Security Issues and Attacks in Wireless Sensor Network: Article
Security Issues and Attacks in Wireless Sensor Network: Article
Security Issues and Attacks in Wireless Sensor Network: Article
net/publication/266991227
CITATIONS READS
43 4,542
6 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Wireless Sensor Networks, Vehicular Ad hoc Networks, Wireless Body Sensor Networks, Internet of Things: Development of new integrated models to merge these fields for
future smart cities, internet of vehicles, health based transportation system View project
All content following this page was uploaded by Kashif Naseer Qureshi on 17 October 2014.
Faculty of Computing, University Teknologi Malaysia, 81310 Skudai, Johor Bahru, Malaysia
Abstract: Wireless sensor network is one of the most growing technology for sensing and performing the
different tasks. Such networks are beneficial in many fields, such as emergencies, health monitoring,
environmental control, military, industries and these networks prone to malicious users' and physical attacks
due to radio range of network, un-trusted transmission, unattended nature and get access easily. Security is
a fundamental requirement for these networks. In this paper, our center of attention is on physical attacks and
issues in wireless sensor networks. Through this review, easily identify the purpose and capabilities of the
attackers. Further, we discuss well-known approaches of security detection against physical attacks.
Corresponding Author: Raja Waseem Anwar, Faculty of Computing, University Teknologi Malaysia,
81310 Skudai, Johor Bahru, Malaysia.
1224
World Appl. Sci. J., 30 (10): 1224-1227, 2014
1225
World Appl. Sci. J., 30 (10): 1224-1227, 2014
1226
World Appl. Sci. J., 30 (10): 1224-1227, 2014
authenticity and availability. In this short review, 5. Pooja, M. and D.Y. Singh, 2013. Security Issues and
the security issues and physical attacks analyzed. We try Sybil Attack in Wireless Sensor Networks.
to focus more specific knowledge for researchers. International Journal of P2P Network Trends and
The approach is to classify and compare the WSN’s Technology, 3(1): 7-13.
physical attacks, their properties such as their strategies 6. Singh, S.K., M. Singh and D. Singhtise, 2011.
and effects and finally their associated detection and A survey on network security and attack defense
defensive techniques against these attacks to handle mechanism for wireless sensor networks. Int. J.
them independently and comprehensively. Comput. Trends Tech, pp: 5-6.
7. Becher, A., Z. Benenson and M. Dornseif, 2006.
REFERENCES Tampering with motes: Real-world physical attacks
on wireless sensor networks. Springer.
1. Lewis, F.L., 2004. Wireless sensor networks. 8. Deng, J., R. Han and S. Mishra, 2005.
Smart environments: technologies, protocols and Defending against path-based DoS attacks in
applications, pp: 11-46. wireless sensor networks. in Proceedings of the 3rd
2. Haboub, R. and M. Ouzzif, 2011. Secure Routing IN ACM workshop on Security of ad hoc and sensor
WSN. International Journal, pp: 2. networks. ACM.
3. Giruka, V.C., et al., 2008. Security in wireless sensor 9. Kalita, H.K. and A. Kar, 2009. Wireless sensor
networks. Wireless communications and mobile network security analysis. International Journal of
computing, 8(1): 1-24. Next-Generation Networks (IJNGN), 1(1): 1-10.
4. Jain, M.K., 2011. Wireless sensor networks: 10. Ning, P., A. Liu and W. Du, 2008. Mitigating DoS
Security issues and challenges. International Journal attacks against broadcast authentication in wireless
of Computer and Information Technology, sensor networks. ACM Transactions on Sensor
2(1): 62-67. Networks (TOSN), 4(1): 1.
1227