Wireless Sensor Networks: A Survey Analysis of Safety and Proficient Attacker’s Issues

International Journal of P2P Network Trends and Technology (IJPTT)          
© 2014 by IJPTT Journal
Volume - 4 Issue - 6
Year of Publication : 2014
Authors : M.Mahadevan , Dr. G. Tholkappia Arasu


M.Mahadevan , Dr. G. Tholkappia Arasu. "Wireless Sensor Networks: A Survey Analysis of Safety and Proficient Attacker’s Issues". International Journal of P2P Network Trends and Technology (IJPTT), V4 (6):12-19 Nov - Dec 2014, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.


The wireless sensor network is a booming network widely used by all the sectors for the communication purpose in an efficient way. In that the issues of the network such as security, efficiency in cost, energy and reliability in the communication are the major research areas. The survey of the paper is mainly concentrate on the security issues. Because focusing the security issues it will automatically step down the misbehavior nodes which leads to reliable communication and it increase the efficiency of the networks. The attacks in WSNs are increased as day by day in this contemplate concentrate on injecting false data, Node Compromise, False Node, Sinkhole Attacks, Hello Flood Attacks and so on. And also in this survey it discussed the techniques and schemes to overcome these attacks.


[1] H.Chan and A. Perrig, “Security and Privacy in Sensor Networks,” IEEE Computer, October 2013.
[2] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127, May 2013.
[3] V. Bhuse, A. Gupta, and L. Lilien, “Dpdsn: Detection of packet-dropping attacks for wireless sensor networks,” In the Trusted Internet Workshop, International Conference on High Performance Computing, December 2012.
[4] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” ACM MobiCom, August 2013.
[5] R. Roman, J. Zhou, and J. Lopez, “Applying intrusion detection systems to wireless sensor networks,” Third IEEE Annual Consumer Communications and Networking Conference (CCNC), pp. 640–644, Jan. 2012.
[6] S. Lee and Y. Choi, “A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks,” Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (SASN), pp. 59–70, 2013.
[7] F. Ye, H. Luo, S. Lu, and L. Zhang, “Statistical En-route Filtering of Injected False Data in Sensor Networks,” IEEE INFOCOM, March 2014.
[8] S. Zhu, S. Setia, S. Jajodia, and P. Ning, “An Interleaved Hop-by-Hop Authentication Scheme for Filtering False Data in Sensor Networks,” IEEE Symposium on Security and Privacy, 2014.
[9] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), May 2013.
[10] Z. Yu and Y. Guan, “A Dynamic En-route Scheme for Filtering False Data in Wireless Sensor Networks,” IEEE Infocom 2006, April 2013.
[11] F. Ye, H. Yang, and Z. Liu, “Catching Moles in Sensor Networks,” IEEE International Conference on Distributed Computing Systems (ICDCS), June 2014.
[12] Q. Li and D. Rus, “Global clock synchronization in sensor networks,” IEEE INFOCOM, 2013.
[13] Sunil Ghildiyal, Ashish Gupta, “ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS AND CHALLENGES”, IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308, 2014.
[14] R.M.Sinthiya, J.Vijipriya,“An Optimized Localization Algorithm against Node Replication Attacks in Wireless Sensor Networks”, International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 Page No.3817-3821, February 2014.
[15] Gursewak Singh, Rajni Bedi, “A Survey of Various Attacks and Their Security Mechanisms in Wireless Sensor Network”, International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-2, Issue-8, June 2014.

Wireless Sensor Network, security issues, misbehaving nodes, injecting false data, identifying the attacks.