A Full Review of Attacks and Countermeasures in Wireless Sensor Networks

A Full Review of Attacks and Countermeasures in Wireless Sensor Networks

Pejman Niksaz, Mohammad Javad Kargar
Copyright: © 2012 |Pages: 39
DOI: 10.4018/jisp.2012100101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs into such a constrained environment. Thus, familiarity with the security aspects of WSNs is essential before designing WSN systems. In order to provide effective integrity, confidentiality, and authentication during communication, the need for additional security measures in WSNs emerges. In this paper, the authors review the security requirements for WSNs, the different kinds of possible attacks, and security mechanisms used to overcome these attacks. The authors also present some statistical data for such attacks in WSN and some tables that indicate a comparison between different security mechanisms.
Article Preview
Top

Introduction

Sensor networks refer to a heterogeneous system combining tiny sensors and actuators with general-purpose computing elements. These tiny sensors have some limitations in power supplies, bandwidth, memory size, and energy (Wireless sensor networks, 2004; Akyildiz, Su, Sankarasubramaniam, & Cayirci, 2002), (Loveric & Sieffert). Thus, the resource-limited nature of sensor networks poses great challenges for security (Akyildiz et al., 2002). Furthermore, sensor networks can be used in a wide range of applications. For example, in the military, wireless sensor networks have been used for some applications such as sensing techniques for military commands, control, communications, computing, intelligence, surveillance, reconnaissance and targeting systems. In healthcare, sensor nodes can also be used for monitoring patients and assisting disabled individuals. In addition, there are lots of applications for wireless sensor networks (WSNs) including commercial applications for managing inventory, monitoring product quality, and monitoring disaster areas (Undercoffer, Avancha, Joshi, & Pinkston, 2002; Datema, 2005).

Because of the resource-constrained nature of WSNs, we should consider the best and the most suitable security mechanism against potential security threats (Walters, Liang, Shi, & Chaudhary, 2007). Generally, there are some serious limitations with current security mechanisms. In order to understand these limitations, it is essential to evaluate the differences between WSNs and general ad hoc networks (Lidong & Haas, 1999; Sakarindr & Ansari, 2007).

The most important differences between sensor networks and ad hoc networks include:

  • The number of sensor nodes, which can be significantly higher in sensor networks compared to ad hoc network.Sensor nodes are densely deployed;

  • Sensor nodes are prone to failures;

  • The topology of a sensor network varies constantly;

  • Sensor nodes use a broadcast communication. In contrast, most ad hoc networks are based on point-to-point communications;

  • Sensor nodes are limited in power, computational capacities, and memory;

  • Sensor nodes may not have global identification (ID) due to the large amount of overhead and high number of sensors.

This paper will discuss WSN limitation, the essential requirements for ensuring WSN security, requirements for secure sensor network protocols, potential attacks in different network layers, and some proposed countermeasures against these attacks.

Top

Wsn Limitations

Some basic limitations in WSNs are as follows (Du, Deng, Han, Chen, & Varshney, 2004; Shi & Perrig, 2004):

Limited Resources

  • Limited Memory and Storage Space: A sensor is a really small device with just a low amount of memory and storage space for the code;

  • Power Limitation: Since the sensors are battery operated, energy is the biggest limitation to wireless sensor capabilities.

Unreliable Communication

  • Unreliable Transfer: The packet-based routing of the sensor network is connectionless and, thus, it can be unsafe. Packets may physically get harmed because of channel errors or dropped at highly congested nodes. As a result, packets are lost or may go missing;

  • Conflicts: Since these networks communicate through broadcast, they are potentially unreliable even though the channel is not;

  • Latency: Multi-hop routing, network congestion, and node processing can lead to greater latency in the network, making it difficult to achieve synchronization among sensor nodes.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing