Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani
Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani
Deepali Virmani, Ankita Soni, Shringarica Chandel, Manas Hemrajani
deepalivirmani@gmail.com
2
ankita24soni@gmail.com
shringaricachandel37@gmail.com
4
manas.hemrajani@gmail.com
A. Primary Goals
1) Data Confidentiality: Confidentiality is the means of
limiting information access to only the authorized
users and preventing access or disclosure by the
unauthorized users. Data confidentiality is the most
important issue that any network must address. Sensor
nodes carry sensitive data which must be concealed
from the malicious nodes or attackers. If sensor nodes
are not capable of keeping the data confidential, then
any neighbouring node can tamper with the data and
transmit false information. This can cause serious
hazards, especially in military applications.
2) Data Authentication: Data authentication is the ability
of a receiver to verify that the data received by it is
from a correct sender. In a wireless sensor network,
data can not only be tampered by the malicious nodes
but the entire packet stream can be changed by
addition of false packets to it. So, a receiver must be
able to identify if the data originated from the correct
source or not. Data authentication can be achieved
using symmetric key cryptography where the sender
and receiver share a secret key or using asymmetric
key cryptography where the data can be encrypted and
decrypted using public and private keys.
3) Data Availability: Data availability determines if the
services of the network are available in case of failure
or presence of attacks in the network. A single point
failure in the network can threaten the availability of
resources and other services. So, data availability is of
prime importance and is responsible for the operation
of the network.
I. INTRODUCTION
Wireless Sensor Network consists of a large number of small
and low cost sensor nodes which are randomly deployed in an
area. The sensor nodes have computational capability to carry
out simple computations and transmit the required information
[1]. These nodes transmit information to the sink node that
aggregates the entire information received from other nodes
and generates a summary data to be transmitted to another
network. These sensor nodes can collectively monitor physical
and environmental conditions like pressure, temperature,
humidity and sound vibrations. Such features ensure a wide
range of applications for wireless sensor network such as
military, medical, industrial, disaster relief operations,
environmental monitoring, traffic surveillance, agriculture,
infrastructure monitoring [1, 2]. Since the majority of sensor
nodes are deployed in hostile environment, they are
susceptible to various attacks that are caused by malicious or
compromised nodes in the network. The malicious nodes can
alter the normal behaviour of the network, tamper with the
nodes hardware and software, transmit false information, or
drop the required information. Hence, security of wireless
sensor network becomes a critical issue.
This paper majorly contributes towards the security attacks
and their defence mechanisms. The paper is structured in the
following manner: Section 2 discusses about the security goals
in wireless sensor network. Section 3 provides a
categorization of security attacks. Section 4 gives their
detailed explanation. Section 5 gives an explanation of the
Security Attacks
Active Attacks
Routing Attacks
Passive attacks
Denial of Service
Sybil Attack
Monitoring and
Eavesdropping
Traffic
Analysis
Camouflage
requests and so, it will not be available for the legal users.
This causes performance degradation of the entire network
as the network gets congested because of illegal requests.
D. Wormhole Attack
VII. CONCLUSION
Wireless Sensor Networks are vulnerable to many types of
attacks due to deployment of sensor nodes in an unattended
environment. In this survey, firstly we have given the security
goals of a network. Next, we have classified the attacks in
WSN in two categories i.e. active and passive attacks. Further,
we have given the definition of these types of attacks and have
also given the known defences and countermeasures against
them. This survey also gives the tabular classification of
attacks and determines the severity of each attack. We hope
that this survey will help future researches in developing a
good knowledge about the attacks and their countermeasures.
TABLE 1
ATTACKS ON WSN
Attack Name
Eavesdropping
Attack Definition
Overhearing the communication
channel to gather confidential
data .
Traffic Analysis
Low
Camouflage
Low
Sybil
High
Black hole
High
High
Denial of Service
(DoS)
Attack Effects
Reduces data confidentiality
Severity
Low
Wormhole
Tunneling
and
replaying
messages from one location to
another via low latency links that
connect two nodes of WSN.
High
Hello Flood
Transmission of a message by
malicious
node
with
an
abnormally high transmission
power to make the nodes believe
that it is their neighbor
High
Grey hole
High
References
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless
sensor networks: A survey, Computer Networks, pp. 393-422, 2000.
[2] A.S.K. Pathan, H.W. Lee, C.S. Hong, Security in Wireless Sensor
Networks: Issues and Challenges, Communications, IEEE Transaction , Feb
2006.
[3] G. Padmavathi, D. Shanmugapriya,A Survey of Attacks, Security
Mechanisms and Challenges in Wireless Sensor Networks, International
Journal of Computer Science and Information Security, vol. 4, 2009.
[4] A. Perrig, J. Stankovic, D.Wagner, Security in Wireless Sensor
Networks, Communications of the ACM, 2004, pp.53-57.
[5] J.P. Walters, Z. Liang, W. Shi, V. Chaudhary, Wireless Sensor Network
Security: A Survey, Security in Distributed, Grid and Pervasive Computing,
pp.3-5, 10-15, 2006.
