SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 72
A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS
SENSOR NETWORKS
Rina Bhattacharya
Department of Computer Science, CMJ University, Shillong, Meghalaya, INDIA, rinikolkata@gmail.com
Abstract
Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low
power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to
wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature
and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous
design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a
wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers.
Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively.
Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks,
------------------------------------------------------------------*****----------------------------------------------------------------------
1. INTRODUCTION
In recent years, the idea of wireless sensor networks has
garnered a great deal of attention by researchers, including
those in the field of mobile computing and communications
[1,2]. WSN’s have many potential applications and unique
challenges. They usually are heterogeneous systems contain
many small devices, called sensor nodes, that monitoring
different environments in cooperative i.e, sensors cooperate
to each others and compose their local data to reach a global
view of the environments. In WSN’s there are two other
components, called “aggregation” and “base station’.
Aggregation points collect information from there nearby
sensors, integrate them and then forward to the base stations
to process gathered data [7,8,9]. Also WSN’s are vulnerable
to many types of attacks such as physical attacks, they are
one of the most malicious and harmful attacks on WSN’s.
due to unprotected and unsafe nature of the communication
channel, untrusted and broadcast transmission media,
deployment in hostile environments, automated nature and
limited resources, the most of security techniques of
traditional networks are impossible in WSN’s, therefore
security is a vital requirements for these networks
especially against the physical attacks. The objective of this
paper is to design an appropriate security mechanism for
these networks that should cover different security
dimensions of WSN’s include confidentiality, integrity,
availability and authenticity. The main purpose is presenting
an overview of different physical attacks on WSN’s and
comparing them together and also focus on their goals,
effects, possible detection and defensive mechanisms.
2. OVERVIEW OF WSN’S
A WSN is a heterogeneous system consisting of hundreds or
thousands low cost and low power tiny sensors to monitoring
and gathering information from deployment environment in
real time. Common functions of WSN’s are including
broadcast and multicast, routing, forwarding and route
maintenance. The sensors components are: sensor unit,
processing unit, storage/memory unit, power supply unit and
wireless radio transceiver, which are communicating each
other.
3. SECURITY IN WSN’S
Security attack is a concern for wireless sensor networks
because:
 Usage of minimal capacity devices in parts of the
system.
 Physical accessibility to sensor and actuator devices.
 Wireless communication of the system devices.
In spite of these drawbacks or security attacks, WSN can still
function effectively. These security threats can be handled
using structured network security architecture, which includes
modifications to traditional security services such as
confidentiality, integrity and authenticity to the wireless
domain.
4. SECURITY ISSUES IN WSN’S
A. Availability
Ensure that the desired network services are available even
in the presence of denial of service attacks.
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 73
B. Confidentiality
Confidentiality means restricting data access to authorized
personnel. The data should not be leaked across adjacent
sensor networks. For this purpose, the message is sent on
the channel in encrypted form.
C. Authenticity
Authentication is important application in sensor networks.
Adversary can easily inject messages, the receiver need to
ensure that data used in any decision making process
originate from trusted sources. Authentication allows sender
node and receiver must be sure that they talking really to the
node to which they want to communicate.
D. Integrity
Data integrity ensures that the receiver receives unaltered
data in transit by any unauthorized personnel.
E. Data f reshness
Data freshness ensures that the recent data is available
without any reply of old messages by unauthorized
personnel.
F. Robustness and Survivability
Sensor network should be robust against the various attacks
and if an attack succeeds, the impact should be minimized.
G. Self-Organization
Nodes should be flexible enough to be self-organizing and
self-healing.
H. Time Synchronization
These protocols should not be manipulated to produce
incorrect data.
5 DEFINITIONS, STRATEGIES AND EFFECTS
OF PHYSICAL ATTACKS ON WSN’S
WSN’s are designed in layered form; this layered
architecture makes these networks susceptible and lead to
damage against many kinds of attacks. The following table
presents the physical attacks based on their strategies and
effects.
Attacks Attack
definition
Attack
techniques
Attack effects
Signal/radio
jamming
The
adversary
tries to transit
radio signals
emitted by
the sensors to
the receiving
antenna at the
same
transmitter.
Constant
jamming,
deceptive
jamming,
random
jamming,
reactive
jamming.
Radio
interference,
resource
exhaustion.
Device
tampering
attack, node
capturing
attack
Direct
physical
access,
captured and
replace
nodes,
Invasive
attacks, non-
invasive
attacks,
eavesdroppin
g on wireless
medium.
Damage or
modify physically
stop/alter node’s
services, take
complete control
over the captured
node, software
vulnerabilities.
Path-Based
DOS
Typical
combinationa
l attacks
include
jamming
attacks
Sending a
large number
of packets to
the base
station
Nodes battery
exhaustion,
network
disruption,
reducing WSN’s
availability
Node outage Stopping the
functionality
of WSN’s
components.
Physically,
logical
Stop nodes
services,
impossibility
reading gathered
information,
launching a
variety of other
attacks.
Eavesdropping Detecting the
contents of
communicati
on by
overhearing
attempt to
data
Interception,
abusing of
wireless
nature of
WSN’s
transmission
medium
Launching other
attacks, extracting
sensitive WSN
information,
delete the privacy
protection and
reducing data
confidentiality
DOS attacks A general
attack
includes
several types
of other
attacks in
different
layer of
WSN’s.
reducing
WSN’s
availability.
Physical
layer, link
layer, routing
layer,
transport
layer,
application
layer attacks
techniques.
Effects of
physical layer,
link layer, routing
layer, transport
layer and
application layer
attacks.
6. PHYSICAL ATTACKS CLASSIFICATION
BASED ON THREAT MODEL
The physical attacks of WSN’s based on attacks nature and
effects, attacker’s nature and capabilities, and WSN’s threat
model are shown in the following table.
Attacks Security Class Attack threat Threat
model
Signal/radio
jamming
Modification Availability,
integrity
External
and active
Device
tampering
Interception,
modification,
fabrication
Availability,
integrity,
confidentiality,
authenticity
External
and active
IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163
__________________________________________________________________________________________
Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 74
Node capture Interruption,
interception,
modification,
fabrication
Availability,
integrity,
confidentiality,
authenticity
External
and active
Path-Based
DOS
Modification,
fabrication
Availability,
authenticity
External
and active
Node outage Modification Availability,
integrity
External
and active
Eavesdropping Interception Confidentiality External
and passive
DOS attacks Interruption,
interception,
modification,
fabrication
Availability,
integrity,
confidentiality,
authenticity
Active
7. DETECTION AND DEFENSIVE STRATEGIES
OF WSN’S PHYSICAL ATTACKS
In the following tablr a classification and comparison of
detection defensive techniques on WSN’s physical attacks is
presented.
Attacks/
criteria
Detection
methods
Defensive mechanisms
Signal/radi
o jamming
Statistical
information;
Channel utility
degradation than
a threshold;
Detecting
background noise;
Misbehavior
detection
techniques
Access restriction;
Encryption;
Error-correction;
Mode change;
Lower duty cycle;
Reporting attacks to base
Station;
Buffering;
Mapping protocol
Device
tampering
attack or
node
capture
attack(phy
sical layer)
or node
subversion
attack
(routing
layer) or
node
cloning
attack(appl
ication
layer)
Node
disconnection/
absence from the
network;
Regular
Monitoring;
Existence
interference in
functionality of
node; Node
destruction;
Using key
management
protocol;
Misbehavior
detection
techniques
Optimizing and using
crypto-processors or
physically secure processors;
Applying standard
precautions;
Hardware/software alerter;
Access restriction;
Physical protection;
Data integrity protection;
Data confidentiality
protection;
Malicious node detection
Techniques;
Local removing or exclude the
capture
CONCLUSIONS
Security is a vital requirement and complex feature to deploy
and extend WSN’s in different application domain. The most
security physical attacks are targeting WSN security
dimensions such as integrity, confidentiality, authenticity and
availability. In this paper, the different dimensions of WSN’s
security is analyzed and presented a wide variety of WSN’s
physical attacks and classify them. The approach is to classify
and compare the WSN’s physical attacks, their properties such
as threat model of WSN’s physical attacks nature, goals and
results, their strategies and effects and finally their associated
detection and defensive techniques against these attacks to
handle them independently and comprehensively.
REFERENCES
[1] K. Chris, W. David, “Secure Routing in Wireless
Sensor Networks: Attacks and Countermeasures”,
University of California, Berkeley.
[2] K. H. Kumar, A. Kar, “Wireless Sensor Network
Security Analysis”, Proceedings of International
Journal of Next-generation Networks, Vol. 1, No. 1,
December 2009, pp 1-9.
[3] P. Kumari, M. Kumar, R. Rishi, “Study of Security in
Wireless Sensor Networks”, Proceedings of
International Journal of Computer Science and
Technology, Vol.1, No. 5, pp 347-354.
[4] V.C. Manju, “Study of Security Issues in Wireless
Sensor Network”, Proceedings of International Journal
of Engineering Science and Technology (IJEST), Vol.
3, No.10, October 2011, pp 7347-7351.
[5] N. Rajani, “Energy Efficient Reliable Routing Protocol
for Wireless Sensor Networks”, Indian Institute of
Technology, Kanpur, June 2008.
[6] K. Sharma, M.K. Ghosh, D. Kumar et al, “A
Comparative Study of Various Security Approaches
Used in Wireless Sensor Networks”, Proceedings of
International Journal of Advanced Science and
Technology”, Vol. 17, April 2010, pp 31-37.
[7] R. Sharma, Y. Chaba, Y. Singh, “Analysis of Security
Protocols in Wireless Sensor Network”, Proceedings of
International Journal of Advanced Networking and
Application, Vol. 2, No. 3, 2010, pp 707-713.
[8] E. Shih, H.S. Cho, N. Ickes, R. Min, A. Sinha, A.
Wang, A. Chandrakasan, “Physical Layer Driven
Protocol and Algorithms Design for Energy-Efficient
Wireless Sensor Networks”, Proceedings of
MOBICOM’01, July 2001, Rome, Italy.
[9] S. K. Singh, M. P. Singh, D.K. Singh, “Routing
Protocols in Wireless Sensor Networks - A Survey”,
Proceedings of International Journal of Computer
Science & Engineering Survey (IJCSES), Vol.1, No. 2,
November 2010.
[10] S. Singh, H. K. Verma, “Security for Wireless Sensor
Network”, Proceedings of International Journal on
computer Science and Engineering (IJCSE), Vol. 3, No.
6, June 2011, pp 2393-2396.
[11] K. Ssu, C. Chou, H. C. Jiau, W.T. Hu, “Detection and
diagnosis of data inconsistency failures in Wireless
Sensor Networks”, Proceedings of Elsevier Journal of
Computer Networks, No. 50, 2006, pp 1247-1260.
[12] K. Sophia, “Security Models for Wireless Sensor
Networks”, Proceedings of, March 2006, pp 6-8.

