SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD35738 | Volume – 4 | Issue – 6 | September-October 2020 Page 1681
Study on Vulnerabilities, Attack and Security
Controls on Wireless Sensor Networks
Dr. C. Umarani1, R P Shruti2
1Assistance Professor, 2Student,
1,2Masters in Computer Applications, Jain (Deemed-to-be) University, Bangalore, Karnataka, India
ABSTRACT
In this fast evolving world of technology where security playsa majorrole,the
threats to security is also increasing rapidly. The world aims to go wireless in
all the fields, and the wireless sensor networks is also one such major field.
The sensors which can sense its environment basedonthe functionsallocated.
It retrieves the data of its surrounding and sends it to the authorized location
for further analysis. But as technology grows, the attacks on the system also
increases due to the vulnerabilities inthesystem.Hencesecurityplaysa major
role in the evolution of technology. This paper mainly concentrates on the
vulnerabilities, the attacks possible due to vulnerabilities in the system and
the counter measures to be taken to overcome the vulnerabilities.
KEYWORDS: WSN, Wireless sensor networks, keying, SPINS protocol, Tiny-Sec
protocol, LEAP protocol
How to cite this paper: Dr. C. Umarani | R
P Shruti "Study on Vulnerabilities, Attack
and Security Controls on Wireless Sensor
Networks" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-6, October
2020, pp.1681-1683, URL:
www.ijtsrd.com/papers/ijtsrd35738.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
I. INTRODUCTION
Basically, a wireless sensor network is the one which senses
its environment and stores the collected information and
send sit to the central location where the information is
further processed. For instance, a sensor is placed in the
tsunami prone area, then based on the data which is sent,
they detect the changes in the environment and take actions.
The data which is stored need to be observed at all times.
Many attacks can be possible on the wireless sensor
networks due to the vulnerabilities. Based on the type of
attack, the mitigation techniques are suggestedintheformof
papers and projects. Therefore, this paper mainly
concentrates on the vulnerabilities, attacks and security
measures on WSN.
A sensor is a device which measures or detects its
environment and indicates,recordsorrespondsaccordingto
the task given to it. Whereas, a wireless sensor network is a
combination or collection of many nodes placed in a
particular physical location for recording and monitoring. It
further sends the collected data to the far away central
location for observation and processing.
II. Objectives
This paper mainly concentrates on,
The vulnerabilities in the wireless sensor networks.
The attacks possible due to the vulnerabilities in the
system.
Some of the security controls suggested and published
for wireless sensor networks.
III. Vulnerabilities and attacks in the wireless
sensor networks
As we know, all kind of networksarevulnerabletomanykind
of attacks, may it be wired or wireless. WSN’s are more
vulnerable as they are prone to different kind of attacks as
they are the wireless medium and also some of the nodes
haveresource constraints with respect to computation.They
have limited battery power, so the energy consumption and
the memory is very less.
The data in WSN can be altered or dropped maliciously. The
nodes can be compromised or it may also malfunction. So,
some of the effective measures must be taken to overcome
these challenges.
There are 3 keying schemes available in WSN are,
Network keying: It uses only one key for the whole
network. It does not consume too much resources. So
there is no need of key management techniques.Butitis
not so robust.
Pair-wise keying: One key is used for every pair of
sensor nodes. Therefore, for instance, if the number of
nodes are N, then therequired numberofkeysareN-1.It
is robust.
Group keying: It is hybrid, i.e., the combination of both
network keying and pair-wise keying mechanisms. A
single key is used for network communication and
different keys are used between every pair of sensor
nodes. This isalso robust.
IJTSRD35738
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35738 | Volume – 4 | Issue – 6 | September-October 2020 Page 1682
The wirelesssensornetworkshaveresourceconstraints,they
are small sized, and they have limited processing power and
limited bandwidth. Because of these limitations inWSN,they
cannot be used directly in traditional cryptographic
algorithms.
Limitations in WSN
Unpredictable communication: It uses connectionless
communication. Due to which it suffers from reflection,
scattering and fading. By this, it produces very high bit
errors and produces huge amount of data loss.
Delay in communication: Due to the presence of some
intermediate nodes between the nodes, packet
transmission between the nodes can be delayed.
Remote sites and unattended setup of WSN’s: Most of
the time, the nodes are employed in remote locations.
Therefore, they are more prone to attacks. Even these
kind of attacks are difficult to predict and detect.
IV. Security requirements in WSN
Data integrity: This is about thetrustworthy of data i.e.
the data should not be modified or changed during
transmission. The data obtained bythesensornodesand
which is in transit over the network should not be
modified by any third party. Malicious nodes may
modify the data. So, the tampered data should be
transmitted to actual source. And the data should be
verified from time to time.
Data confidentiality: Only the authorized user should
get access to the data. The key distribution should be
secured enough for the data to remain between the
intended users. This means, a secure channel must be
generated. And without the permission of the intended
users, the data should not be read or accessedbynearby
users.
Self-organization: Wireless sensor network isa kindof
ad-hoc network. In WSN each sensor nodeisflexibleand
self-organizing. Hence, applying the traditional
cryptographic algorithm like RSA is difficult. And as the
sensor nodes behave dynamically, sharing key between
nodes is difficult before deployment if the symmetric
key is used. Here, the topologies (physical and logical
topologies) may also change in the self- organizing
network.
Data newness: The data should be sent only once. That
means the old data which is already sent, should not be
sent again and again. If so replay attack can be possible.
To ensure the freshness of data, a time stamp or a time
specific counter can be added. If the shared key is used,
it is mandatory to update data overtime.
Data authentication: The data inflow must be from an
authenticated source. Authenticating the source is very
much important. We should make sure that no third
party is acting like an authenticated user. It can be done
through MAC (Message Authentication Code).
Time synchronization: Since WSN uses distributed
environment, the different entities or nodes
participating must be time synchronized.
Secure localization: It is all about understanding the
location ofvarious sensor nodes. In sensor network, the
data which is sent to the central location is geo-tagged.
I.e., the geographical location of node is also embedded
with that data. If the node is not secured properly,
attacker can deliver false location and also reply to the
messages.
Data availability: This makes sure that no authorized
user is prevented from using services privileged to him.
WSN should always be available to the legitimate users.
To ensure that the data is accessible to the legitimate
user, one common technique to be used is to use extra
nodes for communication.
Denial-of-sleep attack: It is a kind of denial-of-service
attack where, lot of unwanted or garbagepacketswill be
sent to the network. So, the nodes will always be kept
busy and active. Therefore they will not go to the sleep
state and consume all the resources. So it is a type of
attack.
V. Security protocols for WSN
There are many security measures proposed for wireless
sensor networks. Some of the mare,
SPINS protocol.
Tiny Sec protocol.
LEAP protocol (LocalizedEncryptionandAuthentication
Protocol).
SPINS Protocol: Sensor Protocol for Information via
Negotiation is a group of security protocols which will take
care of issues related to confidentiality and integrity. SPINS
protocol basically has two blocks, one is SNEP which fulfils
the requirement of confidentiality, integrity, privacy and
newness and is employed as peer connection between the
nodes. The other is microtesla which offers authentication
and produces key for MAC authentication scheme. It usesthe
mechanism of broadcasting.
Tiny Sec: It is a lightweight data link layer security protocol.
It offers privacy, Authentication and newness to the nodes.
There are two types of approach, one is authentication
approach and the other is authentication and encryption
approach.
LEAP protocol: It isabbreviatedasLocalizedEncryptionand
Authentication Protocol. It is a key management protocol.
Instead of using only one key, it generates four type of keys.
A collection of keys: This key is shared to all the
members of WSN.
Arrangement in clusters: Set of nodes arranged in the
form of clusters.
Arrangement in peers: A key is shared between the
nodes of each peer.
Single key: Only one single key is shared with the base
station.
VI. Conclusion
Wireless sensor network is a major topic of interest for
research. Each ofthedevelopmentinthetechnologymaylead
to much vulnerability. Hence, the security should also be
implemented strongly when it comes to the wireless
networks. The sensor networks helps monitoring day to day
activities. If thesecuritycanbeimplementedstronglyinthese
nodes using the protocols, the sesensors nodes can be
implemented effectively. So, we should work more on
implementing security more efficiently.
References:
[1] https://books.google.co.in/books?hl=en&lr=&id=4zy
DBwAAQBAJ&oi=fnd&pg=PA21&dq=Wireless+sensor
+networks&ots=6jtCbzfC4C&sig=byC54m6jnBRW8sh
k-
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD35738 | Volume – 4 | Issue – 6 | September-October 2020 Page 1683
37pApnQwdA&redir_esc=y#v=onepage&q=Wireless
%20sensor%20networks&f=false
[2] https://www.sciencedirect.com/science/article/abs/
pii/S1389128601003024
[3] https://dl.acm.org/doi/abs/10.1145/570738.570751
[4] http://webstaff.itn.liu.se/~jinzh29/TNE090/Lecture
Note4in1/TNE090_Letcure_1_4in1.pdf
[5] https://www.sciencedirect.com/science/article/abs/
pii/S1570870503000088
[6] https://dl.acm.org/doi/fullHtml/10.1145/990680.99
0707
[7] https://www.researchgate.net/profile/D_Sridharan/
publication/266591710_Security_Vulnerabilities_In_
Wireless_Sensor_Networks_A_Survey/links/544629e
30cf2f14fb80f26ce/Security-Vulnerabilities-In-
Wireless-Sensor-Networks-A-Survey.pdf
[8] https://ieeexplore.ieee.org/abstract/document/5636
116
[9] https://www.researchgate.net/profile/Robert_Ritten
house/publication/261324361_Sinkhole_Vulnerabilit
ies_in_Wireless_Sensor_Networks/links/0deec533e4
7c7ac7c2000000.pdf

More Related Content

What's hot (19)

PPTX
Wireless sensor network security
argh61
 
PDF
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
PDF
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
PPTX
Security in wireless sensor network
Adit Pathak
 
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
PDF
A Security Overview of Wireless Sensor Network
IJCSIS Research Publications
 
PPT
Security in wireless sensor networks
Piyush Mittal
 
PPTX
Wireless sensor network security issues
Maha Saad
 
PDF
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
PPTX
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
PDF
Security Attacks and its Countermeasures in Wireless Sensor Networks
IJERA Editor
 
PDF
An enhancing security for mobile sinks by providing location privacy in wsn
eSAT Publishing House
 
PDF
Distributed Intrusion Detection System for Wireless Sensor Networks
IOSR Journals
 
PDF
A key management approach for wireless sensor networks
Zac Darcy
 
PDF
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
PDF
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Harshal Ladhe
 
PDF
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
PDF
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
IJMTST Journal
 
Wireless sensor network security
argh61
 
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Overview on security and privacy issues in wireless sensor networks-2014
Tarek Gaber
 
Security in wireless sensor network
Adit Pathak
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
A Security Overview of Wireless Sensor Network
IJCSIS Research Publications
 
Security in wireless sensor networks
Piyush Mittal
 
Wireless sensor network security issues
Maha Saad
 
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Security Attacks and its Countermeasures in Wireless Sensor Networks
IJERA Editor
 
An enhancing security for mobile sinks by providing location privacy in wsn
eSAT Publishing House
 
Distributed Intrusion Detection System for Wireless Sensor Networks
IOSR Journals
 
A key management approach for wireless sensor networks
Zac Darcy
 
Integrated Security and Attack Detection Scheme for Wireless Sensor Networks
Editor IJMTER
 
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
Harshal Ladhe
 
A review of privacy preserving techniques in wireless sensor network
Alexander Decker
 
Securing the Data Communication between the Neighboring Sensor Nodes using Bi...
IJMTST Journal
 

Similar to Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks (20)

PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
IJAEMSJORNAL
 
PDF
Attacks and counterattacks on wireless sensor networks
ijasuc
 
PDF
ATTACKS AND COUNTERATTACKS ON WIRELESS SENSOR NETWORKS
ijasuc
 
PDF
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
PDF
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
IAESIJEECS
 
PDF
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
PDF
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
AIRCC Publishing Corporation
 
PDF
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
ijcsit
 
PDF
76201924
IJRAT
 
PDF
G041124047
IOSR-JEN
 
PDF
Analysis of wireless sensor networks security, attacks and challenges
eSAT Publishing House
 
PDF
Analysis of wireless sensor networks
eSAT Journals
 
PDF
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
cscpconf
 
PDF
Wireless sensor networks architecture security requirements security threats...
csandit
 
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PDF
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PDF
Pe2 a public encryption with two ack approach to
eSAT Publishing House
 
PDF
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET Journal
 
PDF
A comparative study of physical attacks on wireless sensor networks
eSAT Publishing House
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
IJAEMSJORNAL
 
Attacks and counterattacks on wireless sensor networks
ijasuc
 
ATTACKS AND COUNTERATTACKS ON WIRELESS SENSOR NETWORKS
ijasuc
 
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
IAESIJEECS
 
Wireless Sensor Networks: An Overview on Security Issues and Challenges
BRNSSPublicationHubI
 
Wireless Sensor Networks, Security Requirements, Attacks, Security Mechanisms.
AIRCC Publishing Corporation
 
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDY
ijcsit
 
76201924
IJRAT
 
G041124047
IOSR-JEN
 
Analysis of wireless sensor networks security, attacks and challenges
eSAT Publishing House
 
Analysis of wireless sensor networks
eSAT Journals
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
cscpconf
 
Wireless sensor networks architecture security requirements security threats...
csandit
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
IJNSA Journal
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
IJNSA Journal
 
A SURVEY ON SECURITY IN WIRELESS SENSOR NETWORKS
IJNSA Journal
 
Pe2 a public encryption with two ack approach to
eSAT Publishing House
 
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET Journal
 
A comparative study of physical attacks on wireless sensor networks
eSAT Publishing House
 
Ad

More from ijtsrd (20)

PDF
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
PDF
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
PDF
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
PDF
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
PDF
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
PDF
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
PDF
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
PDF
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
PDF
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
PDF
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
PDF
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
PDF
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
PDF
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
PDF
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
PDF
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
PDF
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
PDF
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
PDF
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
PDF
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
PDF
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
Ad

Recently uploaded (20)

PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PPT
digestive system for Pharm d I year HAP
rekhapositivity
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PPSX
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
PPTX
Presentation: Climate Citizenship Digital Education
Karl Donert
 
PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
PPTX
How to Configure Lost Reasons in Odoo 18 CRM
Celine George
 
PPTX
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
The-Beginnings-of-Indian-Civilisation.pdf/6th class new ncert social/by k san...
Sandeep Swamy
 
PPTX
Latest Features in Odoo 18 - Odoo slides
Celine George
 
PPTX
SCHOOL-BASED SEXUAL HARASSMENT PREVENTION AND RESPONSE WORKSHOP
komlalokoe
 
PPTX
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
PPTX
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
digestive system for Pharm d I year HAP
rekhapositivity
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
HEALTH ASSESSMENT (Community Health Nursing) - GNM 1st Year
Priyanshu Anand
 
Presentation: Climate Citizenship Digital Education
Karl Donert
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
How to Configure Prepayments in Odoo 18 Sales
Celine George
 
How to Configure Lost Reasons in Odoo 18 CRM
Celine George
 
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
The-Beginnings-of-Indian-Civilisation.pdf/6th class new ncert social/by k san...
Sandeep Swamy
 
Latest Features in Odoo 18 - Odoo slides
Celine George
 
SCHOOL-BASED SEXUAL HARASSMENT PREVENTION AND RESPONSE WORKSHOP
komlalokoe
 
Explorando Recursos do Summer '25: Dicas Essenciais - 02
Mauricio Alexandre Silva
 
Accounting Skills Paper-I, Preparation of Vouchers
Dr. Sushil Bansode
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 

Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD35738 | Volume – 4 | Issue – 6 | September-October 2020 Page 1681 Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks Dr. C. Umarani1, R P Shruti2 1Assistance Professor, 2Student, 1,2Masters in Computer Applications, Jain (Deemed-to-be) University, Bangalore, Karnataka, India ABSTRACT In this fast evolving world of technology where security playsa majorrole,the threats to security is also increasing rapidly. The world aims to go wireless in all the fields, and the wireless sensor networks is also one such major field. The sensors which can sense its environment basedonthe functionsallocated. It retrieves the data of its surrounding and sends it to the authorized location for further analysis. But as technology grows, the attacks on the system also increases due to the vulnerabilities inthesystem.Hencesecurityplaysa major role in the evolution of technology. This paper mainly concentrates on the vulnerabilities, the attacks possible due to vulnerabilities in the system and the counter measures to be taken to overcome the vulnerabilities. KEYWORDS: WSN, Wireless sensor networks, keying, SPINS protocol, Tiny-Sec protocol, LEAP protocol How to cite this paper: Dr. C. Umarani | R P Shruti "Study on Vulnerabilities, Attack and Security Controls on Wireless Sensor Networks" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-6, October 2020, pp.1681-1683, URL: www.ijtsrd.com/papers/ijtsrd35738.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) I. INTRODUCTION Basically, a wireless sensor network is the one which senses its environment and stores the collected information and send sit to the central location where the information is further processed. For instance, a sensor is placed in the tsunami prone area, then based on the data which is sent, they detect the changes in the environment and take actions. The data which is stored need to be observed at all times. Many attacks can be possible on the wireless sensor networks due to the vulnerabilities. Based on the type of attack, the mitigation techniques are suggestedintheformof papers and projects. Therefore, this paper mainly concentrates on the vulnerabilities, attacks and security measures on WSN. A sensor is a device which measures or detects its environment and indicates,recordsorrespondsaccordingto the task given to it. Whereas, a wireless sensor network is a combination or collection of many nodes placed in a particular physical location for recording and monitoring. It further sends the collected data to the far away central location for observation and processing. II. Objectives This paper mainly concentrates on, The vulnerabilities in the wireless sensor networks. The attacks possible due to the vulnerabilities in the system. Some of the security controls suggested and published for wireless sensor networks. III. Vulnerabilities and attacks in the wireless sensor networks As we know, all kind of networksarevulnerabletomanykind of attacks, may it be wired or wireless. WSN’s are more vulnerable as they are prone to different kind of attacks as they are the wireless medium and also some of the nodes haveresource constraints with respect to computation.They have limited battery power, so the energy consumption and the memory is very less. The data in WSN can be altered or dropped maliciously. The nodes can be compromised or it may also malfunction. So, some of the effective measures must be taken to overcome these challenges. There are 3 keying schemes available in WSN are, Network keying: It uses only one key for the whole network. It does not consume too much resources. So there is no need of key management techniques.Butitis not so robust. Pair-wise keying: One key is used for every pair of sensor nodes. Therefore, for instance, if the number of nodes are N, then therequired numberofkeysareN-1.It is robust. Group keying: It is hybrid, i.e., the combination of both network keying and pair-wise keying mechanisms. A single key is used for network communication and different keys are used between every pair of sensor nodes. This isalso robust. IJTSRD35738
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35738 | Volume – 4 | Issue – 6 | September-October 2020 Page 1682 The wirelesssensornetworkshaveresourceconstraints,they are small sized, and they have limited processing power and limited bandwidth. Because of these limitations inWSN,they cannot be used directly in traditional cryptographic algorithms. Limitations in WSN Unpredictable communication: It uses connectionless communication. Due to which it suffers from reflection, scattering and fading. By this, it produces very high bit errors and produces huge amount of data loss. Delay in communication: Due to the presence of some intermediate nodes between the nodes, packet transmission between the nodes can be delayed. Remote sites and unattended setup of WSN’s: Most of the time, the nodes are employed in remote locations. Therefore, they are more prone to attacks. Even these kind of attacks are difficult to predict and detect. IV. Security requirements in WSN Data integrity: This is about thetrustworthy of data i.e. the data should not be modified or changed during transmission. The data obtained bythesensornodesand which is in transit over the network should not be modified by any third party. Malicious nodes may modify the data. So, the tampered data should be transmitted to actual source. And the data should be verified from time to time. Data confidentiality: Only the authorized user should get access to the data. The key distribution should be secured enough for the data to remain between the intended users. This means, a secure channel must be generated. And without the permission of the intended users, the data should not be read or accessedbynearby users. Self-organization: Wireless sensor network isa kindof ad-hoc network. In WSN each sensor nodeisflexibleand self-organizing. Hence, applying the traditional cryptographic algorithm like RSA is difficult. And as the sensor nodes behave dynamically, sharing key between nodes is difficult before deployment if the symmetric key is used. Here, the topologies (physical and logical topologies) may also change in the self- organizing network. Data newness: The data should be sent only once. That means the old data which is already sent, should not be sent again and again. If so replay attack can be possible. To ensure the freshness of data, a time stamp or a time specific counter can be added. If the shared key is used, it is mandatory to update data overtime. Data authentication: The data inflow must be from an authenticated source. Authenticating the source is very much important. We should make sure that no third party is acting like an authenticated user. It can be done through MAC (Message Authentication Code). Time synchronization: Since WSN uses distributed environment, the different entities or nodes participating must be time synchronized. Secure localization: It is all about understanding the location ofvarious sensor nodes. In sensor network, the data which is sent to the central location is geo-tagged. I.e., the geographical location of node is also embedded with that data. If the node is not secured properly, attacker can deliver false location and also reply to the messages. Data availability: This makes sure that no authorized user is prevented from using services privileged to him. WSN should always be available to the legitimate users. To ensure that the data is accessible to the legitimate user, one common technique to be used is to use extra nodes for communication. Denial-of-sleep attack: It is a kind of denial-of-service attack where, lot of unwanted or garbagepacketswill be sent to the network. So, the nodes will always be kept busy and active. Therefore they will not go to the sleep state and consume all the resources. So it is a type of attack. V. Security protocols for WSN There are many security measures proposed for wireless sensor networks. Some of the mare, SPINS protocol. Tiny Sec protocol. LEAP protocol (LocalizedEncryptionandAuthentication Protocol). SPINS Protocol: Sensor Protocol for Information via Negotiation is a group of security protocols which will take care of issues related to confidentiality and integrity. SPINS protocol basically has two blocks, one is SNEP which fulfils the requirement of confidentiality, integrity, privacy and newness and is employed as peer connection between the nodes. The other is microtesla which offers authentication and produces key for MAC authentication scheme. It usesthe mechanism of broadcasting. Tiny Sec: It is a lightweight data link layer security protocol. It offers privacy, Authentication and newness to the nodes. There are two types of approach, one is authentication approach and the other is authentication and encryption approach. LEAP protocol: It isabbreviatedasLocalizedEncryptionand Authentication Protocol. It is a key management protocol. Instead of using only one key, it generates four type of keys. A collection of keys: This key is shared to all the members of WSN. Arrangement in clusters: Set of nodes arranged in the form of clusters. Arrangement in peers: A key is shared between the nodes of each peer. Single key: Only one single key is shared with the base station. VI. Conclusion Wireless sensor network is a major topic of interest for research. Each ofthedevelopmentinthetechnologymaylead to much vulnerability. Hence, the security should also be implemented strongly when it comes to the wireless networks. The sensor networks helps monitoring day to day activities. If thesecuritycanbeimplementedstronglyinthese nodes using the protocols, the sesensors nodes can be implemented effectively. So, we should work more on implementing security more efficiently. References: [1] https://books.google.co.in/books?hl=en&lr=&id=4zy DBwAAQBAJ&oi=fnd&pg=PA21&dq=Wireless+sensor +networks&ots=6jtCbzfC4C&sig=byC54m6jnBRW8sh k-
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD35738 | Volume – 4 | Issue – 6 | September-October 2020 Page 1683 37pApnQwdA&redir_esc=y#v=onepage&q=Wireless %20sensor%20networks&f=false [2] https://www.sciencedirect.com/science/article/abs/ pii/S1389128601003024 [3] https://dl.acm.org/doi/abs/10.1145/570738.570751 [4] http://webstaff.itn.liu.se/~jinzh29/TNE090/Lecture Note4in1/TNE090_Letcure_1_4in1.pdf [5] https://www.sciencedirect.com/science/article/abs/ pii/S1570870503000088 [6] https://dl.acm.org/doi/fullHtml/10.1145/990680.99 0707 [7] https://www.researchgate.net/profile/D_Sridharan/ publication/266591710_Security_Vulnerabilities_In_ Wireless_Sensor_Networks_A_Survey/links/544629e 30cf2f14fb80f26ce/Security-Vulnerabilities-In- Wireless-Sensor-Networks-A-Survey.pdf [8] https://ieeexplore.ieee.org/abstract/document/5636 116 [9] https://www.researchgate.net/profile/Robert_Ritten house/publication/261324361_Sinkhole_Vulnerabilit ies_in_Wireless_Sensor_Networks/links/0deec533e4 7c7ac7c2000000.pdf