Advances in Wireless and Mobile Communications.
ISSN 0973-6972 Volume 10, Number 3 (2017), pp. 493-503
© Research India Publications
http://www.ripublication.com
Attacks on Wireless Sensor Networks: Review
Dr. Nipin Gupta1, Dr. Sandeep Tayal2, Dr. Pankaj Gupta3,
Deepak Goyal4, Monika Goyal5
1,2 Associate Professor ECE, Vaish College of Engineering, Rohtak, Haryana, India.
3Professor, CSE, Vaish College of Engineering Rohtak, 4Associate Professor, CSE,
Vaish College of Engineering Rohtak, 5 Assistant Professor, Vaish Mahila
Mahavithyla, Rohtak, Haryana, India.
Abstract
Remote Sensor Networks are a Collection of Sensor nodes. Wireless sensor
arrange turn out to be such a great amount of prevalent in many fields because
of its usefulness i.e military, modern territory etc. Security is the essential and
basic issue in the Wireless systems because of the working way of WSNs.
This Paper depict the security necessities as WSNs are effectively inclined a
greater number of assaults than wired systems. This paper concentrates the
security assaults in WSNs that are Popular now days i.e. wormhole assault and
their countermeasures in the system Layer.
Keywords: Wireless Sensor Network, Security, Wormhole Attack, Black
Hole Attack
INTRODUCTION
Remote sensor networks(WSN)[1,3]are rising as the most encouraging exploration
region for scientists more than 15 past years. Wireless Sensor Networks have
comprised a large number of Sensor hubs.
These sensor hubs which go about as self-rulingly are appropriated over the district to
break down the threatening condition conditions. Sensor hubs are inclined to failure,
which make topology dynamic. Dynamic system topology can be brought about
additionally by the versatility of hubs and option of couple of new hubs.
494 Dr. Nipin Gupta et al
With the expansion in the advancement there are numerous applications where Motes
are conveyed to associate with condition and to agreeably go their information
through system to the Destination [1,2,5]. Remote sensor hubs have unreliable remote
correspondence are effectively powerless by dangers
These Sensor nodes consist of limited battery power, less memory, microprocessor,
sensor interface etc.
These dangers can be inner or outer. Dependable and secure correspondence as a
fundamental part of any remote systems administration condition, this is truly a huge
test in remote systems. The mission basic nature of sensor hubs forced many assaults,
for example,
1) Attacks on validation.
2) Attacks on information accessibility.
3) Attacks on information trustworthiness.
The organization of sensor hubs may have keen enemies meaning to seize or harm
message traded in the system. Because of this corrupt execution of system and change
the general topology of system. Thus, Security is the fundamental Aspect in
Figure 1: A typical Wireless Sensor Network
Attacks on Wireless Sensor Networks: Review 495
Figure 2. WSN Sensor Node Components
Wireless sensor systems. This paper is composed as: segment II speaks to the security
prerequisites in remote systems. Area III speaks to the requirements in remote
systems. Area IV speaks to the assaults in Wireless systems and their
countermeasures. Area V speaks to Proposer Work. Segment VI speaks to finish of
this paper.
II. SECURITY REQUIREMENTS
In remote sensor systems, physical security of sensor hubs is not allowed as they are
typically sent in threatening situations. Thusly, aggressors can without much of a
stretch trade off sensor hubs and utilize them to debase the system's execution.
Remote sensor systems show numerous one of a kind attributes and forcing different
security administrations. These security administrations shielded data and assets from
the assailants.
Security requirements Description
Data confidentiality
Data that are passed over the network should be confidential.
Public sensor information like sensor identities and public
keys should be encrypted by using cryptographic method.
Sensor readings should not be leaked to its neighbours.
Data availability
It ensures that resources and data should be easily available to
the sensor nodes. Different approaches have been proposed to
achieve this goal.
Data integrity
The data may be altered by attackers as it is traverse among
sensor nodes. So, integrity control should be implemented to
ensure that traversed data should not be altered until it
reaches to its original recipients.
Authenticity
Authentication is required for many administrative tasks.
Various authentication mechanisms such as cryptography ,
shared keys digital signature and so on must ensure that data
used in decision making process comes from legitimate and
authorized nodes.
