Abstract
Sensor networks is an evolving technology and a hot exploration subject among scientists due to their tractability and individuality of network substructures, such as base stations, wireless access points, and moveable nodes. Sensor networks are widely used for solicitations, such as construction, traffic observation, and territory monitoring and several other scenarios. Wireless sensor network (WSN) makes a network malleable enough to go over concrete structures and it also evades lot of cabling. The primary encounters faced in WSN are security, and the hiatus in security leads to other constrains in energy efficiency, network life, and communication overhead. The hiatus in safekeeping the network is mostly because deficiency of the overriding of wave propagation, and computing constraints. In this paper, we have deliberated about numerous diversities of attacks in WSN, and their aftermath to the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Francillon, Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM Conference on Computer and communications security, Alexandria, Virginia, USA (2008)
Reza, S., et al.: Quantifying location privacy: the case of sporadic location exposure. Privacy Enhancing Technologies. Springer, Berlin (2011)
Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer, Berlin (2006)
Hu, Yih-Chun, Perrig, Adrian, Johnson, David B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
Dimitris, G., et al.: Preventing impersonation attacks in MANET with multi-factor authentication. In: Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, 2005. Third International Symposium on IEEE WIOPT (2005)
Giovanni, V., et al.: NetSTAT: A network-based intrusion detection approach. In: Computer Security Applications Conference, 1998. Proceedings of 14th Annual. IEEE (1998)
Savage, Stefan, et al.: TCP congestion control with a misbehaving receiver. ACM SIGCOMM Comput. Commun. Rev. 29(5), 71–78 (1999)
Kuriakose, Jeril, et al.: Secure Multipoint Relay Node Selection in Mobile Ad Hoc Networks. Security in Computing and Communications. Springer Intl. Publishing, pp. 402–411 (2015)
Bing, W., et al.: A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, pp. 103–135. Springer, US (2007)
Wang, X., et al.: iloc: An invisible localization attack to internet threat monitoring systems. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM) (Mini-conference), April 2008
Liang, W., Jussi, K.: Real-world sybil attack in Bit torrent mainlinedht. IEEE GLOBECOM (2012)
Yingying, C., et al.: The robustness of localization algorithms to signal strength attacks: a comparative study. Distributed Computing in Sensor Systems, pp. 546–563. Springer Berlin
Kuriakose, J., et al.: A review on localization in wireless sensor networks. Advances in signal processing and intelligent recognition systems, pp. 599–610. Springer Intl. Publishing (2014)
Jeril, K., et al.: A review on mobile sensor localization. Security in Computing and Communications, pp. 30–44. Springer, Berlin (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Kuriakose, J., Amruth, V., Jaya Krishna, R., Srivastava, D.K. (2016). Assessing the Severity of Attacks in Wireless Networks. In: Afzalpulkar, N., Srivastava, V., Singh, G., Bhatnagar, D. (eds) Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2638-3_70
Download citation
DOI: https://doi.org/10.1007/978-81-322-2638-3_70
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2636-9
Online ISBN: 978-81-322-2638-3
eBook Packages: EngineeringEngineering (R0)