2018
DOI: 10.33166/aetic.2018.04.003
|View full text |Cite
|
Sign up to set email alerts
|

Sensor Networks Attacks Classifications and Mitigation

Abstract: Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without physical guarding duty. That makes the network susceptible to physical attacks. The communication nature between sensor nodes is another reason, where intruders can easily send/receive information if they are located in the network communication range. In this paper, most of the possible WSN at… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(16 citation statements)
references
References 40 publications
0
16
0
Order By: Relevance
“…However, it is possible for these intermediate nodes to become inside attackers (or traitors) due to various reasons (e.g., hacking by adversaries) [7,9]. Moreover, what makes this problem more serious is that sensors may not have the same advanced heavy security mechanisms used in other networks due to their unique limitations, as mentioned above.…”
Section: Insider Attacks In Wsnsmentioning
confidence: 99%
See 3 more Smart Citations
“…However, it is possible for these intermediate nodes to become inside attackers (or traitors) due to various reasons (e.g., hacking by adversaries) [7,9]. Moreover, what makes this problem more serious is that sensors may not have the same advanced heavy security mechanisms used in other networks due to their unique limitations, as mentioned above.…”
Section: Insider Attacks In Wsnsmentioning
confidence: 99%
“…For this reason, various inside attack problems in WSNs, such as attack models and defense mechanisms have been actively discussed and studied [17,19,20,22], and also trust mechanisms have been researched as promising defense mechanisms against inside attackers in WSNs [12,18,23]. However, it is possible for these intermediate nodes to become inside attackers (or traitors) due to various reasons (e.g., hacking by adversaries) [7,9]. Moreover, what makes this problem more serious is that sensors may not have the same advanced heavy security mechanisms used in other networks due to their unique limitations, as mentioned above.…”
Section: Insider Attacks In Wsnsmentioning
confidence: 99%
See 2 more Smart Citations
“…Since IoT is built on the foundation laid by wireless sensor network (WSN) (Daia, Ramadan, & Fayek, 2018), characteristically each node of an IoT ecosystem is considered to be prone to attacks such as Distributed Denial-of-Service (DDoS) (Chaudhry, Saleem, Haskell-Dowland, & Miraz, 2018;Onik, Al-Zaben, Hoo, & Kim, 2018) and if compromised may serve as a point of failure. IoT networks are mostly leveraged on cloud environment.…”
Section: Application Of Blockchain In Iotmentioning
confidence: 99%