Abstract
Today wireless sensor networks (WSN) play an important role in most recent applications such as the internet of things, smart grid, VANET, and underwater sensor networks. Security is a fundamental aspect in WSN. However, WSN suffers from various constraints such as unsecured communications, fault tolerance, and limited resources, which make security a challenging task. In this paper, we present a survey on different attacks in WSNs and their corresponding countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rehmani, M.H., Pathan, A.S.K.: Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications. CRC Press, Boca Raton (2016)
Benahmed, K.: Surveillance Distribuée pour la Sécurité d’un Réseau de Capteurs Sans Fil. University of Ahmed Ben Bella, Oran, Alegria (2011)
Selmic, R.R., Phoha, V.V., Serwadda, A.: Wireless Sensor Networks: Security, Coverage, and Localization. Springer International Publishing (2016). https://doi.org/10.1007/978-3-319-46769-6
Islam, M.S., Rahman, S.A.: Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches. Int. J. Adv. Sci. Technol. 36, 1–8 (2011)
Bidan, C.: Sécurité des systèmes distribués: apport des architectures logicielles. University of Rennes 1, Rennes, Brittany, France (1998)
La, O.A.: Fiabilité de Dissémination dans les Réseaux de Capteurs Sans Fil. University of Science and Technology Houari Boumediene, Oran, Alegria (2008)
Ye, Z., Wen, T., Liu, Z., Song, X., Fu, C.: An efficient dynamic trust evaluation model for wireless sensor networks. J. Sens. 2017, 1–16 (2017)
Stallings, W.: Network and Internetwork Security: Principles and Practice. Prentice Hall, Englewood Cliffs (1995)
Cohen, F.: Information system attacks: a preliminary classification scheme. Comput. Secur. 16, 29–46 (1997)
Icove, D.S., Karl, V.W.: Computer Crime: A Crime Fighter’s Handbook. O’Reilly & Associates California, Sebastopol (1995)
Jayaram, M.: Network security a taxonomic view. In: European Conference on Security and Detection. London, UK. New York, NY, USA, pp. 124–127, IEEE (1997)
Perry, T.S., Paul, W.: Can computer crime be stopped? The proliferation of microcomputers in today’s information society has brought with it new problems in protecting both computer systems and their resident intelligence. IEEE Spectr. 21, 34–45 (1984)
Jaballah, W.B., Conti, M., Filè, G., Mosbah, M., Zemmari, A.: Whac-A-Mole: smart node positioning in clone attack in wireless sensor networks. Comput. Commun. 119, 66–82 (2018)
Newsome, J., Shi E., Song, D., Perrig, A.: The Sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd international symposium on Information processing in sensor networks. Berkeley, California. New York, NY, USA: ACM, pp. 1–10 (2004)
Pathan, A.-S.: Security of self-organizing networks: MANET, WSN, WMN. CRC Press, VANET (2016)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8, 2–23 (2006)
Wang, Y., Chen, R., Cho, J., Tsai, J.: Trust-based task assignment with multi objective optimization in service-oriented ad hoc networks. IEEE Trans. Netw. Serv. Manage. 14, 217–232 (2017)
Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: Beta-based trust and reputation evaluation system for wireless sensor networks. J. Netw. Comput. Appl. 59, 88–94 (2016)
Sun, Y., Han, Z., Liu, K.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46, 112–119 (2008)
Vijaya, K., Selvam, M.: Improving resilience and revocation by mitigating bad mouthing attacks in wireless sensor networks. Int. J. Sci. Eng. Res. 4, 1–5 (2013)
Raj, M., Kumar, G., Kusampudi, K.: A survey on detecting selfish nodes in wireless sensor networks using different trust methodologies. Int. J. Eng. Adv. Technol. (IJEAT) 2, 197–200 (2013)
Lopez, J., Roman, R., Agudo, I., Fernandez, C.: Trust management systems for wireless sensor networks: Best practices. Comput. Commun. 33, 1086–1093 (2010)
Lee, K.-S., Lee, S.-R., Kim, Y., Lee, C.-G.: Deep learning based real time query processing for wireless sensor network. Int. J. Distrib. Sens. Netw. 13, 1–10 (2017)
Raja, K.N., Beno, M.M.: Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against Sybil attack. J. Med. Syst. 41, 107 (2017)
Fung, C., Boutaba, R.: Intrusion Detection Networks: A Key to Collaborative Security. CRC Press, Boca Raton (2013)
Pathan, A.S.K.: The State of the Art in Intrusion Prevention and Detection. CRC Press, Boca Raton (2014)
Aivaloglou, E., Gritzalis, S., Skianis, C.: Trust establishment in sensor networks: behaviour-based, certificate-based and a combinational approach. Int. J. Syst. Syst. Eng. 1(1–2), 128–148 (2008)
Omar, M., Challal, Y., Bouabdallah, A.: Certification-based trust models in mobile ad hoc networks: a survey and taxonomy. J. Netw. Comput. Appl. 35(1), 268–286 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Saidi, A. (2024). Attacks and Countermeasures in Wireless Sensor Networks. In: Hatti, M. (eds) IoT-Enabled Energy Efficiency Assessment of Renewable Energy Systems and Micro-grids in Smart Cities. IC-AIRES 2023. Lecture Notes in Networks and Systems, vol 984. Springer, Cham. https://doi.org/10.1007/978-3-031-60629-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-60629-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-60628-1
Online ISBN: 978-3-031-60629-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)