Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 984))

  • 88 Accesses

Abstract

Today wireless sensor networks (WSN) play an important role in most recent applications such as the internet of things, smart grid, VANET, and underwater sensor networks. Security is a fundamental aspect in WSN. However, WSN suffers from various constraints such as unsecured communications, fault tolerance, and limited resources, which make security a challenging task. In this paper, we present a survey on different attacks in WSNs and their corresponding countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rehmani, M.H., Pathan, A.S.K.: Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications. CRC Press, Boca Raton (2016)

    Google Scholar 

  2. Benahmed, K.: Surveillance Distribuée pour la Sécurité d’un Réseau de Capteurs Sans Fil. University of Ahmed Ben Bella, Oran, Alegria (2011)

    Google Scholar 

  3. Selmic, R.R., Phoha, V.V., Serwadda, A.: Wireless Sensor Networks: Security, Coverage, and Localization. Springer International Publishing (2016). https://doi.org/10.1007/978-3-319-46769-6

  4. Islam, M.S., Rahman, S.A.: Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches. Int. J. Adv. Sci. Technol. 36, 1–8 (2011)

    Google Scholar 

  5. Bidan, C.: Sécurité des systèmes distribués: apport des architectures logicielles. University of Rennes 1, Rennes, Brittany, France (1998)

    Google Scholar 

  6. La, O.A.: Fiabilité de Dissémination dans les Réseaux de Capteurs Sans Fil. University of Science and Technology Houari Boumediene, Oran, Alegria (2008)

    Google Scholar 

  7. Ye, Z., Wen, T., Liu, Z., Song, X., Fu, C.: An efficient dynamic trust evaluation model for wireless sensor networks. J. Sens. 2017, 1–16 (2017)

    Article  Google Scholar 

  8. Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice Hall, Englewood Cliffs (1995)

    Google Scholar 

  9. Cohen, F.: Information system attacks: a preliminary classification scheme. Comput. Secur. 16, 29–46 (1997)

    Article  Google Scholar 

  10. Icove, D.S., Karl, V.W.: Computer Crime: A Crime Fighter’s Handbook. O’Reilly & Associates California, Sebastopol (1995)

    Google Scholar 

  11. Jayaram, M.: Network security a taxonomic view. In: European Conference on Security and Detection. London, UK. New York, NY, USA, pp. 124–127, IEEE (1997)

    Google Scholar 

  12. Perry, T.S., Paul, W.: Can computer crime be stopped? The proliferation of microcomputers in today’s information society has brought with it new problems in protecting both computer systems and their resident intelligence. IEEE Spectr. 21, 34–45 (1984)

    Google Scholar 

  13. Jaballah, W.B., Conti, M., Filè, G., Mosbah, M., Zemmari, A.: Whac-A-Mole: smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119, 66–82 (2018)

    Google Scholar 

  14. Newsome, J., Shi E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd international symposium on Information processing in sensor networks. Berkeley, California. New York, NY, USA: ACM, pp. 1–10 (2004)

    Google Scholar 

  15. Pathan, A.-S.: Security of self-organizing networks: MANET, WSN, WMN. CRC Press, VANET (2016)

    Book  Google Scholar 

  16. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006)

    Google Scholar 

  17. Wang, Y., Chen, R., Cho, J., Tsai, J.: Trust-based task assignment with multi objective optimization in service-oriented ad hoc networks. IEEE Trans. Netw. Serv. Manage. 14, 217–232 (2017)

    Article  Google Scholar 

  18. Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: Beta-based trust and reputation evaluation system for wireless sensor networks. J. Netw. Comput. Appl. 59, 88–94 (2016)

    Article  Google Scholar 

  19. Sun, Y., Han, Z., Liu, K.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46, 112–119 (2008)

    Article  Google Scholar 

  20. Vijaya, K., Selvam, M.: Improving resilience and revocation by mitigating bad mouthing attacks in wireless sensor networks. Int. J. Sci. Eng. Res. 4, 1–5 (2013)

    Google Scholar 

  21. Raj, M., Kumar, G., Kusampudi, K.: A survey on detecting selfish nodes in wireless sensor networks using different trust methodologies. Int. J. Eng. Adv. Technol. (IJEAT) 2, 197–200 (2013)

    Google Scholar 

  22. Lopez, J., Roman, R., Agudo, I., Fernandez, C.: Trust management systems for wireless sensor networks: Best practices. Comput. Commun. 33, 1086–1093 (2010)

    Article  Google Scholar 

  23. Lee, K.-S., Lee, S.-R., Kim, Y., Lee, C.-G.: Deep learning based real time query processing for wireless sensor network. Int. J. Distrib. Sens. Netw. 13, 1–10 (2017)

    Google Scholar 

  24. Raja, K.N., Beno, M.M.: Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against Sybil attack. J. Med. Syst. 41, 107 (2017)

    Google Scholar 

  25. Fung, C., Boutaba, R.: Intrusion Detection Networks: A Key to Collaborative Security. CRC Press, Boca Raton (2013)

    Google Scholar 

  26. Pathan, A.S.K.: The State of the Art in Intrusion Prevention and Detection. CRC Press, Boca Raton (2014)

    Google Scholar 

  27. Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach. Int. J. Syst. Syst. Eng. 1(1–2), 128–148 (2008)

    Article  Google Scholar 

  28. Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268–286 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed Saidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saidi, A. (2024). Attacks and Countermeasures in Wireless Sensor Networks. In: Hatti, M. (eds) IoT-Enabled Energy Efficiency Assessment of Renewable Energy Systems and Micro-grids in Smart Cities. IC-AIRES 2023. Lecture Notes in Networks and Systems, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-031-60629-8_4

Download citation

Publish with us

Policies and ethics