Comparison and detail study of attacks and detection methods for wireless sensor network

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Wireless sensor network is emanating technology in the field of telecommunications. WSNs can be applied in many fields like machine surveillance, precision agriculture, home automation and intelligent building environments. However the major aspect of WSN is the security as the sensor nodes are limited because of these facing several security threats such as black hole attack, worm hole attack, flooding etc. which is finally affecting the functioning of the whole network. These attacks are maximizing the consumption of power in the node and also it decreases life of the battery. In this paper, we discuss several types of security attacks in wireless sensor networks and also it introduces various intrusion detection systems to detect these attacks and prevent the compromised nodes in the WSN. And also we discuss about the different intrusion detection methods with the help of machine learning algorithms. In future these techniques can be helpful to create a safe and sophisticated network.



  • Keywords

    WSN, security, malicious node, machine learning, black hole attack.

  • References

      [1] Kahina CHELLI, “Security Issues in Wireless Sensor Networks: Attacks and Countermeasures”, Proceedings of the World Congress on Engineering, Vol.1, (2015).

      [2] Sumathi K & Dr. Venkatesan M, “A Survey on Detecting Compromised Nodes in Wireless Sensor networks”, International Journal of Computer Science and Information Technologies, Vol.5, No.6, (2014), pp.7720-7722.

      [3] Qusay I.S, “Security Attacks and Countermeasures for Wireless Sensor Networks: Survey”, International Journal of Current Engineering and Technology, (2013).

      [4] Benenson Z, Cholewinski M & Freiling C, “Vulnerabilities and Attacks in Wireless Sensor Networks”, Laboratory for Dependable Distributed Systems, University of Mannheim, (2010).

      [5] David M & Herve G, “Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey”, 13th International Conference on Network-Based Information Systems (NBiS), (2010).

      [6] Anitha SS, Shazia S & Dr. Vagdevi S, “Security Threats in Wireless Sensor Networks in Each Layer”, International Journal of Advanced Networking and Applications, Vol.4 No.4, (2013), pp.1657-1661.

      [7] Kaplantzis S, Mani N, Palaniswanmi M & Egan G, “Security models for wireless sensor networks”, Conversion report, Monash University, Vol.20, (2006).

      [8] Chris K & David W, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks Journal, Vol.1, No.2-3, (2003), pp.293-315.

      [9] Yan S, Zhu H & Ray Liu KJ, “Defense of Trust Management Vulnerabilities in Distributed Networks”, IEEE Communications Magazine, Vol.46, No.2, (2008), pp.112-119.

      [10] Yanli Y, Keqiu L, Wanlei Z & Ping L, “Trust mechanisms in wireless sensor networks: attack analysis and countermeasures”, Journal of Network and Computer Applications, Elsevier, (2011).

      [11] Xu W, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, Mobi Hoc ’05: Proc. 6th ACM Int. Symp. Mobile Ad Hoc Net. and Comp., (2005), pp.46–57.

      [12] Xu W, Trappe W & Zhang Y, “Channel Surfing: Defending Wireless Sensor Networks from Interference”, Information Processing in Sensor Networks, (2007).

      [13] Shih E, Cho S, Ickes N, Min R, Sinha A, Wang A & Chandrakasan A, “Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks”, Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (2013), pp.272-287.

      [14] Woo A & Culler D, “A Transmission Control Scheme for Media Access in Sensor Networks”, Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking, MobiCom, (2001).

      [15] Sohrabi K, Gao J, Ailawadhi V & Pottie GJ, “Protocols for Self-Organization of a Wireless Sensor Network”, IEEE Personal Communications, (2000), pp.16-27.

      [16] David RR & Scott FM, “Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses”, IEEE Pervasive Computing, Vol.7, No.1, (2008), pp.74-81.

      [17] Parno B, Perrig A & Gligor V, “Distributed Detection of Node Replication Attacks in Sensor Networks”, IEEE Symposium on Security and Privacy (S&P’05), (2005).

      [18] Atakli IM, Hu H, Chen Y, Ku WS & Su Z, “Malicious node detection in wireless sensor networks using weighted trust evaluation”, Proceedings of the Spring simulation multi conference, Society for Computer Simulation, (2008), pp.836-843.

      [19] Arolkar HA, Sheth SP & Tamhane VP, “Ant colony based approach for intrusion detection on cluster heads in WSN”, Proceedings of the International Conference on Communication, Computing & Security (2011), pp.523-526.

      [20] Ezeife CI, Ejelike M & Aggarwal, AK, “WIDS: a sensor-based online mining wireless intrusion detection system”, Proceedings of the international symposium on Database engineering & applications, (2008), pp.255-261.

      [21] Sa M & Rath AK, “A simple agent based model for detecting abnormal event patterns in distributed wireless sensor networks”, Proceedings of the International Conference on Communication, Computing & Security, (2011), pp.67-70.

      [22] Bao F, Chen R, Chang M & Cho JH, “Trust-based intrusion detection in wireless sensor networks”, IEEE International Conference on Communications (ICC), (2011), pp.1-6.

      [23] Song X, Chen G & Li X, “A weak hidden Markov model based intrusion detection method for wireless sensor networks”, International Conference on Intelligent Computing and Integrated Systems (ICISS), (2010), pp.887-889.

      [24] Stetsko A, Folkman L & Matyas V, “Neighbor-based intrusion detection for wireless sensor networks”, IEEE 6th International Conference on Wireless and Mobile Communications (ICWMC), (2010), pp.420-425.

      [25] Estiri M & Khademzadeh A, “A theoretical signaling game model for intrusion detection in wireless sensor networks”, 14th International conference on Telecommunications Network Strategy and Planning Symposium (NETWORKS), (2010), pp.1-6.

      [26] Yan KQ, Wang SC, Wang SS & Liu CW, “Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network”, 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Vol.1, (2010), pp.114-118.

      [27] Strikos AA, “A full approach for intrusion detection in wireless sensor networks”, School of Information and Communication Technology, (2007).

      [28] Mao Y, “A semantic-based intrusion detection framework for wireless sensor network”, IEEE 6th International Conference on Networked Computing (INC), (2010), pp.1-5.

      [29] Misra S, Krishna PV & Abraham KI, “Energy efficient learning solution for intrusion detection in wireless sensor networks”, IEEE Second International Conference on Communication Systems and Networks (COMSNETS), (2010), pp.1-6.

      [30] Crosby GV, Hester L & Pissinou N, “Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks”, IJ Network Security Vol.12, No.2, (2011), pp.107-117.

      [31] Chen RC, Hsieh CF & Huang YF, “An isolation intrusion detection system for hierarchical wireless sensor networks”, JNW, Vol.5, No.3, (2010), pp.335-342.

      [32] Yan KQ, Wang SC & Liu CW, “A hybrid intrusion detection system of cluster-based wireless sensor networks. In Proceedings of the International Multi Conference of Engineers and Computer Scientists, Vol.1, (2009), pp.18-20.

      [33] Idris MA, Hongbing H, Yu C, Wei SK & Zhou S, “Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation”, The Symposium on Simulation of Systems Security (SSSS’08), (2008).

      [34] Huo G & Wang X, “DIDS: A dynamic model of intrusion detection system in wireless sensor networks”, IEEE International Conference on Information and Automation, (2008), pp.374-378.

      [35] Chen RC, Haung YF & Hsieh CF, “Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology”, New Aspects of Applied Informatics, Biomedical Electronics and Informatics and Communications, (2010).




Article ID: 12453
DOI: 10.14419/ijet.v7i2.21.12453

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.