Wireless Sensor Networks (WSN) consists of a collection of nodes which are deployed randomly in a hostile environment. It has a fixed infrastructure and self-organized in to an arbitrary topology. Though there are advancements in technology, security in WSN is a principal concern. As the deployed sensors are in an open environment, the intrusion of attacks is very much higher. Also the WSN has broadcast nature of communication; they are easily affected by the attacks. Commonly prevailing attacks are Denial of Service (DoS) attacks, spoofing attack, selective forwarding attack, sinkhole attack, sybil attack, wormhole attack, black hole attack, grayhole attack, HELLO flood attack, etc. However we observe that Denial of Service attack is a …show more content…
WSNs are frequently susceptible to various types of attacks. Jamming is one of the attacks, which overpowers the transmitted signal by injecting very high level of noise with the assistance of malicious node which significantly lowers the Packet Delivery Ratio (PDR), which will reduce the achievable rate of a transmitted signal. There are few different ways of identifying the malicious node and its various approaches towards jamming detection. Such as game theory approach, calculation of energy used, trust based schemes, auto regression technique, markov chain models and so on. Jamming attack consist of four types namely proactive jammer, deceptive jammer, constant jammer and random jammer. Proactive jammer are the most prevalent jamming form due to their easy implementation that attempts to emit jamming signals irrespective of the traffic pattern in the channel, but they are inefficient in terms of attacking damage, detection probability and energy efficiency due to the lack of channel awareness. The deceptive jammer continuously transmits regular packets of data, instead of emitting random bits of data. When compared to a constant jammer, it is more difficult to detect a deceptive jammer because it transmits legitimate packets instead of random bits. The constant jammer emits a continuous jamming signal at random interval. Random jammer which emits a constant jamming signal continuously and jamming signals at random times. It continuously
Data Modification Attack: An adversary modifies the value of one or more the data readings either by hijacking the sender sensor or inserting itself between the sender and receivers.
The most common type of DOS attack is ending traffic to a network address. This will cause the network to slow down. The attacker must already know a weakness of some sort on the network, or the attacker just goes
A WSN is a type of wireless networks that consists of collection sensor nodes which are tiny devices. Each sensor node of the network has different processing capability. It may contain multiple types of memory (program, data and flash memories), have a RF transceiver, have a power source (e.g., batteries and solar cells), and accommodate various sensors and actuators. The nodes communicate wirelessly and often self-organize after being deployed in an ad hoc fashion [13, 14]. Optimum need of each sensor node is to maximize its own utility function. Also the whole network requires resource assignments balance to perform in a useful and efficient way. This chapter presents a brief survey on WSNs showing its types, characterizing features, protocols and applications.
Denial-of-Service attack (DoS) when a hacker continuously attacks a particular network or dedicated Access Point (AP) with fake requests, failure messages and premature successful connection messages and other commands. These causes authorized users from preventing connecting to the network and results in network failure or crash. These attacks depends on misuse of protocols like Extensible Authentication Protocol (EAP).
Juby Joseph et al (2014), “Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol”, 2014 There is a lot of use of the wireless sensor networks in fields which have consumers and in industrial and defense areas also it has its involvements. The networks are vulnerable and prone to the attacks of outsiders. It is very commonly found that the attackers attack the security of the networks. The wireless sensor networks are also been attacked by various kinds of outsiders in different ways. The Denial of Service (DoS) attacks have another kind
1. Abstract: Wireless sensor networks is growing rapidly over the few decades. Due to its flexibility, wireless sensor networks has been in practice in many areas. Among various wireless networks, Mobile Ad hoc networks has been one of the unique network. Unlike other network architectures, MANETs have no central architecture; every node is free to work both as a transmitter and receiver. Every single node can communicate freely with every other node which is in their communication range. Otherwise, it depends on neighboring nodes to relay messages. Due to this nature, MANETs are used in many missionary applications like health care, military use and emergency recovery. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this paper we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. We compare the differences within the Enhanced Adaptive Acknowledgment before and after introducing the Hybrid cryptography approach
A Wireless Sensor Network is one kind of wireless network includes a large number of circulating, self-directed, minute, low powered devices named sensor nodes called motes. These networks certainly cover a huge number of spatially distributed, little, battery-operated, embedded devices that are networked to caringly collect, process, and transfer data to the operators, and it has controlled the capabilities of computing & processing. Nodes are the tiny computers, which work jointly to form the networks. The sensor node is a multi-functional, energy efficient wireless device. The applications of motes in industrial are widespread. A collection of sensor nodes collects the data from the surroundings to achieve specific
This work is based on to detect the malicious nodes from the network which are responsible to trigger grayhole attack in the network. The grayhole is the distributed denial of service attack in which
Abstract—Wireless Sensor Network (WSN) is basically a wireless network in which sensor nodes are distributed in any environment condition, to collect the data or information such as temperature, pressure, wind, sea level etc. and accordingly data or information will be passed to the main location. Reliable Trust and Reputation of a node stands for the measure of trust over a certain period of time which can be useful to evaluate the risk of attack from that particular node. We have combined all these parameters in order to risk of attack from a particular node.
The WAP can be a victim of multiple attacks. Eavesdropping is one of the most common attacks made against this type of device. Such attack can read and capture all types of packets transmitted through a network. Due to the location of the WAP our main threat would be disclosing of classified information to other sources.
The purpose of this paper was to research denial-of service attacks and remedies that can be used as defense mechanisms to counter these attacks. A denial-of-service (DoS) attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service (Malliga & Tamilarasi, 2009). The attack demonstrates using both known and potential attack mechanisms. Along with this classification important features of each attack category that in turn define the challenges involved in combating these threats will be discussed. The typical defense system is using only the currently known approaches. A denial-of-service attack deploys multiple machines to avert attacks. Then the service is denied by
Any areas on the business’s infrastructure or applications are risk areas. Typically, IPS devices are deployed behind firewalls and WAN routers, in front of server farms or similar collections of resources, and at other network access points. The IPS architecture in this paper shows protection at the point of internet access, desktops accessing application servers, database servers, as well as protection at the e-mail server and DNS server. These are the typical target areas where extra layer of protection is needed. With the different sensors in place, the network administrator can not only tune the IPS against attacks, but also balance network traffic and alert the network administrator when a threat or attack is happening, and then taking proper action.
Abstract— In wireless communication, spectrum resources are utilized by authorities in particular fields. Most of the elements in spectrum are idle. Cognitive radio is a promising technique for allocating the idle spectrum into unlicensed users. Security shortage is a major challenging issue in cognitive radio ad-hoc networks (CRAHNs) that makes performance degradation on spectrum sensing and sharing. A selfish user pre-occupies the accessible bandwidth for their prospect usage and prohibits the progress secondary users whose makes the requirement for spectrum utility. Game theoretic model is proposed to detect the selfish attacker in CRAHNs. Channel state information (CSI) is considered to inform each user’s channel handing information. The two strategy of Nash Equilibrium game model such as pure and mixed strategy for secondary users (SUs) and selfish secondary users (SSUs) are investigated and the selfish attacker is detected. Moreover a novel belief updating system is also proposed to the secondary users for knowing the CSI of the primary user. A simulation result shows that, game theoretic model is achieved to increase the detection rate of selfish attackers.
Abstract: the open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks typically; squeeze has been addressed under an external threat model. However, person with depth knowledge of internet protocol specifications and network secrets can launch low-effort squeeze attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective squeeze in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this work, we address the problem of selective squeeze attacks in wireless networks. We show that selective squeeze attacks can be launched by performing real-time packet classification at the physical layer. To reduce these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We
In this paper, we esteem a particular category of DoS attacks called Jamming. In actual fact, the mobile host in mobile ad hoc networks is a part of wireless medium. Thus, the radio signals can be jammed or interfered, which make the message to be amoral or missed. If the attacker has a strong transmitter, a signal can be launched that will be strong enough to conquer the directed signals and distort communications. There are several attack schemes that a jammer can do in order to interfere with other wireless communications.