SlideShare a Scribd company logo
1 of 6
Download to read offline
2017 2nd
IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India
978-1-5090-3704-9/17/$31.00 © 2017 IEEE
1979
A Review on Security and Privacy Issues in
Wireless Sensor Networks
SunilKumar K N,
Dept. of E & CE, SVCE, Bengaluru, India
Sunilkumarkn26@gmail.com
Shivashankar
Dept. of E & CE, SVCE, Bengaluru, India
chenduss@gmail.com
Abstract: Wireless network sensors consist of a large number of
pocket- sized sensors deployed in autonomous manner in the area
under surveillance. The sensor networks are used in sensitive,
unattended and remote environment. They have a wide range of
applications and are used in almost every field like agriculture,
industry, public safety and health. They are used to gain
knowledge about various parameters like temperature,
vibrations, motion etc. in the area. The cost of establishment and
maintenance of these networks is reasonable. These sensor
networks face a lot of challenges owing to the use of wireless
medium for communication which is prone to various types of
attacks. There are various issues like energy exhaustion, memory
and storage shortage, security attacks. It is very important to
safeguard the network for reliable communication. Attacks result
in loss of information and there is a cutback in number of bits
transferred per second that is the throughput reduces. This paper
discusses the security requirements, security attacks and
countermeasures against the attacks.
Keywords—Wireless Sensor Networks (WSNs); Security
requirements and Security attacks
I. INTRODUCTION
Wireless sensor network (WSN) is made up of large
number of minute sized sensors. The assembly of network
consists of sensing entity, computing and processing entity
and wireless communication entity. There are two types of
motes- sink mote and the sensor motes. The sink node is
also called base station. It instructs the sensor nodes about
the type of data to be collected from the area under
surveillance. The sensing unit of wireless sensor network,
consisting of the sensor nodes, gathers the information and
reports back to the sink node. The storage and processing of
data takes place in the computing unit. The transmission of
data occurs through multiple hops and RF band is used [1].
The Characteristics of WSNs are as follows:
WSN are application specific and collect real time data.
They perform specialized task as per the demand of the
application.
They are limited in terms of energy, power and
battery life.
The installation and maintenance cost is less. They are
influenced by noisy environment and are susceptible
to various types of attacks.
Measures need to be taken against the attackers so that
secure and reliable communication can be ensured .
II. SECURITY ISSUES
Data Confidentiality
Data should not be disclosed to any third-party.
Secrecy of the information should be maintained.
Unauthorized users should not be able to overhear the
information.
Data Integrity
For secure and reliable communication, data
received at the destination node must be same as that sent by
the source node. The intermediate nodes must not change the
information contained in the packets. Malicious activity
should not corrupt the data [3]. key difference between and
brief elucidation of the scope of IoT in personalized health
care, that ranges from wrist worn devices to health care
systems.
Data Authentication
The attacker can not only alter the information
contained in the packets but can also introduce fallacious
packets in the network. So verification of sender and
receiver identities needs to be carried out as a defense
against the action of any malicious activity.
Fig. 1: Architecture of Wireless Sensor Networks [4]
2017 2nd
IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India
1980
Data authentication is challenging for WSNs as they are
deployed in remote areas where it is very difficult to verify
the identity of the sender. Only the authorized users should be
able to access the information and the illegitimate users
should be denied the access [3] [5].
Data Availability
Availability of data is very vital for proper
functioning of the network. Services of the network should
be available whenever necessary. Users should be able to
use the resources whenever they intend to [6].
Data Freshness
Data freshness implies that the information
received is current and up-to-date. The previous data should
not be repeated [5].
III DIFFERENT ATTACKS IN WSN
Different layers of OSI are prone to different
attacks. The attacks can be classified into passive
attacks and active attacks. Passive intrusion doesn’t hinder
the operation of the network. They eavesdrop the
information i.e. the data confidentiality is lost. They are
difficult to detect as they are silent and don’t make their
presence felt. Monitoring and Eavesdropping is the most
common feature of passive attacks. Passive attacker snoops
into the network and overhears the contents [3].
Active attacker alters the message and obstructs the
secure and reliable communication. An active attacker may
harm the network in different ways. Such an attacker can
hinder the performance by not delivering the packets to the
authorized and intended user or by misleading the
destination node by introducing fake packets. Illegitimate
user could gain the access to the confidential data and
misuse it. A false node can be introduced by the attacker.
This node is called malicious or compromised node. This
node can alter the message contents; thus the data integrity
is lost. Wormhole attack, blackhole attack and denial of
service attack are some of the active attacks [7] [5]. Some
of the attacks are explained as follows:
A Jamming
An eminent attack on physical layer of wireless networks
is known as ‘Jamming’ that hampers with the radio
frequencies used by the network nodes. In case of
single frequency transmission, the attack is effective and
disrupts the network. The adversary starts communicating at
same RF frequency as that of the network and
causes unnecessary energy consumption by inserting
intrusive malicious packets. Nodes must follow tactics
against such attacks like they can stop communicating or
forwarding packets and switch to sleep mode during
jamming phase and wake up when jamming period ends
[3] [8].
B. Tempering
In tempering, attacker can temper the node
physically and manipulate the data.Cognizant information like
the cryptographic keys can be extracted by the attacker. This
may result in loss of important and higher level of
information. This attack occurs at physical layer of OSI.
Temper proof physical packaging is the only possible
defensive strategy against such attacks.
C. EXHAUSTION (CONTINUOUS CHANNEL ACCESS)
This attack occurs at the data link layer. The
attacker interrupts and confuses the channel by
iteratively asking. This attack occurs at the data link
layer. The attacker interrupts and confuses the channel
by iteratively asking queries and transmitting over it. It
traps the channel and doesn’t allow the legitimate users to
access the channel and send the data packets. This often
results in starvation. The sensor nodes are exhausted in
terms of power as most of their energy goes wasted in
serving the uncalled intrusive packets. One solution against
this attack is limiting the request rate so that unnecessary
requests can be discarded without wasting power. Yet the
limit can’t be less than the conventional maximum data
rate. Since time slots are divided for every node in time
division multiplexing, so it can also be a probable solution for
preventing such attacks.
D. Collision
When any two nodes undergo concurrent
transmissions over similar frequency channels collision can
occurs. When this happens, there is a small amount of
change in the packet. This results in a mismatch when
checksum is computed at the receiving end. The packets
need to re-transmitted in case of the mismatch and leads to
unnecessary energy consumption. Collision occurs at data
link layer. To prevent such situation error correcting codes
can be used at low collision levels.
E. Routing Information
The prime focus of such an attack is on the routing
protocols. The information contained in them can be
changed. As the routing information changes, the
packets follow a path different from the intended one
and hence are misdirected. This attack occurs at the
network layer. A MAC code along with the message can be
used for preventing such attacks
F. Selective Forwarding
For a reliable and secure communication, the
information received at the destination must be exactly same
to that sent by the source node. But the malicious nodes
may selectively forward the packets to the subsequent node
and drop the rest. This results in loss of important data. In
case all the packets are dropped and none is forwarded,
the attack is called blackhole attack. This attack affects the
network layer.
One of the solutions for this attack could be
transmitting data through multiple paths. In this case if one
2017 2nd
IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India
1981
path is affected by some malicious activity, another path
may result in secure communication [9].
G. Sinkhole Attacks
Network layer is affected by this attack. The
surrounding nodes are forged by the attackers. The
adversary attracts the nearby motes by using attractive
bandwidth or path and fools the motes. The fooled motes
route data to the compromised node resulting in packet
dropping. This may further lead to selective forwarding,
blackhole attack or sinkhole attack.
H. Sybil Attack
The attacker in this case has multiple identities and
fools the surrounding nodes. Network layer is prone to such
an attack One countermeasure against Sybil attack is
authentication and encryption [5].
I. WORMHOLE
In this attack, the attacker overhears the
communication between two motes and replays it between the
motes far away physically giving an illusion that the distant
motes are very close to each other. This attack occurs at
network layer.
J. Hello Flood Attack
Hello packets are broadcasted to the network by the
malicious nodes. High power RF transmitters are used. This is
done so as to make the nodes believe that the malicious
nodes are neighbourhood nodes. This results in loss of
information as the legitimate user doesn’t get the access
to the channel. Network layer is affected by the hello
packets.
K. Flooding
The adversary sends new connection request to
the nodes again and again until the resources of the nodes are
exhausted. The legitimate requests are thus ignored as the
channel is occupied by the attacker. Flooding attack occurs
at transport layer,
L. Black hole attack
In this attack the attacker take hold of the
node and reprograms it. The attacker drops the packets
and doesn’t allow the node to pass the information to
subsequent nodes. This results in loss of data packets [10]
M. Denial of service attack
A Denial of service attack is an attempt to prohibit
the genuine user of a service or data. The destination
system is overwhelmed with fallacious requests such
that it cannot acknowledge the genuine traffic. Thus
the services are inaccessible to the authorized users. The
efficiency of the system is affected; performance decreases
and eventually the network stop functioning. Using the
sensor networks in sensitive and critical areas intensifies
the likelihood of DOS attacks. This attack drains off the
energy of the node and knocks down the network [11].
N.Misdirection attack
Misdirection attack is a kind of DOS attack. The
incoming packets are misdirected to a mote other than the
expected mote. This results in loss of important data. The
intended user is deprived of the services; consequently
leading to delay and decreased throughput [12]. It can
be performed in the following ways:
Packets are delivered to mote close to the destination
mote: This type of attack is less harmful and less
powerful. The packets are routed to mote close to the
intended one; they reach the destination following a
different path and not the intended path. Thus the packets
are delayed and the number of bits transferred per
second i.e. throughput decreases.
Packets are delivered to mote far away from the
destination mote: this type of attack is more
venomous. The packets are delivered to mote which is
far away from the intended user and thus never reach
the destination. This results in infinite delay and zero
throughput [13].
IV. COUNTER MEASURES AGAINST THE ATTACK
Modifications to the Link-Layer:
WSNs are prone to various types of attacks. Energy-
efficient link layer jamming attack is one of the highly
perceptible threats for wireless sensor networks. In this the
attacker drains away the energy of the nodes. There is
unnecessary consumption of energy and large amount of
delay. The MAC protocol of the link layer is the main target of
jammer. The Data Packet Separation Slot Size Randomization