496 Dr. Nipin Gupta et al
Self-Organization
Nodes in wireless network should be feasible in order to be
self-healing and self-organizing in any difficult situations. If
self-organization is lacking in a sensor network, the damage
resulting from an attack or even the hazardous
III. CONSTRAINTS IN WIRELESS SENSOR NETWORKS
Remote sensor arrange considered as an extraordinary sort of adhoc systems made out
of extensive no. of sensor nodes. These hubs have a few assets imperatives, for
example, memory constraints, limited vitality, unattended operations, and high
inactivity of correspondence. Because of these imperatives, the foe causes genuine
dangers to corrupt the execution of system and additionally hard to actualize the
traditional security components in WSNs [1, 2]. Keeping in mind the end goal to
upgrade the customary security components, it is important to know about the
imperatives of sensor hubs. These imperatives are clarified as:
A. Memory confinement
Sensor hubs which are reduced in size, have constrained memory space. Memory is of
two courses for sensor hubs: RAM and blaze memory. Smash is utilized to store the
computational outcome, application program [3]. Streak memory for the most part
incorporates downloading application code. It is hard to utilize high stacked security
systems in this restricted memory space.
B. Limited Energy
As vitality assume a critical part in life expectancy of sensor hub. In WSNs, sensor
hubs utilize constrained power and they are effectively demolished.
C. High Latency of Communication
Because of system clog, the issue of more prominent inertness in correspondence
happened in WSNs [3]. This high dormancy accomplish basic issue of
synchronization in security systems that depend on basic reports and key
appropriation.
D. Unattended Operations
Some sensor hubs are unattended for a drawn out stretch of time as they are spatial
dispersed on remote locale. A portion of the significant provisos to unattended Motes
are [3]:
a. Because of the organization of senor hubs in foe condition.
b. Remote administration make difficult to distinguish physical altering and battery
substitution and hubs might not have amicable cooperate with other once sent.
Attacks on Wireless Sensor Networks: Review 497
IV. ATTACKS AND THEIR COUNTER MEASURES IN WIRELESS SENSOR
NETWORKS
The above limitations may tend to increment genuine assaults on various layers in
WSNs. A portion of the layered based assaults are clarified as:
A. Physical Layer Attacks[2,3,4,6]
Physical layer is in charge of bit transmission and flag observing, recurrence choice
and soon. Physical layer assaults are sorted as dynamic assaults and inactive assaults.
Foes can do many assaults on it as all upper layer working depend on it. A portion of
the real assaults are: Jamming: it is the most well known assault that behaviors on
physical layer by assailants. It basically gives disturbance in the accessibility of
transmission media. To barrier this assault, utilize channel seeking and spread range
methods after radio correspondence.
Gadget hardening: Attackers can without much of a stretch harm or adjust sensor
physically and stop all administrations that are in advance. To protection this assault,
temper sealing approach has been presented.
B. Macintosh Layer Attacks[2]
Macintosh conventions have extraordinary hugeness that it helps in keeping up the
correspondence assets successfully. Foes can produce MAC layer recognizable proof
and disguises different elements for the different purposes. Two assaults are as per the
following:
Activity control: In the principal assault, assailant can make crashes and shamefulness
by resisting the organize rules which can additionally lead movement twisting.
Character mocking: The second assault is mindful to ridiculing the MAC layer
personalities. To safeguard these assaults, Cryptography based components and other
validation systems have been executed. Notwithstanding confirmation, others safety
efforts likewise exist, for example, code authentication, grouping checking and
position check. These countermeasures are capable to recognize the noxious hubs by
approving the code.
C. Arrange Layer Attacks[2,3,5,6]
The duty of system layer is to find goal and to discover the safe way to exchange
control parcels among hubs. Different directing conventions exist that are very basic
and simple to actualize. Because of this, aggressors can without much of a stretch
come up short the correspondence in WSNs by changing the directing data. Arrange
layer assaults are the most mainstream assaults in WSNs. Organize layer assaults can
be classified as:
C.I. Particular Forwarding Packet [2, 3, 7, 4] As its name recommend, the
aggressors tries to specifically forward bundles towards a specific hub with a specific
end goal to expel the bundles' significance. The aggressors specifically send the data
of the sensor hubs and furthermore dispose of the data from sensor hubs.
498 Dr. Nipin Gupta et al
To guard this, multi way steering can be utilized with irregular determination of way
and meshed ways which don't have two sequential connections. Different
methodologies, for example, watching hubs conduct, listening channel and utilize
affirmation components have been presented.
C.II. False Routing Path [2] False directing assaults implemented in three sorts of
assaults which can be utilized to put the enemy in course and upset the system
functionalities as:
i. Flooding directing tables: assailants can infuse the void steering data in the
systems that will in the long run involve the greater part of directing table space on
ordinary hubs. This can lead the flood issue I the steering table. For instance. In fig3.
a) speaks to the topology and steering table before this assault. On the off chance that
A was a typical hub, then S can speak with D hub. Furthermore, if A was assailant
then it sends the wrong steering data about nonexistent hubs and there is no way
amongst S and D hubs. b) speaks to the wrong topology and directing table after this
assault.
ii. Directing table harming: noxious hubs alter the steering redesigns before sending
and accepting the messages inside the system and make "harm". This assault will
coordinate activity in the wrong way and may bring about blockage and furthermore
tends to increment additionally assaults in the system.
Fig.3 (a) Topology and routing table before attack
iii. Store harming: the enemy can harm the reserve by utilizing comparative
procedures as in steering table harming.
Attacks on Wireless Sensor Networks: Review 499
Destination Path Destination Path
5 13→5 7 13→5→6→7
2 13→5→2 8 13→8
3 13→5→2→3 9 13→9
4 13→5→2→3→4 11 13→9→11
1 13→5→2→1 12 13→9→11→12
6 13→5→6 10 13→9→11→10
Fig.3 (b) Topology and routing table after attack
Destination Path Destination Path
14 13→5→2→1→4 11 13→9→11
15 13→5→2→1→15 10 13→9→11→10
16 13→5→2→16 20 13→9→20
17 13→5→2→3→17 21 13→9→11→10→21
18 13→5→2→3→4→18 22 13→9→11→10→22
19 13→9→19 25 13→9→11→25
500 Dr. Nipin Gupta et al
C.III. Wormhole Attack [2, 3, 1,] Wormhole assault is most confused assault in
WSNs which is barely to distinguish. Wormhole assault has at least two foes (built up
passage and high data transfer capacity, control assets). A.A. Pirazada and McDonald
inferred that the wormhole assault postures three ways [7]:
i. Burrowing the messages over the system layer.
ii. Long range burrow utilizing high power transmitters.
iii. Production of passage by means of wired foundation.
In wormhole assault, foe may make a high caliber between and move the entire
activity on it. The foe got messages from one area of system and passages these
messages over a low inactivity connect and replays them to the next segment of
system rather to unique goal as appeared in fig.4.
Fig.4. A Scenario of Wormhole Attack
Wormhole attack can be used to exploit the routing race conditions and more
effective even if any authentication and encryption mechanism used. Wormhole
attack is the combination of various attacks such as black hole attack, sinkhole attack
and eavesdropping.
D.I. Black hole Attack [2, 3, 6, 8] As black hole absorbs all things in it, this attack
also swallows all messages in it before receiving. It is the simplest attacks in WSNs.
By refusing to forward any message he receives, the attacker will affect all the traffic
flowing through it and may result to break the communication channel to the base
station and rest of WSNs and degrade the performance of whole network [3]. If
compromised node does not introduce itself as a sink, closer to the sink, makes more
interruptions in the network by absorbing the more traffic as shown in fig.5.
To defence this, may approaches are introduced such as geographic forwarding and
resistive routing protocol (use of systematic rerouting, this attack can be overcome
and detected).
Attacks on Wireless Sensor Networks: Review 501
D.II. Sinkhole Attack [2, 3, 6, 8] As the name suggests, the adversary create a sink
nearby the nodes. Sinkhole attacks make compromised nodes by spoofing all the
information of routing protocols and empowered by sinkhole attack. Geo-routing
protocols are resistant to sinkhole, because of naturally routed traffic through the
physical location of sinkhole, which makes difficult to lure it and elsewhere to create
it This attack can be launched without usin the encryption mechanism or
compromising any legitimate node in the network.There is a lot of work that has been
implemented in order to curb the wormhole attack and poses two methods such as
wormhole detection method(introduce various routing mechanisms to detect the
wormhole attack by using any simulation process) and wormhole prevention( to
remove wormhole completely from the network by developing various
methodologies)
Fig.5. Black Hole Attack
V. PROPOSED WORK
Our aim is to build a robust and secure mechanism for preventing the devasting
effects caused by the wormhole attack. The main objectives of this approach are as
follows: To prevent Eavesdropping, avoid packet modification, provide authentication
and confidentiality, reduce the packet overhead. This work can be performed as Route
discovery, detection of malicious nodes, secure data transmission, route maintenance.