More Related Content

What's hot

Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkijwmn
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...IRJET Journal
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
 
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...IJNSA Journal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNIJERA Editor
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSA SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSIJNSA Journal
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkAlexander Decker
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 
AN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNAN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNIAEME Publication
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...theijes
 

What's hot (13)

Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...Integration of security and authentication agent in ns 2 and leach protocol f...
Integration of security and authentication agent in ns 2 and leach protocol f...
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
Wireless Sensor Network Nodes: Security and Deployment in the Niger-Delta Oil...
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Denial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSNDenial of Service (DoS) Attacks at Network Layer in WSN
Denial of Service (DoS) Attacks at Network Layer in WSN
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKSA SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
 
A review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor networkA review of privacy preserving techniques in wireless sensor network
A review of privacy preserving techniques in wireless sensor network
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
AN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSNAN ADVANCED DATA SECURITY METHOD IN WSN
AN ADVANCED DATA SECURITY METHOD IN WSN
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
 

Viewers also liked

The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingeSAT Publishing House
 
Change in cropping pattern utilizing narmada main
Change in cropping pattern utilizing narmada mainChange in cropping pattern utilizing narmada main
Change in cropping pattern utilizing narmada maineSAT Publishing House
 
Dry sliding wear behaviour of sand cast cu 11 ni-6sn alloy
Dry sliding wear behaviour of sand cast cu 11 ni-6sn alloyDry sliding wear behaviour of sand cast cu 11 ni-6sn alloy
Dry sliding wear behaviour of sand cast cu 11 ni-6sn alloyeSAT Publishing House
 
Searching and tracking of neighboring base stations
Searching and tracking of neighboring base stationsSearching and tracking of neighboring base stations
Searching and tracking of neighboring base stationseSAT Publishing House
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalizationeSAT Publishing House
 
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoilA comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoileSAT Publishing House
 
Implementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast systemImplementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast systemeSAT Publishing House
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acideSAT Publishing House
 
Diffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractionDiffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractioneSAT Publishing House
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingeSAT Publishing House
 
Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...eSAT Publishing House
 
Evolution of social developer network in oss survey
Evolution of social developer network in oss surveyEvolution of social developer network in oss survey
Evolution of social developer network in oss surveyeSAT Publishing House
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain ofeSAT Publishing House
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...eSAT Publishing House
 
Online review mining for forecasting sales
Online review mining for forecasting salesOnline review mining for forecasting sales
Online review mining for forecasting saleseSAT Publishing House
 
Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionseSAT Publishing House
 
Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)eSAT Publishing House
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumeSAT Publishing House
 
Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...eSAT Publishing House
 

Viewers also liked (20)

The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
 
Change in cropping pattern utilizing narmada main
Change in cropping pattern utilizing narmada mainChange in cropping pattern utilizing narmada main
Change in cropping pattern utilizing narmada main
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Dry sliding wear behaviour of sand cast cu 11 ni-6sn alloy
Dry sliding wear behaviour of sand cast cu 11 ni-6sn alloyDry sliding wear behaviour of sand cast cu 11 ni-6sn alloy
Dry sliding wear behaviour of sand cast cu 11 ni-6sn alloy
 
Searching and tracking of neighboring base stations
Searching and tracking of neighboring base stationsSearching and tracking of neighboring base stations
Searching and tracking of neighboring base stations
 
A survey on ontology based web personalization
A survey on ontology based web personalizationA survey on ontology based web personalization
A survey on ontology based web personalization
 
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoilA comparative flow analysis of naca 6409 and naca 4412 aerofoil
A comparative flow analysis of naca 6409 and naca 4412 aerofoil
 
Implementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast systemImplementation of embedded bluetooth data broadcast system
Implementation of embedded bluetooth data broadcast system
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acid
 
Diffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractionDiffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extraction
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration using
 
Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...
 
Evolution of social developer network in oss survey
Evolution of social developer network in oss surveyEvolution of social developer network in oss survey
Evolution of social developer network in oss survey
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...
 
Online review mining for forecasting sales
Online review mining for forecasting salesOnline review mining for forecasting sales
Online review mining for forecasting sales
 
Gis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regionsGis in assessing topographical aspects of hilly regions
Gis in assessing topographical aspects of hilly regions
 
Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)Real time reservoir operation (validation phase)
Real time reservoir operation (validation phase)
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminum
 
Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...
 

