Sensor Networks Attacks Classifications and Mitigation
Journal Title: Annals of Emerging Technologies in Computing - Year 2018, Vol 2, Issue 4
Abstract
Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without physical guarding duty. That makes the network susceptible to physical attacks. The communication nature between sensor nodes is another reason, where intruders can easily send/receive information if they are located in the network communication range. In this paper, most of the possible WSN attacks are discussed, different security services expected in WSN are explained, and trust-based solutions proposed in the literature are listed. Moreover, the state-of-the-art of the attacks’ mitigation and avoidance techniques are presented. Besides, this paper is enriched with a new classification of the WSNs attacks regarding attacks’ characteristics. It will be beneficial to researchers in the field of WSNs security if they can distinguish between different attacks that have common characteristics.
Authors and Affiliations
Ahmed S. Abu Daia, Rabie A. Ramadan, Magda B. Fayek
Applications of Blockchain Technology beyond Cryptocurrency
Blockchain (BC), the technology behind the Bitcoin crypto-currency system, is considered to be both alluring and critical for ensuring enhanced security and (in some implementations, non-traceable) privacy for diverse ap...
Consideration of Quality Attribute Tradeoffs of the Blockchain Pattern in the Software Development Process
The Blockchain (BC) design pattern has many variations and is a concept that is anticipated to lead many implementations in the years to come. The number of choices for a BC implementation continues to increase since new...
Mobile Assisted Language Learning (MALL) – A Brief Survey
This research article presents a brief survey of language learning applications implemented on mobile computing devices, such as cellular mobile phones. The corpus of the literature show the efficacy and effectiveness of...
Ideal Node Enquiry Search Algorithm (INESH) in MANETS
The different routing protocols in Mobile Ad hoc Networks take after various methodologies to send the data starting from one node then onto the next. The nodes in the system are non-static and they move arbitrarily and...
Cultural, Economic and Societal Impacts on Users’ Behaviour and Mobile Broadband Adoption Trends
The diverse range of Internet enabled devices both mobile and fixed has not only impacted the global economy but the very fabric of human communications and lifestyles. The ease of access and lowered cost has enabled hit...