Security Threats in Wireless Sensor Networks

Security Threats in Wireless Sensor Networks

Alekha Kumar Mishra
ISBN13: 9781522504863|ISBN10: 1522504869|EISBN13: 9781522504870
DOI: 10.4018/978-1-5225-0486-3.ch012
Cite Chapter Cite Chapter

MLA

Mishra, Alekha Kumar. "Security Threats in Wireless Sensor Networks." Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures, edited by Niranjan K. Ray and Ashok Kumar Turuk, IGI Global, 2017, pp. 307-325. https://doi.org/10.4018/978-1-5225-0486-3.ch012

APA

Mishra, A. K. (2017). Security Threats in Wireless Sensor Networks. In N. Ray & A. Turuk (Eds.), Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures (pp. 307-325). IGI Global. https://doi.org/10.4018/978-1-5225-0486-3.ch012

Chicago

Mishra, Alekha Kumar. "Security Threats in Wireless Sensor Networks." In Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures, edited by Niranjan K. Ray and Ashok Kumar Turuk, 307-325. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0486-3.ch012

Export Reference

Mendeley
Favorite

Abstract

Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.