Similar to IJRET Physical Attacks on Wireless Sensor Networks

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesBRNSSPublicationHubI
 
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSA COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSijp2p
 
A Comparison Of Physical Attacks On Wireless Sensor Networks
A Comparison Of Physical Attacks On Wireless Sensor NetworksA Comparison Of Physical Attacks On Wireless Sensor Networks
A Comparison Of Physical Attacks On Wireless Sensor NetworksNicole Heredia
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSA HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSIJNSA Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksIOSR Journals
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksijasuc
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toeSAT Publishing House
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.AIRCC Publishing Corporation
 

Similar to IJRET Physical Attacks on Wireless Sensor Networks (20)

Wireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and ChallengesWireless Sensor Networks: An Overview on Security Issues and Challenges
Wireless Sensor Networks: An Overview on Security Issues and Challenges
 
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKSA COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
A COMPARISON OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS
 
A Comparison Of Physical Attacks On Wireless Sensor Networks
A Comparison Of Physical Attacks On Wireless Sensor NetworksA Comparison Of Physical Attacks On Wireless Sensor Networks
A Comparison Of Physical Attacks On Wireless Sensor Networks
 
Lz3421532161
Lz3421532161Lz3421532161
Lz3421532161
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKSA HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
A HIERARCHICAL INTRUSION DETECTION ARCHITECTURE FOR WIRELESS SENSOR NETWORKS
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksSecure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor Networks
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor NetworkA Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolSecuring WSN communication using Enhanced Adaptive Acknowledgement Protocol
Securing WSN communication using Enhanced Adaptive Acknowledgement Protocol
 
Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...Integration of security and authentication agent in ns-2 and leach protocol f...
Integration of security and authentication agent in ns-2 and leach protocol f...
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networks
 
Public encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsnPublic encryption with two ack approach to mitigate wormhole attack in wsn
Public encryption with two ack approach to mitigate wormhole attack in wsn
 
Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYSECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 

Recently uploaded (20)

Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 

IJRET Physical Attacks on Wireless Sensor Networks

  • 1. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 72 A COMPARATIVE STUDY OF PHYSICAL ATTACKS ON WIRELESS SENSOR NETWORKS Rina Bhattacharya Department of Computer Science, CMJ University, Shillong, Meghalaya, INDIA, rinikolkata@gmail.com Abstract Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively. Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks, ------------------------------------------------------------------*****---------------------------------------------------------------------- 1. INTRODUCTION In recent years, the idea of wireless sensor networks has garnered a great deal of attention by researchers, including those in the field of mobile computing and communications [1,2]. WSN’s have many potential applications and unique challenges. They usually are heterogeneous systems contain many small devices, called sensor nodes, that monitoring different environments in cooperative i.e, sensors cooperate to each others and compose their local data to reach a global view of the environments. In WSN’s there are two other components, called “aggregation” and “base station’. Aggregation points collect information from there nearby sensors, integrate them and then forward to the base stations to process gathered data [7,8,9]. Also WSN’s are vulnerable to many types of attacks such as physical attacks, they are one of the most malicious and harmful attacks on WSN’s. due to unprotected and unsafe nature of the communication channel, untrusted and broadcast transmission media, deployment in hostile environments, automated nature and limited resources, the most of security techniques of traditional networks are impossible in WSN’s, therefore security is a vital requirements for these networks especially against the physical attacks. The objective of this paper is to design an appropriate security mechanism for these networks that should cover different security dimensions of WSN’s include confidentiality, integrity, availability and authenticity. The main purpose is presenting an overview of different physical attacks on WSN’s and comparing them together and also focus on their goals, effects, possible detection and defensive mechanisms. 2. OVERVIEW OF WSN’S A WSN is a heterogeneous system consisting of hundreds or thousands low cost and low power tiny sensors to monitoring and gathering information from deployment environment in real time. Common functions of WSN’s are including broadcast and multicast, routing, forwarding and route maintenance. The sensors components are: sensor unit, processing unit, storage/memory unit, power supply unit and wireless radio transceiver, which are communicating each other. 3. SECURITY IN WSN’S Security attack is a concern for wireless sensor networks because:  Usage of minimal capacity devices in parts of the system.  Physical accessibility to sensor and actuator devices.  Wireless communication of the system devices. In spite of these drawbacks or security attacks, WSN can still function effectively. These security threats can be handled using structured network security architecture, which includes modifications to traditional security services such as confidentiality, integrity and authenticity to the wireless domain. 4. SECURITY ISSUES IN WSN’S A. Availability Ensure that the desired network services are available even in the presence of denial of service attacks.
  • 2. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 73 B. Confidentiality Confidentiality means restricting data access to authorized personnel. The data should not be leaked across adjacent sensor networks. For this purpose, the message is sent on the channel in encrypted form. C. Authenticity Authentication is important application in sensor networks. Adversary can easily inject messages, the receiver need to ensure that data used in any decision making process originate from trusted sources. Authentication allows sender node and receiver must be sure that they talking really to the node to which they want to communicate. D. Integrity Data integrity ensures that the receiver receives unaltered data in transit by any unauthorized personnel. E. Data f reshness Data freshness ensures that the recent data is available without any reply of old messages by unauthorized personnel. F. Robustness and Survivability Sensor network should be robust against the various attacks and if an attack succeeds, the impact should be minimized. G. Self-Organization Nodes should be flexible enough to be self-organizing and self-healing. H. Time Synchronization These protocols should not be manipulated to produce incorrect data. 5 DEFINITIONS, STRATEGIES AND EFFECTS OF PHYSICAL ATTACKS ON WSN’S WSN’s are designed in layered form; this layered architecture makes these networks susceptible and lead to damage against many kinds of attacks. The following table presents the physical attacks based on their strategies and effects. Attacks Attack definition Attack techniques Attack effects Signal/radio jamming The adversary tries to transit radio signals emitted by the sensors to the receiving antenna at the same transmitter. Constant jamming, deceptive jamming, random jamming, reactive jamming. Radio interference, resource exhaustion. Device tampering attack, node capturing attack Direct physical access, captured and replace nodes, Invasive attacks, non- invasive attacks, eavesdroppin g on wireless medium. Damage or modify physically stop/alter node’s services, take complete control over the captured node, software vulnerabilities. Path-Based DOS Typical combinationa l attacks include jamming attacks Sending a large number of packets to the base station Nodes battery exhaustion, network disruption, reducing WSN’s availability Node outage Stopping the functionality of WSN’s components. Physically, logical Stop nodes services, impossibility reading gathered information, launching a variety of other attacks. Eavesdropping Detecting the contents of communicati on by overhearing attempt to data Interception, abusing of wireless nature of WSN’s transmission medium Launching other attacks, extracting sensitive WSN information, delete the privacy protection and reducing data confidentiality DOS attacks A general attack includes several types of other attacks in different layer of WSN’s. reducing WSN’s availability. Physical layer, link layer, routing layer, transport layer, application layer attacks techniques. Effects of physical layer, link layer, routing layer, transport layer and application layer attacks. 