We are using AODV protocol for all this work.
VI. CONCLUSIONS
Wireless sensor networks have gained much popularity over past few years. Security
is the biggest threat in WSNs. In this paper we describe Attacks which degrade
performance of wireless sensor network. Wormhole attacks (Most dangerous attack in
WSN) can significantly degrade the network performance and threaten network
security. Various countermeasures have been done for the detection of wormhole
502 Dr. Nipin Gupta et al
attack by using AODV Simulation to increase the robuteness and effectiveness of the
WSNs. as above explained. Hopefully by reading this paper, the readers can have a
better view on security requirements with attacks and their countermeasures at
network layer in WSNs.
REFERENCES
[1] Rohit tiwari, monika kohli, “security aspects for wireless sensor network”
international journal of engineering research & technology (ijert) vol. 1 issue
8, october – 2012
[2] Kai xing †, shyaam sundhar rajamadam srinivasan †, manny rivera †, jiang li
ffi, xiuzhen cheng †, “attacks and countermeasures in sensor networks: a
survey”, network security scott huang, david maccallum, and ding zhu du
(eds.) Pp. – - –c2005 springer
[3] Jalil jabari lotf, seyed hossein hosseininazhad ghazani, “security and common
attacks against network layer in wireless sensor networks”, j. Basic. Appl. Sci.
Res., 2(2)1926-1932, 2012 © 2012, textroad publication, issn 2090-4304,
journal of basic and applied scientific research.
[4] Al-sakib khan pathan, hyung-woo lee, choong seon hong, “security in wireless
sensor networks: issues and challenges”, international conference on
advanced computing technologies, page1043-1045, year 2006
[5] Adrian perrig, john stankovic, david wagner, “security in wireless sensor
networks” communications of the acm, page53-57, year 2004
[6] Zinaida benenson a, 1, peter m. Cholewinski b, felix c. Freiling a,
“vulnerabilities and attacks in wireless sensor networks”.
[7] Wireless sensor network security, “a survey john paul walters, zhengqiang
liang, weisong shi, and vipin chaudhary”, security in distributed, grid, and
pervasive computing yang xiao, (eds.) Pp. – - –°c 2006 auerbach publications,
crc press
[8] Chris karlof *, david wagner, “secure routing in wireless sensor networks:
attacks and countermeasures”, ad hoc networks 1 (2003) 293–315
[9] Priya maidamwar and nekita chavhan, “a survey on security issues to detect
wormhole attack in wireless sensor network”, international journal on adhoc
networking systems (ijans) vol. 2, no. 4, october 2012
[10] Xiaopei lu, dezun dong, and xiangke liao, “mds-based wormhole detection
using local topology in wireless sensor networks”, hindawi publishing
corporation international journal of distributed sensor networks volume 2012,
article id 145702, 9 pages doi:10.1155/2012/145702
Attacks on Wireless Sensor Networks: Review 503
[11] Majid meghdadi, suat ozdemir and inan giiler (2011),"a survey of wormhole-
based attacks and their countermeasures in wireless sensor network", iete
technical review, vol.28, issue.2, pp89-102
[12] Marianne azer, magdy, el-soudani, sherif el-kassas (2009)," a full image of the
wormhole attacks towards introducing complex wormhole attacks in wireless
adhoc networks”, international journal of computer science and information
security, vol.1, no.1, pp 41-52
[13] Fan-rui kong†1, chun-wen li1, 3, qing-qing ding2, guang-zhao cui3, bing-yi
cui4, “wapn: a distributed wormhole attack detection approach for wireless
sensor networks”, journal of zhejiang university science a issn 1673-565x
(print); issn 1862-1775 (online) .
[14] S.sharmila and g.uamaheshwari, “transmission time based detection of
wormhole attack in wireless sensor networks”, special issue of international
journal of computer applications (0975-8887) on iprc, august 2012.
504 Dr. Nipin Gupta et al