A Comparison of Link Layer Attacks on Wireless Sensor Networks
2021, Zenodo (CERN European Organization for Nuclear Research)
https://doi.org/10.5281/ZENODO.4889912Abstract
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors [2]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional networks security techniques are unusable on WSNs [2]; due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively.
References (28)
- W. Znaidi, M. Minier and J. P. Babau; An Ontology for Attacks in Wireless Sensor Networks; INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE (INRIA); Oct 2008.
- K. Sharma and M. K. Ghose; Wireless Sensor Networks: An Overview on its Security Threats; IJCA, Special Issue on "Mobile Ad-hoc Networks" MANETs; CSE Department, SMIT, Sikkim, India; 2010.
- K. Xing, S. Sundhar, R. Srinivasan, M. Rivera, J. Li and X. Cheng; Attacks and Countermeasures in Sensor Networks: A Survey; Computer Science Department, George Washington University; Springer, Network Security; 2005.
- T. A. Zia; A Security Framework for Wireless Sensor Networks; Doctor of Philosophy Thesis; The School of Information Technologies, University of Sydney; Feb 2008.
- M. Saxena; Security in Wireless Sensor Networks: A Layer-based Classification; Department of Computer Science, Purdue University.
- Z. Li and G. Gong; A Survey on Security in Wireless Sensor Networks; Department of Electrical and Computer Engineering, University of Waterloo, Canada.
- A. Dimitrievski, V. Pejovska and D. Davcev; Security Issues and Approaches in WSN; Department of computer science, Faculty of Electrical Engineering and Information Technology; Skopje, Republic of Macedonia.
- J. Yick, B. Mukherjee and D. Ghosal; Wireless Sensor Network Survey; Elsevier's Computer Networks Journal 52 (2292-2330); Department of Computer Science, University of California; 2008.
- G. padmavathi and D. Shanmugapriya; A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks; International Journal of Computer Science and Information Security (IJCSIS), vol. 4, No. 1& 2; Department of Computer Science, Avinashilingam University for Women, Coimbatore, India; 2009.
- C. Karlof and D. Wagner; Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures; Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols; In First IEEE International Workshop on Sensor Network Protocols and Applications; University of California at Berkeley, Berkeley, USA; 2003.
- A. Perrig, R. Szewczyk, V. Wen, D. culler and D. Tygar; SPINS: Security Protocols for Sensor Networks; Wireless Networking ACM CCS; 2003.
- I. Krontiris, T. Giannetsos and T. Dimitriou; Launching a Sinkhole Attack in Wireless Sensor Networks, the Intruder Side; Athens Information Technology, Peania; Athens, Greece.
- A. Perrig, J. Stankovic and D. Wagner; Security in Wireless Sensor Networks; In Communications of the ACM Vol. 47, No. 6, 2004.
- A. Saini and H. Kumar; Comparison Between Various Black Hole Detection Techniques in MANET; Panjab University, Chandigarh; National Conference on Computational Instrumentation (NCCI); Mar 2010.
- R. Maheshwari, J. Gao and S. R. Das; Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information; IEEE INFOCOM; Alaska; 2007.
- Y. Hu, A. Perrig and D. B. Johnson; Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols; ACM; Carnegie Mellon University; Rice University; San Diego, California, USA; Sep 2003.
- I. Ullah and S. U. Rehman; Analysis of Black Hole attack On MANETs Using Different MANET Routing Protocols; Master Thesis, Electrical Engineering, Thesis no: MEE-2010-2698; School of Computing Blekinge Institute of Technology, Sweden; Jun 2010.
- C. Tumrongwittayapak and R. Varakulsiripunth; Detecting Sinkhole Attacks in Wireless Sensor Networks; ICROS-SICE International Conference; 2009.
- Y. Zhou, Y. Fang and Y. Zhang; Security Wireless Sensor Networks: A Survey; IEEE Communication Surveys; 2008.
- Y. Wang, G. Attebury and B. Ramamurthy; A Survey of Security Issues in Wireless Sensor Networks; IEEE Communication Surveys; 2006.
- R. H. Khokhar, M. A. Ngadi and S. Mandala; A Review of Current Routing Attacks in Mobile Ad Hoc Networks; Faculty of Computer Science and Information System, Department of Computer System & Communication, University Technology Malaysia (UTM); Malaysia.
- T. Kavitha and D. Sridharan; Security Vulnerabilities in Wireless Sensor Networks: A Survey; Journal of Information Assurance and Security; 2009.
- B. Parno and A. Perrig; Distributed Detection of Node Replication Attacks in Sensor Networks; Carnegie Mellon University.
- J. R. Douceur; the Sybil Attack; Proc. 1st ACM Int'l. Wksp. Peer-to-Peer Systems; 2002.
- J. Newsome, E. Shi, D. Song and A. Perrig; the Sybil Attack in Sensor Networks: Analysis & Defenses; Center for Computer and Communications Security; 2004.
- L. Hu and D. Evans; Using Directional Antennas to Prevent Wormhole Attacks; In Network and Distributed System Security Symposium (NDSS); 2004.
- Y. Hu, A. Perrig and D. Johnson; Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks; Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies; 2003.
- A. Wood and J. Stankovic; Denial of Service in Sensor Networks; IEEE Computer Mag.; 2002.