Skip to main content

Abstract

Sensor networks is an evolving technology and a hot exploration subject among scientists due to their tractability and individuality of network substructures, such as base stations, wireless access points, and moveable nodes. Sensor networks are widely used for solicitations, such as construction, traffic observation, and territory monitoring and several other scenarios. Wireless sensor network (WSN) makes a network malleable enough to go over concrete structures and it also evades lot of cabling. The primary encounters faced in WSN are security, and the hiatus in security leads to other constrains in energy efficiency, network life, and communication overhead. The hiatus in safekeeping the network is mostly because deficiency of the overriding of wave propagation, and computing constraints. In this paper, we have deliberated about numerous diversities of attacks in WSN, and their aftermath to the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Francillon, Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM Conference on Computer and communications security, Alexandria, Virginia, USA (2008)

    Google Scholar 

  2. Reza, S., et al.: Quantifying location privacy: the case of sporadic location exposure. Privacy Enhancing Technologies. Springer, Berlin (2011)

    Google Scholar 

  3. Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer, Berlin (2006)

    Google Scholar 

  4. Hu, Yih-Chun, Perrig, Adrian, Johnson, David B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  5. Dimitris, G., et al.: Preventing impersonation attacks in MANET with multi-factor authentication. In: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005. Third International Symposium on IEEE WIOPT (2005)

    Google Scholar 

  6. Giovanni, V., et al.: NetSTAT: A network-based intrusion detection approach. In: Computer Security Applications Conference, 1998. Proceedings of 14th Annual. IEEE (1998)

    Google Scholar 

  7. Savage, Stefan, et al.: TCP congestion control with a misbehaving receiver. ACM SIGCOMM Comput. Commun. Rev. 29(5), 71–78 (1999)

    Article  Google Scholar 

  8. Kuriakose, Jeril, et al.: Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. Security in Computing and Communications. Springer Intl. Publishing, pp. 402–411 (2015)

    Google Scholar 

  9. Bing, W., et al.: A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, pp. 103–135. Springer, US (2007)

    Google Scholar 

  10. Wang, X., et al.: iloc: An invisible localization attack to internet threat monitoring systems. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) (Mini-conference), April 2008

    Google Scholar 

  11. Liang, W., Jussi, K.: Real-world sybil attack in Bit torrent mainlinedht. IEEE GLOBECOM (2012)

    Google Scholar 

  12. Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer Berlin

    Google Scholar 

  13. Kuriakose, J., et al.: A review on localization in wireless sensor networks. Advances in signal processing and intelligent recognition systems, pp. 599–610. Springer Intl. Publishing (2014)

    Google Scholar 

  14. Jeril, K., et al.: A review on mobile sensor localization. Security in Computing and Communications, pp. 30–44. Springer, Berlin (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V Amruth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Kuriakose, J., Amruth, V., Jaya Krishna, R., Srivastava, D.K. (2016). Assessing the Severity of Attacks in Wireless Networks. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_70

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2638-3_70

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2636-9

  • Online ISBN: 978-81-322-2638-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics