Fig. 1. Protocol Stack. 그림 1. 프로토콜 스택
Fig. 2. Wormhole Attack. 그림 2. Wormhole 공격
Fig. 3. HELLO Flood Attack. 그림 3. HELLO Flood 공격
Fig. 4. Sybil Attack. 그림 4. Sybil 공격
Fig. 5. Sinkhole Attack. 그림 5. 싱크홀 공격
Fig. 6. Selective Forwarding. 그림 6. 선택적 전달 공격
References
- D. Boyle and T. Newe, "Securing Wireless Sensor Networks: Security Architectures," Journal Of Networks, Vol.3, No.1, pp.65-77, 2008.
- S. Nithya, K. VijayaLakshmi, and V. PadmaPriya, "A Review of Network Layer Attacks and Countermeasures in WSN," IOSR Journal of Electronics and Communication Engineering, Vol.10, Issue.6, pp.10-15, 2015.
- H. K. Kalita and A. Kar, "Wireless Sensor Network Security Analysis," International Journal of Computer Science & Information Technology, Vol.1, No.1, pp.1-10, 2009. https://doi.org/10.5815/ijitcs.2009.01.01
- N. Sharma1 and U. Singh, "Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks," International Journal of Computer Science and Mobile Computing, Vol.3, Issue.2, pp.29-33, 2014.
- A. M. Abdul and S. Umar, "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security," Indonesian Journal of Electrical Engineering and Computer Science Vol.5, No.1, pp.181-186, 2017. https://doi.org/10.11591/ijeecs.v5.i1.pp181-186
- M. Ibrahim and M. Muntasir, "Detecting Sink Hole Attacks in WSN using Hop Count," Computer Networks and Information Security, Vol.3, pp.50-56, 2015.
- H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and Mitigation of Sinkhole Attacks in Wireless Sensor Networks," Journal of Computer and System Sciences, Vol.80, Issue.3, pp.644-653, 2014. https://doi.org/10.1016/j.jcss.2013.06.016
- G. W. Kibirige and C. Sanga, "A Survey on Detection of Sinkhole Attack in Wireless Sensor Network," International Journal of Computer Science and Information Security, Vol.13, No.5, pp.1-9, 2015.
- J. Shokeen, P. Palak, and P. Devi, "A Survey on Selective Forwarding Attacks in Wireless Sensor Networks," International Journal of Computer Science and Mobile Computing, Vol.5, Issue.8, pp.45-50, 2016.
- J. Singh and A. Gupta, "Different Approaches to Mitigate Selective Forwarding Attacks in WSN," International Journal of Innovations in Engineering and Technology, Vol.3, pp.40-46, 2014.