Browse > Article
http://dx.doi.org/10.7471/ikeee.2019.23.2.413

Attacks, Detection, and Countermeasures in WSN Network Layer  

Lee, Daeun (Dept. of Electronic Engineering, Sangmyung University)
Rhee, Eugene (Dept. of Electronic Engineering, Sangmyung University)
Publication Information
Journal of IKEEE / v.23, no.2, 2019 , pp. 413-418 More about this Journal
Abstract
Attacks on existing sensor networks include sniffing, flooding, and spoofing attacks. The basic countermeasures include encryption and authentication methods and switching methods. Wormhole attack, HELLO flood attack, Sybil attack, sinkhole attack, and selective delivery attack are the attacks on the network layer in wireless sensor network (WSN). These attacks may not be defended by the basic countmeasures mentioned above. In this paper, new countermeasures against these attacks include periodic key changes and regular network monitoring. Moreover, we present various threats (attacks) in the network layer of wireless sensor networks and new countermeasures accordingly.
Keywords
WSN(Wireless Sensor Network); Network Layer; Security; Threat; Solution;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Ibrahim and M. Muntasir, "Detecting Sink Hole Attacks in WSN using Hop Count," Computer Networks and Information Security, Vol.3, pp.50-56, 2015.
2 H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and Mitigation of Sinkhole Attacks in Wireless Sensor Networks," Journal of Computer and System Sciences, Vol.80, Issue.3, pp.644-653, 2014.   DOI
3 G. W. Kibirige and C. Sanga, "A Survey on Detection of Sinkhole Attack in Wireless Sensor Network," International Journal of Computer Science and Information Security, Vol.13, No.5, pp.1-9, 2015.
4 J. Shokeen, P. Palak, and P. Devi, "A Survey on Selective Forwarding Attacks in Wireless Sensor Networks," International Journal of Computer Science and Mobile Computing, Vol.5, Issue.8, pp.45-50, 2016.
5 J. Singh and A. Gupta, "Different Approaches to Mitigate Selective Forwarding Attacks in WSN," International Journal of Innovations in Engineering and Technology, Vol.3, pp.40-46, 2014.
6 D. Boyle and T. Newe, "Securing Wireless Sensor Networks: Security Architectures," Journal Of Networks, Vol.3, No.1, pp.65-77, 2008.
7 S. Nithya, K. VijayaLakshmi, and V. PadmaPriya, "A Review of Network Layer Attacks and Countermeasures in WSN," IOSR Journal of Electronics and Communication Engineering, Vol.10, Issue.6, pp.10-15, 2015.
8 H. K. Kalita and A. Kar, "Wireless Sensor Network Security Analysis," International Journal of Computer Science & Information Technology, Vol.1, No.1, pp.1-10, 2009.   DOI
9 N. Sharma1 and U. Singh, "Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks," International Journal of Computer Science and Mobile Computing, Vol.3, Issue.2, pp.29-33, 2014.
10 A. M. Abdul and S. Umar, "Attacks of Denial-of-Service on Networks Layer of OSI Model and Maintaining of Security," Indonesian Journal of Electrical Engineering and Computer Science Vol.5, No.1, pp.181-186, 2017.   DOI