2016
DOI: 10.1007/978-981-10-1678-3_31
|View full text |Cite
|
Sign up to set email alerts
|

Detailed Survey on Attacks in Wireless Sensor Network

Abstract: Due to wireless mode of communication, sensors could be deployed at any corner and could be easily monitored from different locations. WSN have much less maintenance, economical and without difficulty deployable in assessment to its counter elements. In WSNs, the energy is scattered while detecting, handling, transmitting or getting information. The detecting subsystem is utilized for data obtaining. A sensor network is an infrastructure produced from sensing, computing and conversation elements that provide a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Hence, legitimate nodes are prevented from sending packets to the base station. Authentication techniques and anti-replay protection counter this attack [82].…”
Section: The Most Known Attacksmentioning
confidence: 99%
“…Hence, legitimate nodes are prevented from sending packets to the base station. Authentication techniques and anti-replay protection counter this attack [82].…”
Section: The Most Known Attacksmentioning
confidence: 99%
“…In [23][24][25][26][27] the authors have presented the studies and surveys on different kinds of attacks on wireless sensor networks. However, D h a k n e and C h a t u r [28] have given the detailed analysis and divided the attacks on WSNs in five categories based on different perspectiveslayers, authentication, privacy, and others. Security& privacy issues and challenges for RFID have been discussed in [29][30][31][32], which provides knowledge about the potential attacks and threats for RFID systems.…”
Section: Threats and Attacksmentioning
confidence: 99%
“…This attack is passive in nature and involves listening to the channel secretly to retrieve sensitive information. Eavesdropping becomes more serious and effective attack when combined with traffic analysis [28]. Since LCPDs operate in the unreliable wireless environment and may be involved in communicating important secret information, it becomes important to protect them from eavesdropping.…”
Section: Eavesdroppingmentioning
confidence: 99%
“…These limitations enforce the two major challenges in securing WSNsthreats and the attacks on WSNs, and difficulties in implementing efficient security measures to counter these threats and attacks. Dhakne and Chatur [3] have presented an exhaustive survey over attacks made on WSNs and divided them into five categoriesattacks on authentication, attacks on privacy, attacks based on perspectives, attacks on layers, and other attacks. The detailed classification of attacks on WSNs has been publicized in Figure 2.…”
Section: Wsn Security Challengesmentioning
confidence: 99%