Security in Wireless Sensor Networks has become one of the most relevant research topics. Designing a secure routing protocol in a wireless sensor network is a challenging task because of the limitations on memory, computational and communication capabilities, bandwidth and energy of the sensor nodes. Most of the routing protocols that were proposed were designed by keeping efficiency of energy in view but not security. Routing protocols in wireless sensor networks are susceptible to various types of attacks such as hello flood attack, Sybil attack, sink hole attack, worm hole attack, selective forwarding attack, eavesdropping, acknowledgment spoofing, routing table overflow and so on. In this paper we discuss different types of attacks on routing protocols in detail and also some of the defensive techniques proposed in literature to counter the attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.