Skip to main content

Attacks in Wireless Sensor Networks

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 105))

Abstract

In this paper our objective was to explore the routing attacks in each layer. Security is a major issue when we discuss about Wireless Sensor Networks (WSN). Wireless sensor networks (WSN) have a versatile environment. When the network components like sensors are deployed in unattended environment, they are then endangered to various attacks. Due to the innumerable applications, there is a massive scope for research in various fields of WSN. This paper enhances a survey on classification of security attacks and the defense mechanisms for each attack that are examined.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhatiya, A., et al. Detection and prevention of sink hole attack in aodv protocol for wireless sensor network (2017)

    Google Scholar 

  2. Shahzad, F., Pasha, M., Ahmad,A.: A survey of active attacks on wireless sensor networks and their countermeasures. arXiv preprint arXiv:1702.07136 (2017)

  3. Anand, C., Gnanamurthy, R.K.: Localized DoS attack detection architecture for reliable data transmission over wireless sensor network. Wirel. Pers. Commun. 90(2), 847–859 (2016)

    Article  Google Scholar 

  4. Pooja, P., Chauhan, R.K.: Review on security attacks and countermeasures in wireless sensor networks. Int. J. Adv. Res. Comput. Sci. 8(5) (2017)

    Google Scholar 

  5. Keerthana, G., Padmavathi, G.: A study on sinkhole attack detection using swarm intelligence techniques for wireless sensor networks. IRACST Int. J. Comput. Sci. Inf. Technol. Secur. (IJCSITS) 5(5) (2015). ISSN: 2249–9555

    Google Scholar 

  6. Shabana, K., et al.: Security issues and attacks in wireless sensor networks. Int. J. Adv. Res. Comput. Sci. Electr. Eng. (IJARCSEE) 5(7), 81 (2016)

    Google Scholar 

  7. Sandeep, Y., Hussain, M.A.: Implementing privacy homomorphism in data aggregation for wireless sensor networks. Indian J. Sci. Technol. 10(4) (2017)

    Google Scholar 

  8. Mittal, H.: A survey: attacks on wireless networks. J. Netw. Commun. Emerg. Technol. (JNCET) 6(5) (2016). www.jncet.org

  9. Kurbah, R.P., Sharma, B.: Survey on issues in wireless sensor networks: attacks and countermeasures. Int. J. Comput. Sci. Inf. Secur. 14(4), 262 (2016)

    Google Scholar 

  10. Grover, J., Sharma, S.: Security issues in wireless sensor network—a review. In: 2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE (2016)

    Google Scholar 

  11. Mesare, M.P.G., Sherekar, S.S., Thakare, V.M.: Prevention and detection of packet dropping and message tampering attack on MANET using EAMD (2017)

    Google Scholar 

  12. Devibala, K., et al.: Flow based mitigation model for sinkhole attack in wireless sensor networks using time-variant snapshot. Int. J. Adv. Comput. Electr. Eng. 2(05), 14–21 (2017)

    Google Scholar 

  13. Minohara, T., Nishiyama, K.: Poster: detection of wormhole attack on wireless sensor networks in duty-cycling operation. EWSN (2016)

    Google Scholar 

  14. Amish, P., Vaghela, V.B.: Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. Procedia Comput. Sci. 79, 700–707 (2016)

    Article  Google Scholar 

  15. Mayur, S., Ranjith, H.D.: Security enhancement on LEACH protocol from HELLO flood attack in WSN using LDK scheme. Int. J. Innovative Res. Sci. Eng. Technol. 4(3) (2015)

    Google Scholar 

  16. Khanderiya, M., Panchal, M.: A novel approach for detection of sybil attack in wireless sensor networks (2016)

    Google Scholar 

  17. Mathur, A., Newe, T., Rao, M.: Defence against black hole and selective forwarding attacks for medical WSNs in the IoT. Sensors 16(1), 118 (2016)

    Article  Google Scholar 

  18. Zhu, J., Zou, Y., Zheng, B.: Physical-layer security and reliability challenges for industrial wireless sensor networks. IEEE Access 5, 5313–5320 (2017)

    Google Scholar 

  19. Kurmi, J., Verma, R.S., Soni, S.: An efficient and reliable methodology for wormhole attack detection in wireless sensor network. Adv. Comput. Sci. Technol. 10(5), 1129–1138 (2017)

    Google Scholar 

  20. Mulla, M.R.I., Patil, R.: Review of attacks on wireless sensor network and their classification and security. Imperial J. Interdisc. Res. 2(7) (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vyshnavi Nagireddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nagireddy, V., Parwekar, P. (2019). Attacks in Wireless Sensor Networks. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 105. Springer, Singapore. https://doi.org/10.1007/978-981-13-1927-3_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1927-3_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1926-6

  • Online ISBN: 978-981-13-1927-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics