SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 10-15
www.iosrjournals.org
DOI: 10.9790/2834-10631015 www.iosrjournals.org 10 | Page
A Review of Network Layer Attacks and Countermeasures in
WSN
S.Nithya1
, K.VijayaLakshmi2
, V.PadmaPriya3
123
Department of Electrical and Electronics Engineering SRM University, Ramapuram – Chennai, India
Abstract: Wireless Sensor Network is a wireless network of thousands of inexpensive miniature devices
capable of computation, communication and sensing. It provides a bridge between real physical and virtual
worlds. In spite of its wide range of potential application to industry, science, transportation and security; it
poses security threats at different layers. In this paper different types of attacks in network layer are examined
and existing solutions were discussed. Some open research issues are also presented.
Keywords: Network Layer; Security; Wireless Sensor Network.
I. Introduction
Wireless Sensor Network are spatially distributed autonomous sensor to monitor physical or
environmental conditions[1] such as temperature, sound, pressure etc. and to cooperatively pass their data
through the network to a main location.
Fig.1.Wireless Sensor Network Architecture
The WSN is built of “nodes” – from a few to several hundreds or even thousands, where each node is
connected to one (or sometimes several) sensors.
Each such sensor nodes has several parts: a radio transceiver with internal antenna or connection to external
antenna, a microcontroller, an electronic circuit for interfacing with sensors and energy source usually a battery.
The Network Layer has lot of challenges depending on applications, but the major challenges
are in power saving, limited memory and buffers. Sensors does not have global ID and have to be self
organized. Many security threats in Network Layer have been presented in the literature. In this paper we
discuss six important attacks in Network Layer.
The organization of this article is as follows. Section II presents the various security aspect of WSN,
section III explains WSN protocol stack, section IV examines different attacks in Network Layer and the
existing solutions, section V put forward open challenges in research and final section VI provides conclusion of
this paper.
II. Security Aspect Of Wsn
To make a wireless network secure, the network should support all secure parameters like
confidentiality, authenticity, availability and integrity.
Confidentiality: - In sensor Network, confidentiality relates to the following [2], [3]
 A sensor network should not leak sensor readings to its neighbors. The data stored in sensor node must
be highly sensitive.
A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 11 | Page
 Since the nodes communicate highly sensitive data, secure channel is important in a WSN system.
 The network must encrypt data to protect against traffic analysis attacks.
Integrity: - It ensures that message sent from one node to another is not modified by malicious intermediate
nodes. In WSN intrusion detection system can provide integrity mechanism.
Availability: - Attacks damage the availability for WSN for the following reasons
 Additional computation consumes additional energy. If no more energy exists, data will no larger be
available.
 A single point failure greatly threatens availability of network if central point scheme is used.
Authenticity: - It ensures that the other end of connection or originator of a packet is the node that is claimed.
Access control prevents unauthorized access to a resource.
III. Protocol Stack
A simplified protocol stack for WSN is summarized in figure 2
Fig. 2. Protocol Stack
 Application Layer:
It defines a standard set of services and interface primitives available independently for the
programmer on their implementation on every kind of platform.
 Transport Layer :
It helps to maintain the flow of data, if sensor network application requires it.
 Network Layer :
It takes care of routing the data, directing the process of selecting paths along which to send the data in
the network.
 Data Link Layer:
It provides multiplexing of data streams, data frame detection and MAC.
 Physical Layer:
It is responsible for frequency and power selection, modulation and data encryption.
IV. Attacks In Network Layer
The Network Layer vulnerabilities generally fall into one of the two categories: routing attack and
packet forwarding attack based on target operation of attacks. The following describes the Network Layer
attacks in WSN.
A. Wormhole Attack
In this attack, a pair of colluding attackers record packet at one location and replay them at another
location using private high speed network. The seriousness of this attack is that it can be launched against all
communications that provide authenticity and confidentiality. Figure (3) shows an example of wormhole attack.
A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 12 | Page
Fig. 3. Wormhole Attack
In [4] packet leashes are proposed to detect and defend against wormhole attack. In [5] the author offers
protection against wormhole in OLSR protocol. This approach is based on the location information and requires
deployment of public key infrastructure and time stamp synchronization between all the nodes. In [6] the author
proposes statistical analysis of multipath which is an approach to detect wormhole attack by using multipath
routing..This approach determines the attack by calculating relative frequency of each link in all the routes. The
link with highest frequency is identified as wormhole link. The advantage is, it employs limited overhead in
multipath routing. But it doesn’t work in non –multipath routing protocol like AODV protocol. In [7] the author
adopts directional antennas and find infeasible communicating links by utilizing directionality of antenna
communication. In [8] author presents a graph based framework to tackle wormholes. This approach assumes
existence of guard nodes with extra ordinary communication range. In [9] the author graphically visualizes
presence of wormholes. They reconstruct layout of network by centralized multidimensional scaling (MDS) to
capture wrap introduced by the wormholes. In [10] the author analyzes impact of combination of wormholes by
topology methodology. They locate various wormholes by detecting non separating loops, without any special
hardware devices or any assumption on the network properties. In [11] the author explains wormhole attack
modes and classes and described attack from attacker’s perspective.
B. Flooding Attack
In flooding attack, attacker exhausts network resources such as bandwidth and consume node’s
resources such as computational and battery power to disrupt routing operation to cause severe degradation in
network performance.
Fig. 4. Flooding Attack
In [12] the author proposes simple mechanism to prevent flooding in AODV protocol. In this approach,
each node monitors and calculates rate or neighbor’s RREQ. If RREQ rate of any neighbor exceeds predefined
threshold, node record ID of this neighbor in the black list and drop any future RREQs from the node. The
limitation is, it cannot prevent attack if flooding rate is below threshold. In [13] the author proposed technique
based on the statistical analysis to detect malicious RREQ floods. This approach determines threshold based on
statistical analysis of RREQs, which can be applied for varying flooding rates.
A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 13 | Page
C. Selective Forwarding / Black Hole
In this attack malicious node behave like normal node and forward packets but selectively drop some
packets. When the malicious node acts like a black hole, it drops all the packet passing through it [14]. Selective
Forwarding attack is called as special case of Black Hole attack.
Fig. 5. Black hole Attack
The countermeasures for selective forwarding attack can be classified as follows [15].
 Acknowledgement based detection.
 Detection using neighborhood information.
 Using multidata flow to mitigate attack.
In [16] author describes lightweight detection scheme which uses only two – hop neighborhood
information. Each node sends a HELLO packet which contains three important fields source node ID,
intermediate node ID and hop counter value. In [17] the author discusses some of the mitigation schemes to
defend this attack and also discussed drawback of each scheme. In [18] author analyses four scenarios based on
implicit acknowledgement in energy harvesting WSN and proposed hop-by-hop co-operative detection (HCD)
to effectively detect the forwarding misbehaviors of malicious node and to mitigate it.
D. Sink Hole
In this, a compromised node is made to look exclusively attractive to its neighbor nodes regarding the
routing algorithm and pull almost all the traffic from specific area [19]. The attacker listens route requests of
nodes and tries to persuade that it has shortest path for base station [20].
Fig. 6. Sink Hole Attack
In this the author proposed detection scheme based on link quality indicator in sensor network. This
method can detect sink hole attack that uses LQI base routing and several detecting nodes. Detecting mechanism
is also described in Adhoc networks like AODV [22] and DSR protocol [23]. In [24] author detects malicious
node using hop counting. The advantage of this technique is malicious node can be detected without any
negotiation with the base station.
E. Sybil Attack
In this attack, single node presents multiple identities to all the other nodes in WSN. This may mislead
other nodes and hence route believed to be disjoint with respect to the node can have the same adversary node.
A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 14 | Page
Fig. 6. Sybil Attack
In [25] the author analyses different defenses for Sybil attacks like position verification, registration,
key predistribution and code attestation and radio resource testing. In this random key predistribution is most
promising methods as it relies on cryptographic principles and robust to compromised nodes. In [26] the author
presents a novel decentralized protocol for limiting the corruptive influences of Sybil attacks by bounding both
number and size of Sybil groups.
F. Replay Attack
It is a form of network attack, in which a valid data transmission is maliciously or fraudently repeated
or delayed. It is carried out either by the originator or by an adversary who intercepts the data and retransmits it.
Fig. 7. Replay Attack
There are several countermeasures like session tokens, one Time Password (OTP), Time stamping etc.
In [27] the author designs a light weight detection and prevention system cops that intelligently uses
combination of digital signatures and Bloom filters to cope with attack.
V. Open Research Issues
Sensor networks are still at an early stage in terms of technique as it is still not widely deployed in
world and these provide doors for many research issues. [28], [29], [30]
 Energy efficiency is an important criterion. It is necessary to find the energy efficient routes to improve
the life time of network.
 Data collected by various sensors in WSN are typically based on common phenomena. Hence there is a