(DSSSR) and Round Robin (RR) slot size assignments are the
modifications to the sub layer. These modifications aim at
exhausting the energy of the jammer. The first modification
divides the data packet into two parts and helps in
bewildering the jammer by giving an illusion that the slot
size is smaller in size. The jammer thus loses power by
jamming at higher rate. Using Round Robin eliminates
adverse impact on throughput of network which would
otherwise occur due to the first modification. The second
modification ensures that all the nodes are able to transmit for
equal time intervals [14].
Cluster-Based Technique against Misdirection Attack:
Misdirection attack is a type of Denial-of-service attack.
In this the malicious nodes misdirects the data to a different
path other than the intended one. This results in large amount
of delay which may approach infinity; the throughput also
decreases. Cluster based technique is an effective technique
against the misdirection attack. This technique detects and
2017 2nd
IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India
1982
Table I. VARIOUS ATTACKS IN WIRELESS SENSOR NETWORKS
Attack Strategy of attacker Consequences of the attack OSI Layer
affected
Defence against the
attack
Jamming Hampers with the radio
frequencies used by the nodes
1. Exhaustion of node resources
2. Data packet collision
Physical Sleep mode
Denial of service Sends abundant packets that
result in network destruction
1. Exhaustion
2. Collision
Physical
And network
Temper-proof
packaging
Collision Two nodes simultaneously
transmit traffic with same
frequency
1. Discarding of packet
2. Interferences
Network Error-correcting codes
can be used
Hello packets attack Keeps the track of packets
being sent
1. Data congestion Network Geographic routing
Selective forwarding Malicious nodes are
introduced in the network
1. Packets are selectively forwarded
and dropped according to attackers’
wish
Network Transmitting data
through multiple paths.
Sybil attack The attacker has multiple
identities and fools the
network
1. Attacker can introduce any fallacious
packets in the network and disrupts
the data integrity
Network Authentication and
encryption
isolates the malicious nodes from the network by forming
clusters. Cluster head compares the parameters stored in its
own buffer and the buffer of nodes through which data packets
route and detects the malicious nodes. It then alerts the other
nodes by passing the identity of the malicious nodes.
Theneighboring nodes thus block the malicious node [13].
Technique for Detecting Mobile Malicious Nodes In Static
Sensor Network:
Mobile malicious node attacks are treacherous and
early detection of this attack is required for the minimization
of loss caused by this attack. The wireless sensor network is
usually static that is the nodes are not capable of moving. The
attacker launches the attack by introducing mobile malicious
nodes. Uncompromised nodes usually communicate at regular
intervals of time but the mobile nodes after launching the
attack at one location move to another location and stop
communicating with the previous neighbourhood nodes. The
nodes which are silent for longer time periods than expected
are considered to be mobile in the otherwise static network.
These nodes are thus blocked [15].
Dual-Weighted Trust Evaluation Technique:
The detection of malicious nodes is done without
sacrificing fault free in the presence of noise and natural
faults. In a hierarchical sensor network Dual weighted trust
evaluation (DWE) detects malicious nodes when the fault
occurs. Two trust values are assigned to every sensor node.
The misdetection rate is kept low by updating policy and
higher detection rate for fault and related probabilities is
achieved. Trust values are the weights at each subsequent
node. Fault free nodes have trust value close to one while the
faulty nodes have a decrease in value which leads to their
detection [16].
Malicious Node Detection Using Dual Threshold:
Malicious nodes can be detected by using two
thresholds instead of one. This technique is more efficient and
gives better results than the one using single value of
threshold. Compromised nods are detected with higher
accuracy. False alarm rate decreases and event detection
accuracy increases by using two threshold values. Malicious
node detection rate increases without compromising the
performance of fault –free nodes [17].
2017 2nd
IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India
1983
Using Low Energy Adaptive Clustering Hierarchy (leach)
protocol
LEACH is used for detecting grayhole attack,
blackhole attack and misdirection attack. LEACH is an energy
efficient protocol. Nodes are grouped into clusters based on
the protocol. Cluster heads are made which handle the sensor
nodes grouped in their cluster. The sensor nodes report the
data to the cluster head. Using this protocol saves energy and
prolongs the lifetime of the network [18].
Message observation mechanism (MoM) method
This method can be used against the denial-of-service
attacks. Two lists are formed for distinguishing the fallacious
packets and the legitimate data packets. These lists are normal
message list and abnormal message list. On the basis of data
contained in these lists the incoming packet is judged whether
it is legitimate or malicious. The malicious node is thus
identified using this strategy. Malicious nod ID is sent to the
neighboring nodes which block that node and it is no longer
able to corrupt the data. Next the cryptographic keys are used
to rekey and reprogram the nodes so as to protect them from
further intrusion. This method reduces computation and lesser
energy is consumed [19].
Using Hybrid Energy Efficient Distributed (HEED) Clustering
protocol
HEED is an effective protocol in terms of
energy consumption. Number of iterations required for
satisfactory clustering is less and control overhead is
also reduced. Residual energy in the node is used to decide
the cluster head. The cluster heads report to the base station
and session keys are distributed by Key Distribution
System (KDS). This protocol is better than LEACH as the
head of the cluster is decided on the basis of residual
energy whereas in LEACH random selection of cluster head
is done. It helps in increasing the network lifetime [20].
V. CONCLUSION
While there are many strategies to counteract
against the security attacks still an upgrade in the
technology is needed. The attacks act against the data
availability goal of the secure communication. They drain
off the energy of the nodes and decrease the network
lifetime. Measures need to be taken against the active and
passive attackers so as to maintain the data integrity and
authenticity. Security mechanism needs to be made more
efficient. This could be done by making the protocols
operating at different layers more resistant to attacks.
Cryptographic and clustering techniques could be used to
strengthen the network against any kind of malicious
activity. The above mentioned defensive techniques need to be
made stronger so as to safeguard the network.
REFERENCES
[1] Jijesh j j and shivashankar,“A Survey on Wireless Body Sensor Network
Routing Protocol Classification”,IEEE 11 th International Conference on
Intelligent Systems and Control (ISCO) 2017. DOI:
10.1109/ISCO.2017.7856042
[2]. Vikash Mainanwal, Mansi Gupta, Shravan Kumar Upadhayay, "A Survey
on Wireless Body Area Network: Security Technology and its Design
Methodology issue", IEEE Sponsored 2nd Intelllational Conference on
Innovations in Infonnation,Embedded and Communication systems (IC
TIECS)20 I 5
[3] Sophia, Alistair Shilton, Nallasamy Mani, and Y. Ahmet Kaplantzis,
ƞekercioğlu. "Detecting selective forwarding attacks in wireless sensor
networks using support vector machines." In Intelligent Sensors, Sensor
Networks and Information, 2007. ISSNIP 2007. 3rd International Conference
on, pp. 335-340. IEEE, 2007
[4]. L. Atzori, A .lera and G. Morabito, “The internet of Things: A survey,”
Comput. Netw., vol. 54, no. 15, pp.2787-2805, Oct. 2010.
[5] Ghildiyal, Sunil, Amit Kumar Mishra, Ashish Gupta, and Neha Garg.
"Analysis of Denial of Service (DoS) Attacks in Wireless Sensor
Networks."IJRET: International Journal of Research in Engineering and
Technology pp.2319-1163.
[6] Modares, Hero, Rosli Salleh, and Amirhossein Moravejosharieh.
"Overview of security issues in wireless sensor networks." In Computational
Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International
Conference on, pp. 308-311. IEEE, 2011.
[7] Mohammadi, Shahriar, and Hossein Jadidoleslamy. "A comparison of link
layer attacks on wireless sensor networks." arXiv preprint
arXiv:1103.5589,2011.
[8] Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks,
security mechanisms and challenges in wireless sensor networks." arXiv
preprint arXiv:0909.0576 ,2009.
[9] Kavitha, C. "A survey on secured routing protocols for wireless sensor
network." In 2012 Third International Conference on Computing,
Communication and Networking Technologies (ICCCNT'12), pp. 1-8. 2012.
[10] Agah, Afrand, and Sajal K. Das. "Preventing DoS Attacks in
Wireless Sensor Networks: A Repeated Game Theory Approach." IJ
Network Security5, no. 2 pp. 145-153,2007.
[11] Lédeczi, Ákos, and Miklós Maróti. "Wireless sensor
node localization."Philosophical Transactions of the Royal Society of
London A: Mathematical, Physical and Engineering Sciences 370, no.
1958 pp. 85-99,2012.
[12] Islam, Md Safiqul, and Syed Ashiqur Rahman. "Anomaly
intrusion detection system in wireless sensor networks: security threats
and existing approaches." International Journal of Advanced Science and
Technology 36, no. 1 pp. 1-8 ,2011.
[13] Dhulkar, Ruchita, Ajit Pokharkar, and Mrs Rohini Pise. "Survey on
different attacks in Wireless Sensor Networks and their prevention system."
,2015.
[14] Ghosh, Arindam, and Krishna Doddapaneni. "Analysis of Denial-of-
Service attacks on Wireless Sensor Networks using simulation." IT Security
for the Next Generation-European Cup 2011 ,2011.
[15] Ahmed, Muhammad Raisuddin. "Protecting Wireless Sensor
Networksfrom Internal Attacks." PhD diss., University of Canberra, 2014.
[16]Sachan, Roshan Singh, Mohammad Wazid, Dhirendra Pratap Singh, and
R. H. Goudar. "A cluster based intrusion detection and prevention technique
for misdirection attack inside WSN." In Communications and Signal
Processing (ICCSP), 2013 International Conference on, pp. 795-801. IEEE,
2013.
2017 2nd
IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India
1984
[17] Al-Otaibi S, Siewe F, “Secure Routing Protocol Base on Secure Path in
Ad hoc Wireless Networks”, IEEE International Forum on Computer Science-
Technology and Applications (IFCSTA 2009).
[18] Shivashankar, “Design and development of new apparatus in VANETs
for safety and accident avoidance”, Proceedings of IEEE International
Conference on Recent Trends in Electronics, Information & Communication
Technology (RTEICT), ISBN: 978-1-5090-0774-5,
DOI: 10.1109/RTEICT.2016.7808122, pp. 1695 – 1698, 2016.
[19] Shivashankar and Pramod, “Random node deployment and route
establishment in receiver based routing protocol for WSNs”, Proceedings of
IEEE International Conference on Recent Trends in Electronics, Information
& Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5,
DOI: 10.1109/RTEICT.2016.7807786. pp. 74 – 78, 2016.
[19] Shivashankar, P Rajendra Prasad, S Santosh Kumar and K N Sunil
Kumar, “An efficient routing algorithm based on ant colony optimisation for
VANETs”, Proceedings of IEEE International Conference on Recent Trends
in Electronics, Information & Communication Technology (RTEICT), ISBN:
978-1-5090-0774-5, 10.1109/RTEICT.2016.7807858, pp. 436 – 440, 2016.
[20] Shivashankar, Ravigatti, P Rajendra Prasad, S Santosh Kumar and K N
Sunil Kumar “Improvement of speed in data collection rate in tree based
wireless sensor network”, Proceedings of IEEE International Conference on
Recent Trends in Electronics, Information & Communication Technology
(RTEICT), ISBN: 978-1-5090-0774-5, 10.1109/RTEICT.2016.7807918, pp.
720 – 723, 2016.
[21] Shivashankar, K N Sunil Kumar, Ravigatti, P Rajendra Prasad and S
Santosh Kumar, “Opportunistic routing technique for minimized energy
consumption for relay node selection in wireless sensor networks”,
Proceedings of IEEE International Conference on Recent Trends in
Electronics, Information & Communication Technology (RTEICT), ISBN:
978-1-5090-0774-5, DOI: 10.1109/RTEICT.2016.7808208, pp. :2093 – 2097,
2016.
[22] Ravi Gatti, S Santosh Kumar, Shivashankar, K N Sunil Kumar and P
Rajendra Prasad P, “Improvement of speed in data collection rate in tree based
wireless sensor network”, Proceedings of IEEE International Conference on
Recent Trends in Electronics, Information & Communication Technology
(RTEICT), ISBN: 978-1-5090-0774-5, DOI:10.1109/RTEICT.2016.7807918,
pp. 720 – 723, 2016

More Related Content

What's hot

An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksiosrjce
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengeseSAT Publishing House
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networkseSAT Journals
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)IRJET Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...ambitlick
 
76201924
7620192476201924
76201924IJRAT
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networkseditor1knowledgecuddle
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in maneteSAT Journals
 

What's hot (19)

An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Analysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challengesAnalysis of wireless sensor networks security, attacks and challenges
Analysis of wireless sensor networks security, attacks and challenges
 
Analysis of wireless sensor networks
Analysis of wireless sensor networksAnalysis of wireless sensor networks
Analysis of wireless sensor networks
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
D43021519
D43021519D43021519
D43021519
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...Ktr an efficient key management scheme for secure data access control in wire...
Ktr an efficient key management scheme for secure data access control in wire...
 
76201924
7620192476201924
76201924
 
An Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc NetworksAn Overview of security issues in Mobile Ad hoc Networks
An Overview of security issues in Mobile Ad hoc Networks
 
1705 1708
1705 17081705 1708
1705 1708
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 
Attacks in manet
Attacks in manetAttacks in manet
Attacks in manet
 

Similar to IEEE 2017 Conference Reviews Security Privacy Wireless Sensor Networks

PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbalIAESIJEECS
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor NetworksIRJET Journal
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016IJERA Editor
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 

Similar to IEEE 2017 Conference Reviews Security Privacy Wireless Sensor Networks (20)

PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
N010617783
N010617783N010617783
N010617783
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
IRJET-  	  Identification of Vampire Assault in Wireless Sensor NetworksIRJET-  	  Identification of Vampire Assault in Wireless Sensor Networks
IRJET- Identification of Vampire Assault in Wireless Sensor Networks
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 

Recently uploaded

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 

Recently uploaded (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAĐĄY_INDEX-DM_23-1-final-eng.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
à€­à€Ÿà€°à€€-à€°à„‹à€ź à€”à„à€Żà€Ÿà€Șà€Ÿà€°.pptx, Indo-Roman Trade,
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 

IEEE 2017 Conference Reviews Security Privacy Wireless Sensor Networks

  • 1. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India 978-1-5090-3704-9/17/$31.00 © 2017 IEEE 1979 A Review on Security and Privacy Issues in Wireless Sensor Networks SunilKumar K N, Dept. of E & CE, SVCE, Bengaluru, India Sunilkumarkn26@gmail.com Shivashankar Dept. of E & CE, SVCE, Bengaluru, India chenduss@gmail.com Abstract: Wireless network sensors consist of a large number of pocket- sized sensors deployed in autonomous manner in the area under surveillance. The sensor networks are used in sensitive, unattended and remote environment. They have a wide range of applications and are used in almost every field like agriculture, industry, public safety and health. They are used to gain knowledge about various parameters like temperature, vibrations, motion etc. in the area. The cost of establishment and maintenance of these networks is reasonable. These sensor networks face a lot of challenges owing to the use of wireless medium for communication which is prone to various types of attacks. There are various issues like energy exhaustion, memory and storage shortage, security attacks. It is very important to safeguard the network for reliable communication. Attacks result in loss of information and there is a cutback in number of bits transferred per second that is the throughput reduces. This paper discusses the security requirements, security attacks and countermeasures against the attacks. Keywords—Wireless Sensor Networks (WSNs); Security requirements and Security attacks I. INTRODUCTION Wireless sensor network (WSN) is made up of large number of minute sized sensors. The assembly of network consists of sensing entity, computing and processing entity and wireless communication entity. There are two types of motes- sink mote and the sensor motes. The sink node is also called base station. It instructs the sensor nodes about the type of data to be collected from the area under surveillance. The sensing unit of wireless sensor network, consisting of the sensor nodes, gathers the information and reports back to the sink node. The storage and processing of data takes place in the computing unit. The transmission of data occurs through multiple hops and RF band is used [1]. The Characteristics of WSNs are as follows: WSN are application specific and collect real time data. They perform specialized task as per the demand of the application. They are limited in terms of energy, power and battery life. The installation and maintenance cost is less. They are influenced by noisy environment and are susceptible to various types of attacks. Measures need to be taken against the attackers so that secure and reliable communication can be ensured . II. SECURITY ISSUES Data Confidentiality Data should not be disclosed to any third-party. Secrecy of the information should be maintained. Unauthorized users should not be able to overhear the information. Data Integrity For secure and reliable communication, data received at the destination node must be same as that sent by the source node. The intermediate nodes must not change the information contained in the packets. Malicious activity should not corrupt the data [3]. key difference between and brief elucidation of the scope of IoT in personalized health care, that ranges from wrist worn devices to health care systems. Data Authentication The attacker can not only alter the information contained in the packets but can also introduce fallacious packets in the network. So verification of sender and receiver identities needs to be carried out as a defense against the action of any malicious activity. Fig. 1: Architecture of Wireless Sensor Networks [4]
  • 2. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India 1980 Data authentication is challenging for WSNs as they are deployed in remote areas where it is very difficult to verify the identity of the sender. Only the authorized users should be able to access the information and the illegitimate users should be denied the access [3] [5]. Data Availability Availability of data is very vital for proper functioning of the network. Services of the network should be available whenever necessary. Users should be able to use the resources whenever they intend to [6]. Data Freshness Data freshness implies that the information received is current and up-to-date. The previous data should not be repeated [5]. III DIFFERENT ATTACKS IN WSN Different layers of OSI are prone to different attacks. The attacks can be classified into passive attacks and active attacks. Passive intrusion doesn’t hinder the operation of the network. They eavesdrop the information i.e. the data confidentiality is lost. They are difficult to detect as they are silent and don’t make their presence felt. Monitoring and Eavesdropping is the most common feature of passive attacks. Passive attacker snoops into the network and overhears the contents [3]. Active attacker alters the message and obstructs the secure and reliable communication. An active attacker may harm the network in different ways. Such an attacker can hinder the performance by not delivering the packets to the authorized and intended user or by misleading the destination node by introducing fake packets. Illegitimate user could gain the access to the confidential data and misuse it. A false node can be introduced by the attacker. This node is called malicious or compromised node. This node can alter the message contents; thus the data integrity is lost. Wormhole attack, blackhole attack and denial of service attack are some of the active attacks [7] [5]. Some of the attacks are explained as follows: A Jamming An eminent attack on physical layer of wireless networks is known as ‘Jamming’ that hampers with the radio frequencies used by the network nodes. In case of single frequency transmission, the attack is effective and disrupts the network. The adversary starts communicating at same RF frequency as that of the network and causes unnecessary energy consumption by inserting intrusive malicious packets. Nodes must follow tactics against such attacks like they can stop communicating or forwarding packets and switch to sleep mode during jamming phase and wake up when jamming period ends [3] [8]. B. Tempering In tempering, attacker can temper the node physically and manipulate the data.Cognizant information like the cryptographic keys can be extracted by the attacker. This may result in loss of important and higher level of information. This attack occurs at physical layer of OSI. Temper proof physical packaging is the only possible defensive strategy against such attacks. C. EXHAUSTION (CONTINUOUS CHANNEL ACCESS) This attack occurs at the data link layer. The attacker interrupts and confuses the channel by iteratively asking. This attack occurs at the data link layer. The attacker interrupts and confuses the channel by iteratively asking queries and transmitting over it. It traps the channel and doesn’t allow the legitimate users to access the channel and send the data packets. This often results in starvation. The sensor nodes are exhausted in terms of power as most of their energy goes wasted in serving the uncalled intrusive packets. One solution against this attack is limiting the request rate so that unnecessary requests can be discarded without wasting power. Yet the limit can’t be less than the conventional maximum data rate. Since time slots are divided for every node in time division multiplexing, so it can also be a probable solution for preventing such attacks. D. Collision When any two nodes undergo concurrent transmissions over similar frequency channels collision can occurs. When this happens, there is a small amount of change in the packet. This results in a mismatch when checksum is computed at the receiving end. The packets need to re-transmitted in case of the mismatch and leads to unnecessary energy consumption. Collision occurs at data link layer. To prevent such situation error correcting codes can be used at low collision levels. E. Routing Information The prime focus of such an attack is on the routing protocols. The information contained in them can be changed. As the routing information changes, the packets follow a path different from the intended one and hence are misdirected. This attack occurs at the network layer. A MAC code along with the message can be used for preventing such attacks F. Selective Forwarding For a reliable and secure communication, the information received at the destination must be exactly same to that sent by the source node. But the malicious nodes may selectively forward the packets to the subsequent node and drop the rest. This results in loss of important data. In case all the packets are dropped and none is forwarded, the attack is called blackhole attack. This attack affects the network layer. One of the solutions for this attack could be transmitting data through multiple paths. In this case if one
  • 3. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India 1981 path is affected by some malicious activity, another path may result in secure communication [9]. G. Sinkhole Attacks Network layer is affected by this attack. The surrounding nodes are forged by the attackers. The adversary attracts the nearby motes by using attractive bandwidth or path and fools the motes. The fooled motes route data to the compromised node resulting in packet dropping. This may further lead to selective forwarding, blackhole attack or sinkhole attack. H. Sybil Attack The attacker in this case has multiple identities and fools the surrounding nodes. Network layer is prone to such an attack One countermeasure against Sybil attack is authentication and encryption [5]. I. WORMHOLE In this attack, the attacker overhears the communication between two motes and replays it between the motes far away physically giving an illusion that the distant motes are very close to each other. This attack occurs at network layer. J. Hello Flood Attack Hello packets are broadcasted to the network by the malicious nodes. High power RF transmitters are used. This is done so as to make the nodes believe that the malicious nodes are neighbourhood nodes. This results in loss of information as the legitimate user doesn’t get the access to the channel. Network layer is affected by the hello packets. K. Flooding The adversary sends new connection request to the nodes again and again until the resources of the nodes are exhausted. The legitimate requests are thus ignored as the channel is occupied by the attacker. Flooding attack occurs at transport layer, L. Black hole attack In this attack the attacker take hold of the node and reprograms it. The attacker drops the packets and doesn’t allow the node to pass the information to subsequent nodes. This results in loss of data packets [10] M. Denial of service attack A Denial of service attack is an attempt to prohibit the genuine user of a service or data. The destination system is overwhelmed with fallacious requests such that it cannot acknowledge the genuine traffic. Thus the services are inaccessible to the authorized users. The efficiency of the system is affected; performance decreases and eventually the network stop functioning. Using the sensor networks in sensitive and critical areas intensifies the likelihood of DOS attacks. This attack drains off the energy of the node and knocks down the network [11]. N.Misdirection attack Misdirection attack is a kind of DOS attack. The incoming packets are misdirected to a mote other than the expected mote. This results in loss of important data. The intended user is deprived of the services; consequently leading to delay and decreased throughput [12]. It can be performed in the following ways: Packets are delivered to mote close to the destination mote: This type of attack is less harmful and less powerful. The packets are routed to mote close to the intended one; they reach the destination following a different path and not the intended path. Thus the packets are delayed and the number of bits transferred per second i.e. throughput decreases. Packets are delivered to mote far away from the destination mote: this type of attack is more venomous. The packets are delivered to mote which is far away from the intended user and thus never reach the destination. This results in infinite delay and zero throughput [13]. IV. COUNTER MEASURES AGAINST THE ATTACK Modifications to the Link-Layer: WSNs are prone to various types of attacks. Energy- efficient link layer jamming attack is one of the highly perceptible threats for wireless sensor networks. In this the attacker drains away the energy of the nodes. There is unnecessary consumption of energy and large amount of delay. The MAC protocol of the link layer is the main target of jammer. The Data Packet Separation Slot Size Randomization (DSSSR) and Round Robin (RR) slot size assignments are the modifications to the sub layer. These modifications aim at exhausting the energy of the jammer. The first modification divides the data packet into two parts and helps in bewildering the jammer by giving an illusion that the slot size is smaller in size. The jammer thus loses power by jamming at higher rate. Using Round Robin eliminates adverse impact on throughput of network which would otherwise occur due to the first modification. The second modification ensures that all the nodes are able to transmit for equal time intervals [14]. Cluster-Based Technique against Misdirection Attack: Misdirection attack is a type of Denial-of-service attack. In this the malicious nodes misdirects the data to a different path other than the intended one. This results in large amount of delay which may approach infinity; the throughput also decreases. Cluster based technique is an effective technique against the misdirection attack. This technique detects and
  • 4. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India 1982 Table I. VARIOUS ATTACKS IN WIRELESS SENSOR NETWORKS Attack Strategy of attacker Consequences of the attack OSI Layer affected Defence against the attack Jamming Hampers with the radio frequencies used by the nodes 1. Exhaustion of node resources 2. Data packet collision Physical Sleep mode Denial of service Sends abundant packets that result in network destruction 1. Exhaustion 2. Collision Physical And network Temper-proof packaging Collision Two nodes simultaneously transmit traffic with same frequency 1. Discarding of packet 2. Interferences Network Error-correcting codes can be used Hello packets attack Keeps the track of packets being sent 1. Data congestion Network Geographic routing Selective forwarding Malicious nodes are introduced in the network 1. Packets are selectively forwarded and dropped according to attackers’ wish Network Transmitting data through multiple paths. Sybil attack The attacker has multiple identities and fools the network 1. Attacker can introduce any fallacious packets in the network and disrupts the data integrity Network Authentication and encryption isolates the malicious nodes from the network by forming clusters. Cluster head compares the parameters stored in its own buffer and the buffer of nodes through which data packets route and detects the malicious nodes. It then alerts the other nodes by passing the identity of the malicious nodes. Theneighboring nodes thus block the malicious node [13]. Technique for Detecting Mobile Malicious Nodes In Static Sensor Network: Mobile malicious node attacks are treacherous and early detection of this attack is required for the minimization of loss caused by this attack. The wireless sensor network is usually static that is the nodes are not capable of moving. The attacker launches the attack by introducing mobile malicious nodes. Uncompromised nodes usually communicate at regular intervals of time but the mobile nodes after launching the attack at one location move to another location and stop communicating with the previous neighbourhood nodes. The nodes which are silent for longer time periods than expected are considered to be mobile in the otherwise static network. These nodes are thus blocked [15]. Dual-Weighted Trust Evaluation Technique: The detection of malicious nodes is done without sacrificing fault free in the presence of noise and natural faults. In a hierarchical sensor network Dual weighted trust evaluation (DWE) detects malicious nodes when the fault occurs. Two trust values are assigned to every sensor node. The misdetection rate is kept low by updating policy and higher detection rate for fault and related probabilities is achieved. Trust values are the weights at each subsequent node. Fault free nodes have trust value close to one while the faulty nodes have a decrease in value which leads to their detection [16]. Malicious Node Detection Using Dual Threshold: Malicious nodes can be detected by using two thresholds instead of one. This technique is more efficient and gives better results than the one using single value of threshold. Compromised nods are detected with higher accuracy. False alarm rate decreases and event detection accuracy increases by using two threshold values. Malicious node detection rate increases without compromising the performance of fault –free nodes [17].
  • 5. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India 1983 Using Low Energy Adaptive Clustering Hierarchy (leach) protocol LEACH is used for detecting grayhole attack, blackhole attack and misdirection attack. LEACH is an energy efficient protocol. Nodes are grouped into clusters based on the protocol. Cluster heads are made which handle the sensor nodes grouped in their cluster. The sensor nodes report the data to the cluster head. Using this protocol saves energy and prolongs the lifetime of the network [18]. Message observation mechanism (MoM) method This method can be used against the denial-of-service attacks. Two lists are formed for distinguishing the fallacious packets and the legitimate data packets. These lists are normal message list and abnormal message list. On the basis of data contained in these lists the incoming packet is judged whether it is legitimate or malicious. The malicious node is thus identified using this strategy. Malicious nod ID is sent to the neighboring nodes which block that node and it is no longer able to corrupt the data. Next the cryptographic keys are used to rekey and reprogram the nodes so as to protect them from further intrusion. This method reduces computation and lesser energy is consumed [19]. Using Hybrid Energy Efficient Distributed (HEED) Clustering protocol HEED is an effective protocol in terms of energy consumption. Number of iterations required for satisfactory clustering is less and control overhead is also reduced. Residual energy in the node is used to decide the cluster head. The cluster heads report to the base station and session keys are distributed by Key Distribution System (KDS). This protocol is better than LEACH as the head of the cluster is decided on the basis of residual energy whereas in LEACH random selection of cluster head is done. It helps in increasing the network lifetime [20]. V. CONCLUSION While there are many strategies to counteract against the security attacks still an upgrade in the technology is needed. The attacks act against the data availability goal of the secure communication. They drain off the energy of the nodes and decrease the network lifetime. Measures need to be taken against the active and passive attackers so as to maintain the data integrity and authenticity. Security mechanism needs to be made more efficient. This could be done by making the protocols operating at different layers more resistant to attacks. Cryptographic and clustering techniques could be used to strengthen the network against any kind of malicious activity. The above mentioned defensive techniques need to be made stronger so as to safeguard the network. REFERENCES [1] Jijesh j j and shivashankar,“A Survey on Wireless Body Sensor Network Routing Protocol Classification”,IEEE 11 th International Conference on Intelligent Systems and Control (ISCO) 2017. DOI: 10.1109/ISCO.2017.7856042 [2]. Vikash Mainanwal, Mansi Gupta, Shravan Kumar Upadhayay, "A Survey on Wireless Body Area Network: Security Technology and its Design Methodology issue", IEEE Sponsored 2nd Intelllational Conference on Innovations in Infonnation,Embedded and Communication systems (IC TIECS)20 I 5 [3] Sophia, Alistair Shilton, Nallasamy Mani, and Y. Ahmet Kaplantzis, ƞekercioğlu. "Detecting selective forwarding attacks in wireless sensor networks using support vector machines." In Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on, pp. 335-340. IEEE, 2007 [4]. L. Atzori, A .lera and G. Morabito, “The internet of Things: A survey,” Comput. Netw., vol. 54, no. 15, pp.2787-2805, Oct. 2010. [5] Ghildiyal, Sunil, Amit Kumar Mishra, Ashish Gupta, and Neha Garg. "Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks."IJRET: International Journal of Research in Engineering and Technology pp.2319-1163. [6] Modares, Hero, Rosli Salleh, and Amirhossein Moravejosharieh. "Overview of security issues in wireless sensor networks." In Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on, pp. 308-311. IEEE, 2011. [7] Mohammadi, Shahriar, and Hossein Jadidoleslamy. "A comparison of link layer attacks on wireless sensor networks." arXiv preprint arXiv:1103.5589,2011. [8] Padmavathi, Dr G., and Mrs Shanmugapriya. "A survey of attacks, security mechanisms and challenges in wireless sensor networks." arXiv preprint arXiv:0909.0576 ,2009. [9] Kavitha, C. "A survey on secured routing protocols for wireless sensor network." In 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), pp. 1-8. 2012. [10] Agah, Afrand, and Sajal K. Das. "Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach." IJ Network Security5, no. 2 pp. 145-153,2007. [11] LĂ©deczi, Ákos, and MiklĂłs MarĂłti. "Wireless sensor node localization."Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 370, no. 1958 pp. 85-99,2012. [12] Islam, Md Safiqul, and Syed Ashiqur Rahman. "Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches." International Journal of Advanced Science and Technology 36, no. 1 pp. 1-8 ,2011. [13] Dhulkar, Ruchita, Ajit Pokharkar, and Mrs Rohini Pise. "Survey on different attacks in Wireless Sensor Networks and their prevention system." ,2015. [14] Ghosh, Arindam, and Krishna Doddapaneni. "Analysis of Denial-of- Service attacks on Wireless Sensor Networks using simulation." IT Security for the Next Generation-European Cup 2011 ,2011. [15] Ahmed, Muhammad Raisuddin. "Protecting Wireless Sensor Networksfrom Internal Attacks." PhD diss., University of Canberra, 2014. [16]Sachan, Roshan Singh, Mohammad Wazid, Dhirendra Pratap Singh, and R. H. Goudar. "A cluster based intrusion detection and prevention technique for misdirection attack inside WSN." In Communications and Signal Processing (ICCSP), 2013 International Conference on, pp. 795-801. IEEE, 2013.
  • 6. 2017 2nd IEEE International Conference On Recent Trends In Electronics Information & Communication Technology, May 19-20, 2017, India 1984 [17] Al-Otaibi S, Siewe F, “Secure Routing Protocol Base on Secure Path in Ad hoc Wireless Networks”, IEEE International Forum on Computer Science- Technology and Applications (IFCSTA 2009). [18] Shivashankar, “Design and development of new apparatus in VANETs for safety and accident avoidance”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5, DOI: 10.1109/RTEICT.2016.7808122, pp. 1695 – 1698, 2016. [19] Shivashankar and Pramod, “Random node deployment and route establishment in receiver based routing protocol for WSNs”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5, DOI: 10.1109/RTEICT.2016.7807786. pp. 74 – 78, 2016. [19] Shivashankar, P Rajendra Prasad, S Santosh Kumar and K N Sunil Kumar, “An efficient routing algorithm based on ant colony optimisation for VANETs”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5, 10.1109/RTEICT.2016.7807858, pp. 436 – 440, 2016. [20] Shivashankar, Ravigatti, P Rajendra Prasad, S Santosh Kumar and K N Sunil Kumar “Improvement of speed in data collection rate in tree based wireless sensor network”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5, 10.1109/RTEICT.2016.7807918, pp. 720 – 723, 2016. [21] Shivashankar, K N Sunil Kumar, Ravigatti, P Rajendra Prasad and S Santosh Kumar, “Opportunistic routing technique for minimized energy consumption for relay node selection in wireless sensor networks”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5, DOI: 10.1109/RTEICT.2016.7808208, pp. :2093 – 2097, 2016. [22] Ravi Gatti, S Santosh Kumar, Shivashankar, K N Sunil Kumar and P Rajendra Prasad P, “Improvement of speed in data collection rate in tree based wireless sensor network”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), ISBN: 978-1-5090-0774-5, DOI:10.1109/RTEICT.2016.7807918, pp. 720 – 723, 2016