6. PHYSICAL ATTACKS CLASSIFICATION BASED ON THREAT MODEL The physical attacks of WSN’s based on attacks nature and effects, attacker’s nature and capabilities, and WSN’s threat model are shown in the following table. Attacks Security Class Attack threat Threat model Signal/radio jamming Modification Availability, integrity External and active Device tampering Interception, modification, fabrication Availability, integrity, confidentiality, authenticity External and active
  • 3. IJRET: International Journal of Research in Engineering and Technology ISSN: 2319-1163 __________________________________________________________________________________________ Volume: 02 Issue: 01 | Jan-2013, Available @ http://www.ijret.org 74 Node capture Interruption, interception, modification, fabrication Availability, integrity, confidentiality, authenticity External and active Path-Based DOS Modification, fabrication Availability, authenticity External and active Node outage Modification Availability, integrity External and active Eavesdropping Interception Confidentiality External and passive DOS attacks Interruption, interception, modification, fabrication Availability, integrity, confidentiality, authenticity Active 7. DETECTION AND DEFENSIVE STRATEGIES OF WSN’S PHYSICAL ATTACKS In the following tablr a classification and comparison of detection defensive techniques on WSN’s physical attacks is presented. Attacks/ criteria Detection methods Defensive mechanisms Signal/radi o jamming Statistical information; Channel utility degradation than a threshold; Detecting background noise; Misbehavior detection techniques Access restriction; Encryption; Error-correction; Mode change; Lower duty cycle; Reporting attacks to base Station; Buffering; Mapping protocol Device tampering attack or node capture attack(phy sical layer) or node subversion attack (routing layer) or node cloning attack(appl ication layer) Node disconnection/ absence from the network; Regular Monitoring; Existence interference in functionality of node; Node destruction; Using key management protocol; Misbehavior detection techniques Optimizing and using crypto-processors or physically secure processors; Applying standard precautions; Hardware/software alerter; Access restriction; Physical protection; Data integrity protection; Data confidentiality protection; Malicious node detection Techniques; Local removing or exclude the capture CONCLUSIONS Security is a vital requirement and complex feature to deploy and extend WSN’s in different application domain. The most security physical attacks are targeting WSN security dimensions such as integrity, confidentiality, authenticity and availability. In this paper, the different dimensions of WSN’s security is analyzed and presented a wide variety of WSN’s physical attacks and classify them. The approach is to classify and compare the WSN’s physical attacks, their properties such as threat model of WSN’s physical attacks nature, goals and results, their strategies and effects and finally their associated detection and defensive techniques against these attacks to handle them independently and comprehensively. REFERENCES [1] K. Chris, W. David, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures”, University of California, Berkeley. [2] K. H. Kumar, A. Kar, “Wireless Sensor Network Security Analysis”, Proceedings of International Journal of Next-generation Networks, Vol. 1, No. 1, December 2009, pp 1-9. [3] P. Kumari, M. Kumar, R. Rishi, “Study of Security in Wireless Sensor Networks”, Proceedings of International Journal of Computer Science and Technology, Vol.1, No. 5, pp 347-354. [4] V.C. Manju, “Study of Security Issues in Wireless Sensor Network”, Proceedings of International Journal of Engineering Science and Technology (IJEST), Vol. 3, No.10, October 2011, pp 7347-7351. [5] N. Rajani, “Energy Efficient Reliable Routing Protocol for Wireless Sensor Networks”, Indian Institute of Technology, Kanpur, June 2008. [6] K. Sharma, M.K. Ghosh, D. Kumar et al, “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”, Proceedings of International Journal of Advanced Science and Technology”, Vol. 17, April 2010, pp 31-37. [7] R. Sharma, Y. Chaba, Y. Singh, “Analysis of Security Protocols in Wireless Sensor Network”, Proceedings of International Journal of Advanced Networking and Application, Vol. 2, No. 3, 2010, pp 707-713. [8] E. Shih, H.S. Cho, N. Ickes, R. Min, A. Sinha, A. Wang, A. Chandrakasan, “Physical Layer Driven Protocol and Algorithms Design for Energy-Efficient Wireless Sensor Networks”, Proceedings of MOBICOM’01, July 2001, Rome, Italy. [9] S. K. Singh, M. P. Singh, D.K. Singh, “Routing Protocols in Wireless Sensor Networks - A Survey”, Proceedings of International Journal of Computer Science & Engineering Survey (IJCSES), Vol.1, No. 2, November 2010. [10] S. Singh, H. K. Verma, “Security for Wireless Sensor Network”, Proceedings of International Journal on computer Science and Engineering (IJCSE), Vol. 3, No. 6, June 2011, pp 2393-2396. [11] K. Ssu, C. Chou, H. C. Jiau, W.T. Hu, “Detection and diagnosis of data inconsistency failures in Wireless Sensor Networks”, Proceedings of Elsevier Journal of Computer Networks, No. 50, 2006, pp 1247-1260. [12] K. Sophia, “Security Models for Wireless Sensor Networks”, Proceedings of, March 2006, pp 6-8.