Security Attacks in Wireless Sensor Networks

  • Authors

    • Lalitha Bhagavathi Gurajada
    • Sai Deepthi Rajaputra
    • Indira Gogineni
    • Riaz Shaik
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15704
  • Attacks, Security, Vulnerabilities
  • In today’s world, Security is the prime concern for each application. Network security and Computer protection are the serious issues. A broad range of Wireless Sensor Networks (WSNs) applications[1][15] are widely used in military, researches etc. The key subject of computing is to provide network security several types of attacks are increasing day by day. The attacks present in different layers are produced due to the susceptibilities present in the layers. The Seven layers in OSI model are formulated to convey the information from highest layer to lowest layer. Broadcast of data gets modified according to the layer in which it lies. Individually every layer is weak to different types of attacks. This paper models about the different attacks present in each layer of OSI.

     

     

  • References

    1. [1] Riaz Shaik Shaik Shakeel Ahamad Key management schemes of wireless sensor networks: A Survey fronteiras journal of social ,technological and environmental science v.6,n.2,may-august 2017

      [2] J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, April 2004.

      [3] GReAT, Kaspersky Lab Expert: The Red October Campaign - An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies

      [4] http://www.iaeng.org/publication/IMECS2008/IMECS2008_pp1143-1148.pdf

      [5] Dave Jing Tian, Kevin R. B. Butler, Joseph I. Choi, Patrick McDaniel, Padma Krishnaswamy, Securing ARP/NDP From the Ground Up, Information Forensics and Security IEEE Transactions on, vol. 12, pp. 2131-2143, 2017, ISSN 1556-6013.

      [6] Sharma, R. Singh, G. Pandey, Detection and Prevention from Black Hole attack in AODV protocol for MANET, Published in International Journal of Computer Applications, vol. 50, no. 5, 2012.

      [7] Riaz Shaik Shaik Shakeel Ahamad ,An agent based hybird approach for dynamic key management system in dynamic wireless sensor network Journal of advanced research in dynamical and control systems vol.9,Issue 2,Oct 2017

      [8] Harris Simaremare, Abdelhafid Abouaissa, RiriFitri Sari, Pascal Lorenz, Performance Analysis of Optimized Trust AODV using ANT Algorithm, IEEE ICC 2014 - Communications Software Services and Multimedia Applications Symposium, pp. 1843-1848.

      [9] http://scitechconnect.elsevier.com/wp-content/uploads/2013/09/Layer-1-The-Physical-Layer.pdf

      [10] http://bladesecurity.blogspot.in/2013/09/layer-5-attacks-session-layer-attacks.html

      [11] https://tools.ietf.org/html/rfc7457

      [12] http://www.informit.com/articles/article.aspx?p=361984&seqNum=10

      [13] http://www.psafe.com/en/blog/here-are-the-largest-ddos-attacks-in-history/

      [14] Riaz Shaik Shaik Shakeel Ahamad Enhanced Attack Resistant agent based dynamic key management in dynamic wireless sensor newtworks International journal of civil enggineering and technology 8(12),2017,pp,69-76

      [15] DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection, IEEE INFOCOM’06, 2006.

  • Downloads

  • How to Cite

    Bhagavathi Gurajada, L., Deepthi Rajaputra, S., Gogineni, I., & Shaik, R. (2018). Security Attacks in Wireless Sensor Networks. International Journal of Engineering & Technology, 7(2.32). https://doi.org/10.14419/ijet.v7i2.32.15704