[6] H. Chan, A. Perrig, and D. Song, Random key predistribution schemes
for sensor networks, In Proceedings of the 2003 IEEE Symposium on
Security and Privacy,2003, p.197.
[7] J. Undercoffer, S. Avancha, A. Joshi and J. Pinkston, Security for sensor
networks, In Proceedings of the CADIP Research Symposium, 2002.
[8] W. Chang and J. Wu , A Survey of Sybil Attacks in Networks, Sensor
Networks for Sustainable Development, M. Ilyas (ed), CRC Press.
[9] M. Al-Shurman, S.M. Yoo, S. Park, Black Hole Attack in Mobile Ad
Hoc Networks, 42nd Annual ACM Southeast Regional Conference (ACMSE'42), 2004.
[10] S. Dokurer, Simulation of Black Hole Attack In Wireless Ad-Hoc
Networks, Master Thesis, Atilim University, Turkey.
[11] S. A. Soomro, S. Ah. Soomro, A. G. Memon, A. Baqi, Denial of
Service Attacks in Wireless Ad-hoc Networks, Journal of Information &
Communication Technology, vol. 4, no. 2, pp. 01-10.
[12] Y.C Hu, A. Perrig, D.B. Johnson, Packet Leashes: A Defense against
Wormhole Attacks in Wireless Networks, INFOCOM 2003, Twenty-Second
Annual Joint Conference of the IEEE Computer and Communication Societies,
2003, vol. 3, pp. 1976-1986.
[13] V. Mahajan, M. Natu, and A. Sethi, Analysis of Wormhole Intrusion
Attacks In Manets, IEEE Military Communications Conference (MILCOM),
2008, pp.1-7.
[14] V. P. Singh, S. Jain and J. Singhai, Hello Flood Attack and its
Countermeasures in Wireless Sensor Networks, International Journal of
Computer Science, vol. 7, no. 11, may 2010.
[15] S. Mohammadi1, R. E. Atani, H. Jadidoleslamy, A Comparison of Link
Layer Attacks on Wireless Sensor Networks, Journal of Information
Security, pp.69-84, 2011.
[16] J. Newsome, E. Shi, D. Song, and A. Perrig, The sybil attack in sensor
networks: analysis & defenses, in Proc. of ACM IPSN, 2004, pp. 259268.
[17] J. Ledlie and M. Seltzer, Distributed, secure load balancing with skew,
heterogeneity and churn, in Proc. of IEEE INFOCOM, vol. 2, 2005, pp.
14191430.
[18] J. Douceur, The sybil attack, Peer-to-Peer Systems, 2002.
[19] H. Yu, M. Kaminsky, P. B. Gibbons, A. Flaxman, SybilGuard:
Defending Against Sybil Attacks via Social Networks, SIGCOMM06 ACM,
2006.
[20] Z. Karakehayov, Using REWARD to detect team black-hole attacks in
wireless sensor networks, in Proc. Workshop on Real-World
Wireless Sensor Networks, June 2005.
[21] J. Cai, P. Yi, J. Chen, Z. Wang, N. Liu, An Adaptive Approach To
Detecting Black And Gray Hole Attacks In Ad Hoc Network, 24th IEEE
International Conference on Advanced Information Networking and
Applications, 2010.
[22] D.Virmani, M. Hemrajani, S. Chandel, Exponential Trust Based
Mechanism to Overcome Black hole Attack in Wireless Sensor Networks,
Proceedings of The International Conference on Computing, Informatics and
Networks, 2014, pp.59-63.
[23] D. Virmani, A. Soni, N. Batra, Reliability Analysis to Overcome Black
hole Attack in Wireless Sensor Networks, Proceedings of The International
Conference on Computing, Informatics and Networks, 2014, pp.45-51.
[24] C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, D. Zamboni,
"Analysis of a Denial of Service Attack on TCP", Proceedings of the IEEE
Symposium on Security and Privacy, 1997.
[25] L Ricciulli, P. Lincoln, P. Kakkar, "TCP SYN Flooding Defense",
CNDS, 1999.
[26] J. Eriksson, S. V. Krishnamurthy, M. Faloutsos, TrueLink: A Practical
Countermeasure to the Wormhole Attack in Wireless Networks, IEEE, 2006.
[27] V.P. Singh, A.S. Anand, S. Jain, Signal Strength based Hello Flood
Attack Detection and Prevention in Wireless Sensor Networks, International
Journal of Computer Applications, vol. 62, no.15, 2013.
[28] W. Z. Khana , Y. Xiangb, M. Y. Aalsalema, Q. Arshada, The Selective
Forwarding Attack in Sensor Networks: Detections and Countermeasures,
I.J. Wireless and Microwave Technologies, 2012
[29] B. Xiao, B. Yu, C. Gao, CHEMAS: Identify suspect nodes in selective
forwarding attacks, Journal of Parallel and Distributed Computing, vol. 67,
2007.