Critical Analysis of Numerous Attacks Irreverent Security in Remote Sensor Networks

Komal Sharma, Anuradha Saini


Remote Sensor Networks have risen as innovation of the current century and has givenan intense blend of dispersed detecting, figuring and correspondence of attacks. With its developing application regions, especially in mission-basic applications, for example, military observing frameworks and war zone observation, security has turned into a critical need keeping in mind the end goal to ensure the touchy information included. The need of viable and effective security systems is necessary and to secure sensor systems has pulled in a lot of scientists' consideration making it hot research zone in the current years. Among the quantity of assaults on the sensor arrange, the Selective Forwarding attack, assumed name as grayhole attack, is a genuine and difficult to-distinguish security assault that can render the system ineffective if the attack was left undetected. In this attack, the principal objective of the attacker is to keep the critical delicate information from achieving the base station. To accomplish this objective, the harmful hub specifically drops certain nodes, in view of some picked criteria, and advances the remaining. The assault turns out to be more viable when the attacker incorporates itself on the way of the information flow. This paper aims to give an outline and investigation of existing ways to deal with counter particular sending assault in remote sensor systems.

Full Text:



P Suma, O Nagaraju, MA Hussain, “Node Disjoint Random and Optimal Path Selection (NDROPS) Algorithm for Security in MANETS”, International Journal of Electrical and Computer Engineering (IJECE), Vol. 7 Issue. 3, pp. 1197-1203, 2017.

Yuxin Mao and Ping Zhu, "A Game Theoretical Model for Energy-Aware DTN Routing in MANETs with Node's Selfishness", Mobile Networks and Applications, Vol. 20, no. 5, pp. 593-603, 2017.

C. Anand, R. K. Gnanamurthy,” Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network”, 2016 Springer Science + Business Media New York

Omar Said and Alaa Elnashar,” Scaling of wireless sensor network intrusion detection probability: 3D sensors, 3D intruders, and 3D environments”, 2016 Springer.

Suparna Biswas, Subhajit Adhikari,” A Survey of Security Attacks, Defenses and Security Mechanisms in Wireless Sensor Network”, 2015 International Journal of Computer Applications (0975 – 8887) Volume 131 – No.17.

Megha Joshi, Saumil Patel," Centralized Signature based Approach for Wireless Sensor Network using RSA algorithm", 2015 International Journal of Technological Research in Engineering Volume 2, Issue 8.

Leena Rani, Er. Veena Rani,” A Novel Study on Data Flow Routing with Energy Optimization under Different Attacks in WSN”, 2015

Ruchita Dhulkar, Ajit Pokharkar, Mrs. Rohini Pise,” Survey on different attacks in Wireless Sensor Networks and their prevention system”, 2015

Ju young Kim, Ronnie D. Caytiles, Kyung Jung Kim, “A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks” Journal of Security Engineering, 2014, pp.241-250

Juby Joseph, Vinodh P Vijayan,”Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol”, 2014 Vol.4

Wang Chun-Hsin and Li Yang-Tang, “Active Black Holes Detection in Ad-Hoc Wireless Networks”, Ubiquitous and Future Networks (ICUFN) 2013 Fifth International Conference on Da Nang, pp. 94-99, IEEE, 2013

Roshan Singh Sachan, Mohammad Wazid, Avita Katal, D P Singh, R H Goudar,” A Cluster-Based Intrusion Detection and Prevention Technique for Misdirection Attack inside WSN”, 2013 IEEE 978-1-4673-4866-9/13/

Hero Modraes, Rosli Salleh and Amir hossein Moravjosharieh, “Overview of Security Issues in Wireless Sensor Networks”, Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), IEEE 2012, pp. 308-311.

Roshan Singh Sachan, Mohammad Wazid, D.P. Singh, Avita Katal and R.H. Goudar, “Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction”, 2012 IEEE 978-1-4673-4603.

Yi-Ying ZHANG, Xiang-zhen LI, Yuan-an LIU, “The detection and defense of DoS attack for wireless sensor network”, Elsevier Journal of China Universities of Posts and Telecommunications, Vol19, pp. 52-56, Oct-2012.

Dr. Shahriar Mohammadi and Hossein Jadidoleslamy,” A COMPARISON OF LINK LAYER ATTACKS ON WIRELESS SENSOR NETWORKS”, 2011, GRAPH-HOC, Vol.3, No.1

Kalpana Sharma and M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threats”IJCA Special Issue on “Mobile Ad-hoc Networks” MANETs, 2010, pp.42-45

Hossein Jadidoleslamy,” A Hierarchical Intrusion Detection Architecture for wireless sensor networks”, 2011 Vol.3, No.5.

Teodar-Grigopou, “Main Types of Attacks in Wireless Sensor Network”, Recent Advances in Signals and Systems, ISSN: 1790-5109, 2009.

Dr. G. Padmavathi, Mrs. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks”, International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009, pp. 1-9.

Maan younis Abdullah, Gui Wei Hua, Naif Alsharabi, “Wireless Sensor Networks Misdirection Attacker Challenges and Solutions”, 2008 IEEE 978-1-4244-2184-8/08/

Michael Collins, Simon Dobson, Paddy Nixon,” Securing Wireless Sensor Networks: Introducing ASLAN - A Secure Lightweight Architecture for WSNs”, 2009 International Journal on Advances in Internet Technology, Vol. 2 No. 3



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.