high probability, that this data has some redundancy.
 Multipath design technique must be incorporated. So that a path among them can be used, when the
primary path fails.
 Sensor network collect information from physical environment and are highly data centric. To
maximize energy saving a flexible platform for performing routing and data management must be
provided.
 Messages exchanged in WSN are vulnerable to security attacks. During transmission, messages can be
tampered or eavesdrop. Research is needed to ensure the confidentiality of messages.
A Review of Network Layer Attacks and Countermeasures in WSN
DOI: 10.9790/2834-10631015 www.iosrjournals.org 15 | Page
VI. Conclusion
WSN are having extraordinary growth nowadays because of its application in various fields. The
application using WSN, expects guarantee in security in all aspects. In this paper various attacks in Network
layer were discussed and different existing countermeasures to overcome these attacks were reviewed. But the
recently offered security mechanism are relayed on particular network structure, hence it is less efficient to
provide complete solution for security in WSN. This paper has suggested some open research challenges in this
regard.
References
[1]. “Environmental and Temperature Monitoring”, Centrak.
[2]. F.Akyildilz, W. Su. Y. Sankrasubramaniyam and E. Cayirci, “A Survey on Sensor Networks”, IEEE Communication Magazine,
40(8): 102 – 114, August 2002.
[3]. Erdal Cayirci and Chenming Rong, “Security in Wireless Adhoc and Sensor Networks”, A John Wiley and Sons Ltd, Publication,
2009.
[4]. Y.Hu, A.Perig and D. Johnson, “Wormhole Attack in Wireless Networks”, IEEE JSAC, Vol 24,no. 2, Feb. 2006.
[5]. D.Raffo et al, “Securing OLSR Using Node Locations”, proc. 2005. Euro, Wireless, Nicosia, Cyprus, Apr. 10-13, 2005.
[6]. L. Qian, N. Song and X. Li, “Detecting and Locating Wormhole Attack in Wireless Adhoc Network Through Statistical Analysis
of Muitipath”,IEEE, Wireless Communication and Networking Conference.’05.
[7]. L.Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks”, presented at NOSS, 2004
[8]. R. Poovendhan and L. Lazos, “A Graph Theoritic Framework for Preventing Wormhole Attack in Wireless Adhoc Networks”,
Wireless Networks.Vol 13, pp. 27-59, 2007.
[9]. W.Wang and B. Bhargava,”Visualization of Wormholes in sensor Networks”,in proc. ACM wise, 2004, pp. 51-60.
[10]. Dezun Dong, Mo Li, Yanhao Li and Xiang – Yang, “Topological Detection on Wormholes in Wireless AdHoc and Sensor
Networks”, IEEE transactions on Networking, Vol 19, No 6, pp. 1787-1795. Dec. 2011
[11]. Azer,Sherif,Magdy, “A Full Image of Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Adhoc
Networks”, IJCSIS, Vol 1, No 1, pp. 41-51, May 2009.
[12]. P. Yi et al, “A New Routing Attack in Mobile Ad Hoc Networks”, int. J. Infotech, Vol. 11, no 2, 2005.
[13]. S.Desilva and R.V.Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks”, proc. IEEE Wireless
Communication and Networking Conference, New Orleans, LA, 2005.
[14]. Chris Karlof and David Wagnet, “Secure Routing in WSN: Attacks and Countermeasures Ad Hoc Networks 293-315, 2003.
[15]. L. K. Bysani and A. K. Tureek,”A Survey on Selective Forwarding Attack in WSN”, in Devices and Communications, 2011,
International Conference on IEEE, 2011,pp. 1-5.
[16]. Trian Hoang Hai and Eui Nam Huh, “Detecting Selective Forwarding Attacks in WSN Using TwoHop Neighbor Knowledge”, In
NCA pages 325 –331, 2008.
[17]. Jaspreet Singh,Anuj Gupta, “Different Approaches to Mitigate Selective Forwarding Attacks in WSN”, IJIET, Vol 3, pp. 40-46,
2014.
[18]. Sunho Lim and Lauren Huie,”Hop-by-Hop Co-operative Detection of Selective ForwardingAttacks in Energy Harvesting WSN”’
ICNC,Workshop on CNC, on IEEE, 2015, pp. 315-319.
[19]. Hemanta Kumarand Avijit Kar,”Wireless Sensor Network Security Analysis”, international Journal of Next Generation Networks
(IJNGN),Vol. 1, No. 1, Dec. 2009.
[20]. E. C. Nagai, J. Liu and M. R. Lyer, ”An EfficientIntruder Detection Algorithm against Sink Hole Attacks in WSN”, Computer
Communications, Vol. 30, no. 11, pp. 2353-2364, 2007.
[21]. B. G. Choi, E. J. Cho, J. Hokim, C. S. Hong and J. H. Kim, “A Sink Hole Attack Detection Mechanism for LQI Based Mesh
Routing in WSN”, ICOIN 2009,pp. 1-5.
[22]. D.Dallas,C. Leckie and K.Ramamohanrao, ”Hop Count Monitoring: Detecting Sink Hole Attack in WSN”, ICON 07: Proceedings
of 15th
IEEE International Conference. 2007, pp. 176-181.
[23]. A. A. Pilzada and C. M. C. Donald, “Circumventing Sinkhole Attacks in WSN Using Hop Count”, I.J.Computer Network and
Information Security, 2015,pp. 50-56.
[24]. Md.Ibrahim, Md.Muntasir, “Detecting Sink HoleAttacks in WSN using Hop Count”, I.J. ComputerNetworks and Information
Security, 2015,pp. 50-56.
[25]. James Newsome,Elaine Shi,Dawn Song,and Adrian Purig,”The Sybil Attack in Sensor Networks:
[26]. Analysis and Defenses”, April 26-27, 2004,Berkely,California, USA.
[27]. Haifeng Yu, Michael, Philip and Abraham, “Sybil Guard: Defending Against Sybil Attacks in SocialNetworks”, SIGCOMM ’06,
Sep. 11-15.
[28]. Navnet, Rakesh, “Sybil Attack Detection and Prevention Using AODV in VANET”, IJCSM, Vol 13, Sep. 2013.
[29]. Limin Wang, “Survey on Sensor Networks”, Department of Computer Science Engineering,Michigan State University, 2004.
[30]. Deepak Ganesan et al, “Networking issues in Wireless Sensor Networks”, Elseiver Science, 9th
December 2006.
[31]. P.Jiang, yu Wen et.al, “A Study of Routing Protocol in Wireless Sensor Networks”, in Proceedings of 6th
World Congress on
intelligent Control and Automation, June 21-23, 2006, Dalian, China.

More Related Content

What's hot

PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...IOSR Journals
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksIOSR Journals
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 

What's hot (18)

PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
 
D0961927
D0961927D0961927
D0961927
 
A43030104
A43030104A43030104
A43030104
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
Ijetr042106
Ijetr042106Ijetr042106
Ijetr042106
 

Viewers also liked

EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKSEFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKSIJCNC
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanetVYSAKHMANAYATH
 
Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)M.k. Praveen
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksDuncan Purves
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2eSAT Journals
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas pptsanthu652
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systemsAshok Behuria
 
Wireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigmWireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigmeSAT Publishing House
 

Viewers also liked (20)

EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKSEFFECT OF DUTY CYCLE ON ENERGY  CONSUMPTION IN WIRELESS SENSOR NETWORKS
EFFECT OF DUTY CYCLE ON ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
Malicious node detection in vanet
Malicious node detection in vanetMalicious node detection in vanet
Malicious node detection in vanet
 
Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN)
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Overview of Wireless Sensor Networks
Overview of Wireless Sensor NetworksOverview of Wireless Sensor Networks
Overview of Wireless Sensor Networks
 
Mathematical Modelling of Wireless sensor Network and new energy Aware Routing
Mathematical Modelling of Wireless sensor Network and new energy Aware Routing Mathematical Modelling of Wireless sensor Network and new energy Aware Routing
Mathematical Modelling of Wireless sensor Network and new energy Aware Routing
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2Replication of attacks in a wireless sensor network using ns2
Replication of attacks in a wireless sensor network using ns2
 
Data Science Case Study: Wireless sensor network mathematical Models
Data Science Case Study: Wireless sensor network mathematical ModelsData Science Case Study: Wireless sensor network mathematical Models
Data Science Case Study: Wireless sensor network mathematical Models
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
smart antennas ppt
smart antennas pptsmart antennas ppt
smart antennas ppt
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Wireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigmWireless sensor networks communication energy efficient paradigm
Wireless sensor networks communication energy efficient paradigm
 

Similar to A Review of Network Layer Attacks and Countermeasures in WSN

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksCSITiaesprime
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsIJMER
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetijctet
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...IJCI JOURNAL
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksresearcherchennai
 

Similar to A Review of Network Layer Attacks and Countermeasures in WSN (20)

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
K1803036872
K1803036872K1803036872
K1803036872
 
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...
 
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING ROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
Survey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networksSurvey of wormhole attack in wireless sensor networks
Survey of wormhole attack in wireless sensor networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Investigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manetInvestigation of detection & prevention sinkhole attack in manet
Investigation of detection & prevention sinkhole attack in manet
 
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...S ECURITY  C ONSIDERATIONS IN A  M ARINE  C OMMUNICATION  N ETWORK FOR  F ISH...
S ECURITY C ONSIDERATIONS IN A M ARINE C OMMUNICATION N ETWORK FOR F ISH...
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书rnrncn29
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 

Recently uploaded (20)

Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
『澳洲文凭』买麦考瑞大学毕业证书成绩单办理澳洲Macquarie文凭学位证书
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 

A Review of Network Layer Attacks and Countermeasures in WSN

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 6, Ver. III (Nov - Dec .2015), PP 10-15 www.iosrjournals.org DOI: 10.9790/2834-10631015 www.iosrjournals.org 10 | Page A Review of Network Layer Attacks and Countermeasures in WSN S.Nithya1 , K.VijayaLakshmi2 , V.PadmaPriya3 123 Department of Electrical and Electronics Engineering SRM University, Ramapuram – Chennai, India Abstract: Wireless Sensor Network is a wireless network of thousands of inexpensive miniature devices capable of computation, communication and sensing. It provides a bridge between real physical and virtual worlds. In spite of its wide range of potential application to industry, science, transportation and security; it poses security threats at different layers. In this paper different types of attacks in network layer are examined and existing solutions were discussed. Some open research issues are also presented. Keywords: Network Layer; Security; Wireless Sensor Network. I. Introduction Wireless Sensor Network are spatially distributed autonomous sensor to monitor physical or environmental conditions[1] such as temperature, sound, pressure etc. and to cooperatively pass their data through the network to a main location. Fig.1.Wireless Sensor Network Architecture The WSN is built of “nodes” – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor nodes has several parts: a radio transceiver with internal antenna or connection to external antenna, a microcontroller, an electronic circuit for interfacing with sensors and energy source usually a battery. The Network Layer has lot of challenges depending on applications, but the major challenges are in power saving, limited memory and buffers. Sensors does not have global ID and have to be self organized. Many security threats in Network Layer have been presented in the literature. In this paper we discuss six important attacks in Network Layer. The organization of this article is as follows. Section II presents the various security aspect of WSN, section III explains WSN protocol stack, section IV examines different attacks in Network Layer and the existing solutions, section V put forward open challenges in research and final section VI provides conclusion of this paper. II. Security Aspect Of Wsn To make a wireless network secure, the network should support all secure parameters like confidentiality, authenticity, availability and integrity. Confidentiality: - In sensor Network, confidentiality relates to the following [2], [3]  A sensor network should not leak sensor readings to its neighbors. The data stored in sensor node must be highly sensitive.
  • 2. A Review of Network Layer Attacks and Countermeasures in WSN DOI: 10.9790/2834-10631015 www.iosrjournals.org 11 | Page  Since the nodes communicate highly sensitive data, secure channel is important in a WSN system.  The network must encrypt data to protect against traffic analysis attacks. Integrity: - It ensures that message sent from one node to another is not modified by malicious intermediate nodes. In WSN intrusion detection system can provide integrity mechanism. Availability: - Attacks damage the availability for WSN for the following reasons  Additional computation consumes additional energy. If no more energy exists, data will no larger be available.  A single point failure greatly threatens availability of network if central point scheme is used. Authenticity: - It ensures that the other end of connection or originator of a packet is the node that is claimed. Access control prevents unauthorized access to a resource. III. Protocol Stack A simplified protocol stack for WSN is summarized in figure 2 Fig. 2. Protocol Stack  Application Layer: It defines a standard set of services and interface primitives available independently for the programmer on their implementation on every kind of platform.  Transport Layer : It helps to maintain the flow of data, if sensor network application requires it.  Network Layer : It takes care of routing the data, directing the process of selecting paths along which to send the data in the network.  Data Link Layer: It provides multiplexing of data streams, data frame detection and MAC.  Physical Layer: It is responsible for frequency and power selection, modulation and data encryption. IV. Attacks In Network Layer The Network Layer vulnerabilities generally fall into one of the two categories: routing attack and packet forwarding attack based on target operation of attacks. The following describes the Network Layer attacks in WSN. A. Wormhole Attack In this attack, a pair of colluding attackers record packet at one location and replay them at another location using private high speed network. The seriousness of this attack is that it can be launched against all communications that provide authenticity and confidentiality. Figure (3) shows an example of wormhole attack.
  • 3. A Review of Network Layer Attacks and Countermeasures in WSN DOI: 10.9790/2834-10631015 www.iosrjournals.org 12 | Page Fig. 3. Wormhole Attack In [4] packet leashes are proposed to detect and defend against wormhole attack. In [5] the author offers protection against wormhole in OLSR protocol. This approach is based on the location information and requires deployment of public key infrastructure and time stamp synchronization between all the nodes. In [6] the author proposes statistical analysis of multipath which is an approach to detect wormhole attack by using multipath routing..This approach determines the attack by calculating relative frequency of each link in all the routes. The link with highest frequency is identified as wormhole link. The advantage is, it employs limited overhead in multipath routing. But it doesn’t work in non –multipath routing protocol like AODV protocol. In [7] the author adopts directional antennas and find infeasible communicating links by utilizing directionality of antenna communication. In [8] author presents a graph based framework to tackle wormholes. This approach assumes existence of guard nodes with extra ordinary communication range. In [9] the author graphically visualizes presence of wormholes. They reconstruct layout of network by centralized multidimensional scaling (MDS) to capture wrap introduced by the wormholes. In [10] the author analyzes impact of combination of wormholes by topology methodology. They locate various wormholes by detecting non separating loops, without any special hardware devices or any assumption on the network properties. In [11] the author explains wormhole attack modes and classes and described attack from attacker’s perspective. B. Flooding Attack In flooding attack, attacker exhausts network resources such as bandwidth and consume node’s resources such as computational and battery power to disrupt routing operation to cause severe degradation in network performance. Fig. 4. Flooding Attack In [12] the author proposes simple mechanism to prevent flooding in AODV protocol. In this approach, each node monitors and calculates rate or neighbor’s RREQ. If RREQ rate of any neighbor exceeds predefined threshold, node record ID of this neighbor in the black list and drop any future RREQs from the node. The limitation is, it cannot prevent attack if flooding rate is below threshold. In [13] the author proposed technique based on the statistical analysis to detect malicious RREQ floods. This approach determines threshold based on statistical analysis of RREQs, which can be applied for varying flooding rates.
  • 4. A Review of Network Layer Attacks and Countermeasures in WSN DOI: 10.9790/2834-10631015 www.iosrjournals.org 13 | Page C. Selective Forwarding / Black Hole In this attack malicious node behave like normal node and forward packets but selectively drop some packets. When the malicious node acts like a black hole, it drops all the packet passing through it [14]. Selective Forwarding attack is called as special case of Black Hole attack. Fig. 5. Black hole Attack The countermeasures for selective forwarding attack can be classified as follows [15].  Acknowledgement based detection.  Detection using neighborhood information.  Using multidata flow to mitigate attack. In [16] author describes lightweight detection scheme which uses only two – hop neighborhood information. Each node sends a HELLO packet which contains three important fields source node ID, intermediate node ID and hop counter value. In [17] the author discusses some of the mitigation schemes to defend this attack and also discussed drawback of each scheme. In [18] author analyses four scenarios based on implicit acknowledgement in energy harvesting WSN and proposed hop-by-hop co-operative detection (HCD) to effectively detect the forwarding misbehaviors of malicious node and to mitigate it. D. Sink Hole In this, a compromised node is made to look exclusively attractive to its neighbor nodes regarding the routing algorithm and pull almost all the traffic from specific area [19]. The attacker listens route requests of nodes and tries to persuade that it has shortest path for base station [20]. Fig. 6. Sink Hole Attack In this the author proposed detection scheme based on link quality indicator in sensor network. This method can detect sink hole attack that uses LQI base routing and several detecting nodes. Detecting mechanism is also described in Adhoc networks like AODV [22] and DSR protocol [23]. In [24] author detects malicious node using hop counting. The advantage of this technique is malicious node can be detected without any negotiation with the base station. E. Sybil Attack In this attack, single node presents multiple identities to all the other nodes in WSN. This may mislead other nodes and hence route believed to be disjoint with respect to the node can have the same adversary node.
  • 5. A Review of Network Layer Attacks and Countermeasures in WSN DOI: 10.9790/2834-10631015 www.iosrjournals.org 14 | Page Fig. 6. Sybil Attack In [25] the author analyses different defenses for Sybil attacks like position verification, registration, key predistribution and code attestation and radio resource testing. In this random key predistribution is most promising methods as it relies on cryptographic principles and robust to compromised nodes. In [26] the author presents a novel decentralized protocol for limiting the corruptive influences of Sybil attacks by bounding both number and size of Sybil groups. F. Replay Attack It is a form of network attack, in which a valid data transmission is maliciously or fraudently repeated or delayed. It is carried out either by the originator or by an adversary who intercepts the data and retransmits it. Fig. 7. Replay Attack There are several countermeasures like session tokens, one Time Password (OTP), Time stamping etc. In [27] the author designs a light weight detection and prevention system cops that intelligently uses combination of digital signatures and Bloom filters to cope with attack. V. Open Research Issues Sensor networks are still at an early stage in terms of technique as it is still not widely deployed in world and these provide doors for many research issues. [28], [29], [30]  Energy efficiency is an important criterion. It is necessary to find the energy efficient routes to improve the life time of network.  Data collected by various sensors in WSN are typically based on common phenomena. Hence there is a high probability, that this data has some redundancy.  Multipath design technique must be incorporated. So that a path among them can be used, when the primary path fails.  Sensor network collect information from physical environment and are highly data centric. To maximize energy saving a flexible platform for performing routing and data management must be provided.  Messages exchanged in WSN are vulnerable to security attacks. During transmission, messages can be tampered or eavesdrop. Research is needed to ensure the confidentiality of messages.
  • 6. A Review of Network Layer Attacks and Countermeasures in WSN DOI: 10.9790/2834-10631015 www.iosrjournals.org 15 | Page VI. Conclusion WSN are having extraordinary growth nowadays because of its application in various fields. The application using WSN, expects guarantee in security in all aspects. In this paper various attacks in Network layer were discussed and different existing countermeasures to overcome these attacks were reviewed. But the recently offered security mechanism are relayed on particular network structure, hence it is less efficient to provide complete solution for security in WSN. This paper has suggested some open research challenges in this regard. References [1]. “Environmental and Temperature Monitoring”, Centrak. [2]. F.Akyildilz, W. Su. Y. Sankrasubramaniyam and E. Cayirci, “A Survey on Sensor Networks”, IEEE Communication Magazine, 40(8): 102 – 114, August 2002. [3]. Erdal Cayirci and Chenming Rong, “Security in Wireless Adhoc and Sensor Networks”, A John Wiley and Sons Ltd, Publication, 2009. [4]. Y.Hu, A.Perig and D. Johnson, “Wormhole Attack in Wireless Networks”, IEEE JSAC, Vol 24,no. 2, Feb. 2006. [5]. D.Raffo et al, “Securing OLSR Using Node Locations”, proc. 2005. Euro, Wireless, Nicosia, Cyprus, Apr. 10-13, 2005. [6]. L. Qian, N. Song and X. Li, “Detecting and Locating Wormhole Attack in Wireless Adhoc Network Through Statistical Analysis of Muitipath”,IEEE, Wireless Communication and Networking Conference.’05. [7]. L.Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks”, presented at NOSS, 2004 [8]. R. Poovendhan and L. Lazos, “A Graph Theoritic Framework for Preventing Wormhole Attack in Wireless Adhoc Networks”, Wireless Networks.Vol 13, pp. 27-59, 2007. [9]. W.Wang and B. Bhargava,”Visualization of Wormholes in sensor Networks”,in proc. ACM wise, 2004, pp. 51-60. [10]. Dezun Dong, Mo Li, Yanhao Li and Xiang – Yang, “Topological Detection on Wormholes in Wireless AdHoc and Sensor Networks”, IEEE transactions on Networking, Vol 19, No 6, pp. 1787-1795. Dec. 2011 [11]. Azer,Sherif,Magdy, “A Full Image of Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Adhoc Networks”, IJCSIS, Vol 1, No 1, pp. 41-51, May 2009. [12]. P. Yi et al, “A New Routing Attack in Mobile Ad Hoc Networks”, int. J. Infotech, Vol. 11, no 2, 2005. [13]. S.Desilva and R.V.Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks”, proc. IEEE Wireless Communication and Networking Conference, New Orleans, LA, 2005. [14]. Chris Karlof and David Wagnet, “Secure Routing in WSN: Attacks and Countermeasures Ad Hoc Networks 293-315, 2003. [15]. L. K. Bysani and A. K. Tureek,”A Survey on Selective Forwarding Attack in WSN”, in Devices and Communications, 2011, International Conference on IEEE, 2011,pp. 1-5. [16]. Trian Hoang Hai and Eui Nam Huh, “Detecting Selective Forwarding Attacks in WSN Using TwoHop Neighbor Knowledge”, In NCA pages 325 –331, 2008. [17]. Jaspreet Singh,Anuj Gupta, “Different Approaches to Mitigate Selective Forwarding Attacks in WSN”, IJIET, Vol 3, pp. 40-46, 2014. [18]. Sunho Lim and Lauren Huie,”Hop-by-Hop Co-operative Detection of Selective ForwardingAttacks in Energy Harvesting WSN”’ ICNC,Workshop on CNC, on IEEE, 2015, pp. 315-319. [19]. Hemanta Kumarand Avijit Kar,”Wireless Sensor Network Security Analysis”, international Journal of Next Generation Networks (IJNGN),Vol. 1, No. 1, Dec. 2009. [20]. E. C. Nagai, J. Liu and M. R. Lyer, ”An EfficientIntruder Detection Algorithm against Sink Hole Attacks in WSN”, Computer Communications, Vol. 30, no. 11, pp. 2353-2364, 2007. [21]. B. G. Choi, E. J. Cho, J. Hokim, C. S. Hong and J. H. Kim, “A Sink Hole Attack Detection Mechanism for LQI Based Mesh Routing in WSN”, ICOIN 2009,pp. 1-5. [22]. D.Dallas,C. Leckie and K.Ramamohanrao, ”Hop Count Monitoring: Detecting Sink Hole Attack in WSN”, ICON 07: Proceedings of 15th IEEE International Conference. 2007, pp. 176-181. [23]. A. A. Pilzada and C. M. C. Donald, “Circumventing Sinkhole Attacks in WSN Using Hop Count”, I.J.Computer Network and Information Security, 2015,pp. 50-56. [24]. Md.Ibrahim, Md.Muntasir, “Detecting Sink HoleAttacks in WSN using Hop Count”, I.J. ComputerNetworks and Information Security, 2015,pp. 50-56. [25]. James Newsome,Elaine Shi,Dawn Song,and Adrian Purig,”The Sybil Attack in Sensor Networks: [26]. Analysis and Defenses”, April 26-27, 2004,Berkely,California, USA. [27]. Haifeng Yu, Michael, Philip and Abraham, “Sybil Guard: Defending Against Sybil Attacks in SocialNetworks”, SIGCOMM ’06, Sep. 11-15. [28]. Navnet, Rakesh, “Sybil Attack Detection and Prevention Using AODV in VANET”, IJCSM, Vol 13, Sep. 2013. [29]. Limin Wang, “Survey on Sensor Networks”, Department of Computer Science Engineering,Michigan State University, 2004. [30]. Deepak Ganesan et al, “Networking issues in Wireless Sensor Networks”, Elseiver Science, 9th December 2006. [31]. P.Jiang, yu Wen et.al, “A Study of Routing Protocol in Wireless Sensor Networks”, in Proceedings of 6th World Congress on intelligent Control and Automation, June 21-23, 2006, Dalian, China.