance of WSN’s communication using binary spreading sequences. The binary sequences in this chapter are generated according to the IEEE 802.15.4a standard. Mathematical expressions of probability of bit error in a communication channel are derived considering the effects of noise and channel fading. Further, we investigate the effects of using interleaver and deinterleaver on bit error rate (BER) in the case of jamming. Matlab simulation results are presented to confirm the validity of the derived theoretical expressions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. López, J., Zhou, J.: Wireless Sensor Network Security, vol. 1. IOS Press Inc. (2008)

    Google Scholar 

  2. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: attack and defense strategies. IEEE Network 20, 41–47 (2006)

    Article  Google Scholar 

  3. Znaidi, W., Minier, M., Babau, J.-P.: An Ontology for Attacks in Wireless Sensor Networks (2008)

    Google Scholar 

  4. Yee Wei, L., Marimuthu, P., Lodewijk Van, H., Jeroen, D., Pieter, H., Paul, H.: Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sen. Netw. 5, 1–38 (2009)

    Google Scholar 

  5. Law, Y.W., van Hoesel, L., Doumen, J., Hartel, P., Havinga, P.: Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Presented at the Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA (2005)

    Google Scholar 

  6. Xiao, Y.: Security in Sensor Networks. Uerbach Publications (2006)

    Google Scholar 

  7. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24, 370–380 (2006)

    Article  Google Scholar 

  8. Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. In: IEEE International Conference on Wireless and Mobile Computing Networking and Communications, WIMOB 2008, pp. 526–531 (2008)

    Google Scholar 

  9. Kim, H., Oliveira, R., Bhargava, B., Song, J.: A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks. Wireless Personal Communications 70, 1339–1351 (2013)

    Article  Google Scholar 

  10. Jian, L., Fang-min, L.: An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks. In: Fifth International Conference on Information Assurance and Security, IAS 2009, pp. 507–510 (2009)

    Google Scholar 

  11. Shila, D.M., Yu, C., Anjali, T.: Mitigating selective forwarding attacks with a channel-aware approach. IEEE Transactions on Wireless Communications, WMNS 9, 1661–1675 (2010)

    Article  Google Scholar 

  12. Tiwari, M., Arya, K.V., Choudhari, R., Choudhary, K.S.: Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp. 824–828 (2009)

    Google Scholar 

  13. Xiaoming, L., Spear, M., Levitt, K., Matloff, N.S., Wu, S.F.: A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. In: Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, pp. 403–411 (2008)

    Google Scholar 

  14. Sakya, G., Sharma, V., Jain, P.C.: Analysis of SMAC protocol for missioon critical applications in wireless sensor networks. In: 2013 IEEE 3rd International on Advance Computing Conference (IACC), pp. 488–492 (2013)

    Google Scholar 

  15. Manzo, M., Roosta, T., Sastry, S.: Time synchronization attacks in sensor networks. Presented at the Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, Alexandria, VA, USA (2005)

    Google Scholar 

  16. Erdene-Ochir, O., Minier, M., Valois, F., Kountouris, A.: Resiliency of wireless sensor networks: Definitions and analyses. In: 2010 IEEE 17th International Conference on Telecommunications (ICT), pp. 828–835 (2010)

    Google Scholar 

  17. Ponomarchuk, Y., Dae-Wha, S.: Intrusion detection based on traffic analysis in wireless sensor networks. In: 2010 19th Annual Wireless and Optical Communications Conference (WOCC), pp. 1–7 (2010)

    Google Scholar 

  18. Skorobogatov, S.P.: Semi-invasive attacks-a new approach to hardware security analysis, Technical report, University of Cambridge, Computer Laboratory (2005)

    Google Scholar 

  19. Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, pp. 25-36 (2009)

    Google Scholar 

  20. Zeng, K., Govindan, K., Mohapatra, P.: Non-cryptographic authentication and identification in wireless networks [Security and privacy in emerging wireless networks]. IEEE Wireless Communications 17, 56–62 (2010)

    Article  Google Scholar 

  21. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)

    Google Scholar 

  22. Berber, S., Yuan, Y., Suh, B.: Modeling and Simulation of a Physical Layer for WSNs based on Binary Sequences

    Google Scholar 

  23. Chih-Lin, I., Pollini, G.P.: The tree-search resource auction multiple access (TRAMA) protocol for wireless personal communications. In: 1994 IEEE 44th Vehicular Technology Conference, vol. 2, pp. 1170–1174 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Tayebi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Tayebi, A., Berber, S.M., Swain, A. (2015). Wireless Sensor Network Attacks: An Overview and Critical Analysis with Detailed Investigation on Jamming Attack Effects. In: Mason, A., Mukhopadhyay, S., Jayasundera, K. (eds) Sensing Technology: Current Status and Future Trends III. Smart Sensors, Measurement and Instrumentation, vol 11. Springer, Cham. https://doi.org/10.1007/978-3-319-10948-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10948-0_10

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10947-3

  • Online ISBN: 978-3-319-10948-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics