SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 72
A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS
SENSOR NETWORKS
Rina Bhattacharya
Department of Computer Science, CMJ University, Shillong, Meghalaya, INDIA, rinikolkata@gmail.com
Abstract
Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low
power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to
wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature
and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous
design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a
wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers.
Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively.
Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks,
------------------------------------------------------------------*****----------------------------------------------------------------------
1. INTRODUCTION
In recent years, the idea of wireless sensor networks has
garnered a great deal of attention by researchers, including
those in the field of mobile computing and communications
[1,2]. WSN’s have many potential applications and unique
challenges. They usually are heterogeneous systems contain
many small devices, called sensor nodes, that monitoring
different environments in cooperative i.e, sensors cooperate
to each others and compose their local data to reach a global
view of the environments. In WSN’s there are two other
components, called “aggregation” and “base station’.
Aggregation points collect information from there nearby
sensors, integrate them and then forward to the base stations
to process gathered data [7,8,9]. Also WSN’s are vulnerable
to many types of attacks such as physical attacks, they are
one of the most malicious and harmful attacks on WSN’s.
due to unprotected and unsafe nature of the communication
channel, untrusted and broadcast transmission media,
deployment in hostile environments, automated nature and
limited resources, the most of security techniques of
traditional networks are impossible in WSN’s, therefore
security is a vital requirements for these networks
especially against the physical attacks. The objective of this
paper is to design an appropriate security mechanism for
these networks that should cover different security
dimensions of WSN’s include confidentiality, integrity,
availability and authenticity. The main purpose is presenting
an overview of different physical attacks on WSN’s and
comparing them together and also focus on their goals,
effects, possible detection and defensive mechanisms.
2. OVERVIEW OF WSN’S
A WSN is a heterogeneous system consisting of hundreds or
thousands low cost and low power tiny sensors to monitoring
and gathering information from deployment environment in
real time. Common functions of WSN’s are including
broadcast and multicast, routing, forwarding and route
maintenance. The sensors components are: sensor unit,
processing unit, storage/memory unit, power supply unit and
wireless radio transceiver, which are communicating each
other.
3. SECURITY IN WSN’S
Security attack is a concern for wireless sensor networks
because:
 Usage of minimal capacity devices in parts of the
system.
 Physical accessibility to sensor and actuator devices.
 Wireless communication of the system devices.
In spite of these drawbacks or security attacks, WSN can still
function effectively. These security threats can be handled
using structured network security architecture, which includes
modifications to traditional security services such as
confidentiality, integrity and authenticity to the wireless
domain.
4. SECURITY ISSUES IN WSN’S
A. Availability
Ensure that the desired network services are available even
in the presence of denial of service attacks.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 73
B. Confidentiality
Confidentiality means restricting data access to authorized
personnel. The data should not be leaked across adjacent
sensor networks. For this purpose, the message is sent on
the channel in encrypted form.
C. Authenticity
Authentication is important application in sensor networks.
Adversary can easily inject messages, the receiver need to
ensure that data used in any decision making process
originate from trusted sources. Authentication allows sender
node and receiver must be sure that they talking really to the
node to which they want to communicate.
D. Integrity
Data integrity ensures that the receiver receives unaltered
data in transit by any unauthorized personnel.
E. Data f reshness
Data freshness ensures that the recent data is available
without any reply of old messages by unauthorized
personnel.
F. Robustness and Survivability
Sensor network should be robust against the various attacks
and if an attack succeeds, the impact should be minimized.
G. Self-Organization
Nodes should be flexible enough to be self-organizing and
self-healing.
H. Time Synchronization
These protocols should not be manipulated to produce
incorrect data.
5 DEFINITIONS, STRATEGIES AND EFFECTS
OF PHYSICAL ATTACKS ON WSN’S
WSN’s are designed in layered form; this layered
architecture makes these networks susceptible and lead to
damage against many kinds of attacks. The following table
presents the physical attacks based on their strategies and
effects.
Attacks Attack
definition
Attack
techniques
Attack effects
Signal/radio
jamming
The
adversary
tries to transit
radio signals
emitted by
the sensors to
the receiving
antenna at the
same
transmitter.
Constant
jamming,
deceptive
jamming,
random
jamming,
reactive
jamming.
Radio
interference,
resource
exhaustion.
Device
tampering
attack, node
capturing
attack
Direct
physical
access,
captured and
replace
nodes,
Invasive
attacks, non-
invasive
attacks,
eavesdroppin
g on wireless
medium.
Damage or
modify physically
stop/alter node’s
services, take
complete control
over the captured
node, software
vulnerabilities.
Path-Based
DOS
Typical
combinationa
l attacks
include
jamming
attacks
Sending a
large number
of packets to
the base
station
Nodes battery
exhaustion,
network
disruption,
reducing WSN’s
availability
Node outage Stopping the
functionality
of WSN’s
components.
Physically,
logical
Stop nodes
services,
impossibility
reading gathered
information,
launching a
variety of other
attacks.
Eavesdropping Detecting the
contents of
communicati
on by
overhearing
attempt to
data
Interception,
abusing of
wireless
nature of
WSN’s
transmission
medium
Launching other
attacks, extracting
sensitive WSN
information,
delete the privacy
protection and
reducing data
confidentiality
DOS attacks A general
attack
includes
several types
of other
attacks in
different
layer of
WSN’s.
reducing
WSN’s
availability.
Physical
layer, link
layer, routing
layer,
transport
layer,
application
layer attacks
techniques.
Effects of
physical layer,
link layer, routing
layer, transport
layer and
application layer
attacks.
6. PHYSICAL ATTACKS CLASSIFICATION
BASED ON THREAT MODEL
The physical attacks of WSN’s based on attacks nature and
effects, attacker’s nature and capabilities, and WSN’s threat
model are shown in the following table.
Attacks Security Class Attack threat Threat
model
Signal/radio
jamming
Modification Availability,
integrity
External
and active
Device
tampering
Interception,
modification,
fabrication
Availability,
integrity,
confidentiality,
authenticity
External
and active
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 74
Node capture Interruption,
interception,
modification,
fabrication
Availability,
integrity,
confidentiality,
authenticity
External
and active
Path-Based
DOS
Modification,
fabrication
Availability,
authenticity
External
and active
Node outage Modification Availability,
integrity
External
and active
Eavesdropping Interception Confidentiality External
and passive
DOS attacks Interruption,
interception,
modification,
fabrication
Availability,
integrity,
confidentiality,
authenticity
Active
7. DETECTION AND DEFENSIVE STRATEGIES
OF WSN’S PHYSICAL ATTACKS
In the following tablr a classification and comparison of
detection defensive techniques on WSN’s physical attacks is
presented.
Attacks/
criteria
Detection
methods
Defensive mechanisms
Signal/radi
o jamming
Statistical
information;
Channel utility
degradation than
a threshold;
Detecting
background noise;
Misbehavior
detection
techniques
Access restriction;
Encryption;
Error-correction;
Mode change;
Lower duty cycle;
Reporting attacks to base
Station;
Buffering;
Mapping protocol
Device
tampering
attack or
node
capture
attack(phy
sical layer)
or node
subversion
attack
(routing
layer) or
node
cloning
attack(appl
ication
layer)
Node
disconnection/
absence from the
network;
Regular
Monitoring;
Existence
interference in
functionality of
node; Node
destruction;
Using key
management
protocol;
Misbehavior
detection
techniques
Optimizing and using
crypto-processors or
physically secure processors;
Applying standard
precautions;
Hardware/software alerter;
Access restriction;
Physical protection;
Data integrity protection;
Data confidentiality
protection;
Malicious node detection
Techniques;
Local removing or exclude the
capture
CONCLUSIONS
Security is a vital requirement and complex feature to deploy
and extend WSN’s in different application domain. The most
security physical attacks are targeting WSN security
dimensions such as integrity, confidentiality, authenticity and
availability. In this paper, the different dimensions of WSN’s
security is analyzed and presented a wide variety of WSN’s
physical attacks and classify them. The approach is to classify
and compare the WSN’s physical attacks, their properties such
as threat model of WSN’s physical attacks nature, goals and
results, their strategies and effects and finally their associated
detection and defensive techniques against these attacks to
handle them independently and comprehensively.
REFERENCES
[1] K. Chris, W. David, “Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures”,
University of California, Berkeley.
[2] K. H. Kumar, A. Kar, “Wireless Sensor Network
Security Analysis”, Proceedings of International
Journal of Next-generation Networks, Vol. 1, No. 1,
December 2009, pp 1-9.
[3] P. Kumari, M. Kumar, R. Rishi, “Study of Security in
Wireless Sensor Networks”, Proceedings of
International Journal of Computer Science and
Technology, Vol.1, No. 5, pp 347-354.
[4] V.C. Manju, “Study of Security Issues in Wireless
Sensor Network”, Proceedings of International Journal
of Engineering Science and Technology (IJEST), Vol.
3, No.10, October 2011, pp 7347-7351.
[5] N. Rajani, “Energy Efficient Reliable Routing Protocol
for Wireless Sensor Networks”, Indian Institute of
Technology, Kanpur, June 2008.
[6] K. Sharma, M.K. Ghosh, D. Kumar et al, “A
Comparative Study of Various Security Approaches
Used in Wireless Sensor Networks”, Proceedings of
International Journal of Advanced Science and
Technology”, Vol. 17, April 2010, pp 31-37.
[7] R. Sharma, Y. Chaba, Y. Singh, “Analysis of Security
Protocols in Wireless Sensor Network”, Proceedings of
International Journal of Advanced Networking and
Application, Vol. 2, No. 3, 2010, pp 707-713.
[8] E. Shih, H.S. Cho, N. Ickes, R. Min, A. Sinha, A.
Wang, A. Chandrakasan, “Physical Layer Driven
Protocol and Algorithms Design for Energy-Efficient
Wireless Sensor Networks”, Proceedings of
MOBICOM’01, July 2001, Rome, Italy.
[9] S. K. Singh, M. P. Singh, D.K. Singh, “Routing
Protocols in Wireless Sensor Networks - A Survey”,
Proceedings of International Journal of Computer
Science & Engineering Survey (IJCSES), Vol.1, No. 2,
November 2010.
[10] S. Singh, H. K. Verma, “Security for Wireless Sensor
Network”, Proceedings of International Journal on
computer Science and Engineering (IJCSE), Vol. 3, No.
6, June 2011, pp 2393-2396.
[11] K. Ssu, C. Chou, H. C. Jiau, W.T. Hu, “Detection and
diagnosis of data inconsistency failures in Wireless
Sensor Networks”, Proceedings of Elsevier Journal of
Computer Networks, No. 50, 2006, pp 1247-1260.
[12] K. Sophia, “Security Models for Wireless Sensor
Networks”, Proceedings of, March 2006, pp 6-8.

More Related Content

What's hot

Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
Zac Darcy
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
IJERA Editor
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
theijes
 

What's hot (13)

Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSA SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
AN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNAN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSN
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
 

Viewers also liked

I v characteristics and transconductance modeling for dual channel algangan m...
I v characteristics and transconductance modeling for dual channel algangan m...I v characteristics and transconductance modeling for dual channel algangan m...
I v characteristics and transconductance modeling for dual channel algangan m...
eSAT Journals
 
Cimahi river benchmarking flood analysis based on threshold of total rainfall
Cimahi river benchmarking flood analysis based on threshold of total rainfallCimahi river benchmarking flood analysis based on threshold of total rainfall
Cimahi river benchmarking flood analysis based on threshold of total rainfall
eSAT Journals
 
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...Removal of arsenic (v) from water by adsorption onto low cost and waste mater...
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...
eSAT Journals
 
Analysis of rc bridge decks for selected national a nd internationalstandard ...
Analysis of rc bridge decks for selected national a nd internationalstandard ...Analysis of rc bridge decks for selected national a nd internationalstandard ...
Analysis of rc bridge decks for selected national a nd internationalstandard ...
eSAT Journals
 

Viewers also liked (19)

Analysis of transient enclosure voltages in gis (emtp simulation studies)
Analysis of transient enclosure voltages in gis (emtp simulation studies)Analysis of transient enclosure voltages in gis (emtp simulation studies)
Analysis of transient enclosure voltages in gis (emtp simulation studies)
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
I v characteristics and transconductance modeling for dual channel algangan m...
I v characteristics and transconductance modeling for dual channel algangan m...I v characteristics and transconductance modeling for dual channel algangan m...
I v characteristics and transconductance modeling for dual channel algangan m...
 
Cimahi river benchmarking flood analysis based on threshold of total rainfall
Cimahi river benchmarking flood analysis based on threshold of total rainfallCimahi river benchmarking flood analysis based on threshold of total rainfall
Cimahi river benchmarking flood analysis based on threshold of total rainfall
 
Energy saving opportunities in oxygen plant a case study
Energy saving opportunities in oxygen plant   a case studyEnergy saving opportunities in oxygen plant   a case study
Energy saving opportunities in oxygen plant a case study
 
High speed tree-based 64-bit cmos binary comparator
High speed tree-based 64-bit cmos binary comparatorHigh speed tree-based 64-bit cmos binary comparator
High speed tree-based 64-bit cmos binary comparator
 
Addressing the cloud computing security menace
Addressing the cloud computing security menaceAddressing the cloud computing security menace
Addressing the cloud computing security menace
 
Experimental investigation of chemical etching on different materials using n...
Experimental investigation of chemical etching on different materials using n...Experimental investigation of chemical etching on different materials using n...
Experimental investigation of chemical etching on different materials using n...
 
Synthesis of methyl, benzyl and pseudo halogeno co (iii) complexes of a dioxi...
Synthesis of methyl, benzyl and pseudo halogeno co (iii) complexes of a dioxi...Synthesis of methyl, benzyl and pseudo halogeno co (iii) complexes of a dioxi...
Synthesis of methyl, benzyl and pseudo halogeno co (iii) complexes of a dioxi...
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Development of a hands free urinal flushing system
Development of a hands free urinal flushing systemDevelopment of a hands free urinal flushing system
Development of a hands free urinal flushing system
 
An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...An adaptive gmm approach to background subtraction for application in real ti...
An adaptive gmm approach to background subtraction for application in real ti...
 
Uv radiation assisted photocatalytic transformation of azo dye direct yellow 9
Uv radiation assisted photocatalytic transformation of azo dye direct yellow 9Uv radiation assisted photocatalytic transformation of azo dye direct yellow 9
Uv radiation assisted photocatalytic transformation of azo dye direct yellow 9
 
Fault model analysis by parasitic extraction method for embedded sram
Fault model analysis by parasitic extraction method for embedded sramFault model analysis by parasitic extraction method for embedded sram
Fault model analysis by parasitic extraction method for embedded sram
 
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...Removal of arsenic (v) from water by adsorption onto low cost and waste mater...
Removal of arsenic (v) from water by adsorption onto low cost and waste mater...
 
Stabilization of soft soil with granulated blast furnace slag and fly ash
Stabilization of soft soil with granulated blast furnace slag and fly ashStabilization of soft soil with granulated blast furnace slag and fly ash
Stabilization of soft soil with granulated blast furnace slag and fly ash
 
Analysis of rc bridge decks for selected national a nd internationalstandard ...
Analysis of rc bridge decks for selected national a nd internationalstandard ...Analysis of rc bridge decks for selected national a nd internationalstandard ...
Analysis of rc bridge decks for selected national a nd internationalstandard ...
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
 

Similar to A comparative study of physical attacks on wireless sensor networks

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSA COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
ijp2p
 
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSA HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
IJNSA Journal
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
IJNSA Journal
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
Zac Darcy
 

Similar to A comparative study of physical attacks on wireless sensor networks (20)

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSA COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
 
A Comparison Of Physical Attacks On Wireless Sensor Networks
A Comparison Of Physical Attacks On Wireless Sensor NetworksA Comparison Of Physical Attacks On Wireless Sensor Networks
A Comparison Of Physical Attacks On Wireless Sensor Networks
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSA HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networks
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

A comparative study of physical attacks on wireless sensor networks

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 72 A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS Rina Bhattacharya Department of Computer Science, CMJ University, Shillong, Meghalaya, INDIA, rinikolkata@gmail.com Abstract Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively. Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks, ------------------------------------------------------------------*****---------------------------------------------------------------------- 1. INTRODUCTION In recent years, the idea of wireless sensor networks has garnered a great deal of attention by researchers, including those in the field of mobile computing and communications [1,2]. WSN’s have many potential applications and unique challenges. They usually are heterogeneous systems contain many small devices, called sensor nodes, that monitoring different environments in cooperative i.e, sensors cooperate to each others and compose their local data to reach a global view of the environments. In WSN’s there are two other components, called “aggregation” and “base station’. Aggregation points collect information from there nearby sensors, integrate them and then forward to the base stations to process gathered data [7,8,9]. Also WSN’s are vulnerable to many types of attacks such as physical attacks, they are one of the most malicious and harmful attacks on WSN’s. due to unprotected and unsafe nature of the communication channel, untrusted and broadcast transmission media, deployment in hostile environments, automated nature and limited resources, the most of security techniques of traditional networks are impossible in WSN’s, therefore security is a vital requirements for these networks especially against the physical attacks. The objective of this paper is to design an appropriate security mechanism for these networks that should cover different security dimensions of WSN’s include confidentiality, integrity, availability and authenticity. The main purpose is presenting an overview of different physical attacks on WSN’s and comparing them together and also focus on their goals, effects, possible detection and defensive mechanisms. 2. OVERVIEW OF WSN’S A WSN is a heterogeneous system consisting of hundreds or thousands low cost and low power tiny sensors to monitoring and gathering information from deployment environment in real time. Common functions of WSN’s are including broadcast and multicast, routing, forwarding and route maintenance. The sensors components are: sensor unit, processing unit, storage/memory unit, power supply unit and wireless radio transceiver, which are communicating each other. 3. SECURITY IN WSN’S Security attack is a concern for wireless sensor networks because:  Usage of minimal capacity devices in parts of the system.  Physical accessibility to sensor and actuator devices.  Wireless communication of the system devices. In spite of these drawbacks or security attacks, WSN can still function effectively. These security threats can be handled using structured network security architecture, which includes modifications to traditional security services such as confidentiality, integrity and authenticity to the wireless domain. 4. SECURITY ISSUES IN WSN’S A. Availability Ensure that the desired network services are available even in the presence of denial of service attacks.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 73 B. Confidentiality Confidentiality means restricting data access to authorized personnel. The data should not be leaked across adjacent sensor networks. For this purpose, the message is sent on the channel in encrypted form. C. Authenticity Authentication is important application in sensor networks. Adversary can easily inject messages, the receiver need to ensure that data used in any decision making process originate from trusted sources. Authentication allows sender node and receiver must be sure that they talking really to the node to which they want to communicate. D. Integrity Data integrity ensures that the receiver receives unaltered data in transit by any unauthorized personnel. E. Data f reshness Data freshness ensures that the recent data is available without any reply of old messages by unauthorized personnel. F. Robustness and Survivability Sensor network should be robust against the various attacks and if an attack succeeds, the impact should be minimized. G. Self-Organization Nodes should be flexible enough to be self-organizing and self-healing. H. Time Synchronization These protocols should not be manipulated to produce incorrect data. 5 DEFINITIONS, STRATEGIES AND EFFECTS OF PHYSICAL ATTACKS ON WSN’S WSN’s are designed in layered form; this layered architecture makes these networks susceptible and lead to damage against many kinds of attacks. The following table presents the physical attacks based on their strategies and effects. Attacks Attack definition Attack techniques Attack effects Signal/radio jamming The adversary tries to transit radio signals emitted by the sensors to the receiving antenna at the same transmitter. Constant jamming, deceptive jamming, random jamming, reactive jamming. Radio interference, resource exhaustion. Device tampering attack, node capturing attack Direct physical access, captured and replace nodes, Invasive attacks, non- invasive attacks, eavesdroppin g on wireless medium. Damage or modify physically stop/alter node’s services, take complete control over the captured node, software vulnerabilities. Path-Based DOS Typical combinationa l attacks include jamming attacks Sending a large number of packets to the base station Nodes battery exhaustion, network disruption, reducing WSN’s availability Node outage Stopping the functionality of WSN’s components. Physically, logical Stop nodes services, impossibility reading gathered information, launching a variety of other attacks. Eavesdropping Detecting the contents of communicati on by overhearing attempt to data Interception, abusing of wireless nature of WSN’s transmission medium Launching other attacks, extracting sensitive WSN information, delete the privacy protection and reducing data confidentiality DOS attacks A general attack includes several types of other attacks in different layer of WSN’s. reducing WSN’s availability. Physical layer, link layer, routing layer, transport layer, application layer attacks techniques. Effects of physical layer, link layer, routing layer, transport layer and application layer attacks. 