IDL - International Digital Library for Technology Research Volume I, Issue III, MARCH-2017
Available at: www.dbpublications.org
Detection and Prevention of Attacks in Wireless Sensor Networks: A Survey Ms. K. DEEPA SHREE 1, Mrs. RANJANA S. CHAKRASALI 2 Dept. of Computer Science 1 M-Tech, Student – B.N.M Institute of Technology, Bangalore, India 2 Guide, Assistant Professor – B.N.M Institute of Technology, Bangalore, India
SURVEY PAPER ABSTRACT- Wireless sensor networks will use a communication channel which is insecure and have a poor infrastructure. Wireless sensor networks consists of spatially distributed autonomous devices and using sensors they monitor the physical as well as the environmental conditions, such as pressure, temperature, sound at different locations. As the nodes in the sensor network are deployed in the hostile locations they are vulnerable to the attacks such as Hello flood attack, Jamming, Wormhole, Sybil, Sinkhole attack. These types of potential threats to network are continuously evolving and requires measures to detect and prevent. In this paper, we discuss about Sybil and Wormhole attacks with schemes to detect and prevent these attacks. Keywords: Wireless Sensor Network, security, attacks, Sybil and wormhole attacks, cross layer approach. 1. INTRODUCTION: As the technology is getting advanced there is increase in the use of Wireless Sensor Network. The sensor nodes will be deployed in an open and unprotected region. So, the sensor networks will be vulnerable to the attacks such as Wormhole, Sybil and Sinkhole attack. Usually in many-to- one communication the opponent node will attract the surrounding neighbor nodes with fake identities and false routing information. The existing system will be focusing on single layer attacks, they will target only on one specific layer and will detect the attack, without considering other layers. The most
vulnerable attacks in the network layer are Sinkhole attack, Wormhole attack and Sybil attack, Hello Flood attack. In sinkhole attack, the attacker will introduce itself that it is the shortest path to the destination. So, that all the nodes will forward the packet towards the attacker node. While, forwarding the attacker node will drop the packet. In Sybil attack, the WSN is subverted by the malicious node which will forge large number of fake identities and fake information. In Wormhole attack, the attacker node will record the packet at one location in the network, and then tunnels the packets to another location in the network and will perform modification in the network from that point. The attacks will be detected and prevented using cross layer features and Mobile agent. It is usually done in two phases. In first phase, the attacks are detected by correlating the cross layer features such as MAC and Network layer. During second phase, if the attacks are detected, mobile agents are used to prevent the attack. Mobile agents are used for forwarding the data, to solve the security problem by using three step negotiation. Through this approach, the energy efficiency is improved, false positive rate is reduced. 2 SURVEYS 2.1 Wormhole attack Detection for Dynamic Wireless Sensor Networks “Due to the emergence of WSN in all the fields, security is an issue. They can connect to any network as they are having wireless and distributed nature. The tiny sensor nodes are deployed densely. Wormhole attack is an security issue in this approach. Without knowing the protocol which is used in the network it can damage the network. Detecting them is an big
1|P a g e