6. PHYSICAL ATTACKS CLASSIFICATION BASED ON THREAT MODEL The physical attacks of WSN’s based on attacks nature and effects, attacker’s nature and capabilities, and WSN’s threat model are shown in the following table. Attacks Security Class Attack threat Threat model Signal/radio jamming Modification Availability, integrity External and active Device tampering Interception, modification, fabrication Availability, integrity, confidentiality, authenticity External and active
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 74 Node capture Interruption, interception, modification, fabrication Availability, integrity, confidentiality, authenticity External and active Path-Based DOS Modification, fabrication Availability, authenticity External and active Node outage Modification Availability, integrity External and active Eavesdropping Interception Confidentiality External and passive DOS attacks Interruption, interception, modification, fabrication Availability, integrity, confidentiality, authenticity Active 7. DETECTION AND DEFENSIVE STRATEGIES OF WSN’S PHYSICAL ATTACKS In the following tablr a classification and comparison of detection defensive techniques on WSN’s physical attacks is presented. Attacks/ criteria Detection methods Defensive mechanisms Signal/radi o jamming Statistical information; Channel utility degradation than a threshold; Detecting background noise; Misbehavior detection techniques Access restriction; Encryption; Error-correction; Mode change; Lower duty cycle; Reporting attacks to base Station; Buffering; Mapping protocol Device tampering attack or node capture attack(phy sical layer) or node subversion attack (routing layer) or node cloning attack(appl ication layer) Node disconnection/ absence from the network; Regular Monitoring; Existence interference in functionality of node; Node destruction; Using key management protocol; Misbehavior detection techniques Optimizing and using crypto-processors or physically secure processors; Applying standard precautions; Hardware/software alerter; Access restriction; Physical protection; Data integrity protection; Data confidentiality protection; Malicious node detection Techniques; Local removing or exclude the capture CONCLUSIONS Security is a vital requirement and complex feature to deploy and extend WSN’s in different application domain. The most security physical attacks are targeting WSN security dimensions such as integrity, confidentiality, authenticity and availability. In this paper, the different dimensions of WSN’s security is analyzed and presented a wide variety of WSN’s physical attacks and classify them. The approach is to classify and compare the WSN’s physical attacks, their properties such as threat model of WSN’s physical attacks nature, goals and results, their strategies and effects and finally their associated detection and defensive techniques against these attacks to handle them independently and comprehensively. REFERENCES [1] K. Chris, W. David, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, University of California, Berkeley. [2] K. H. Kumar, A. Kar, “Wireless Sensor Network Security Analysis”, Proceedings of International Journal of Next-generation Networks, Vol. 1, No. 1, December 2009, pp 1-9. [3] P. Kumari, M. Kumar, R. Rishi, “Study of Security in Wireless Sensor Networks”, Proceedings of International Journal of Computer Science and Technology, Vol.1, No. 5, pp 347-354. [4] V.C. Manju, “Study of Security Issues in Wireless Sensor Network”, Proceedings of International Journal of Engineering Science and Technology (IJEST), Vol. 3, No.10, October 2011, pp 7347-7351. [5] N. Rajani, “Energy Efficient Reliable Routing Protocol for Wireless Sensor Networks”, Indian Institute of Technology, Kanpur, June 2008. [6] K. Sharma, M.K. Ghosh, D. Kumar et al, “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”, Proceedings of International Journal of Advanced Science and Technology”, Vol. 17, April 2010, pp 31-37. [7] R. Sharma, Y. Chaba, Y. Singh, “Analysis of Security Protocols in Wireless Sensor Network”, Proceedings of International Journal of Advanced Networking and Application, Vol. 2, No. 3, 2010, pp 707-713. [8] E. Shih, H.S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan, “Physical Layer Driven Protocol and Algorithms Design for Energy-Efficient Wireless Sensor Networks”, Proceedings of MOBICOM’01, July 2001, Rome, Italy. [9] S. K. Singh, M. P. Singh, D.K. Singh, “Routing Protocols in Wireless Sensor Networks - A Survey”, Proceedings of International Journal of Computer Science & Engineering Survey (IJCSES), Vol.1, No. 2, November 2010. [10] S. Singh, H. K. Verma, “Security for Wireless Sensor Network”, Proceedings of International Journal on computer Science and Engineering (IJCSE), Vol. 3, No. 6, June 2011, pp 2393-2396. [11] K. Ssu, C. Chou, H. C. Jiau, W.T. Hu, “Detection and diagnosis of data inconsistency failures in Wireless Sensor Networks”, Proceedings of Elsevier Journal of Computer Networks, No. 50, 2006, pp 1247-1260. [12] K. Sophia, “Security Models for Wireless Sensor Networks”, Proceedings of, March 2006, pp 6-8.