Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31903
A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar


Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: Wireless Sensor Network (WSN), Wireless Network Attacks, Wireless Network Security.

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2680


[1] F. Oldewurtel and P. Mahonen. Neural Wireless Sensor Networks. ICSNC, 0:28, 2006.
[2] M. Govindrajan, P. Balamurugan, “Wireless Sensor Network: A Survey,” International Journal of Computer Networks and Wireless Communication (IJCNWC), vol 2, issue 5, October 2012.
[3] S. Umrao, A. Kumar, P. Umrao, "Security attacks and their countermeasures along with node replication attack for time synchronization in wireless sensor network," International conference on Advanced Nanomaterials and Emerging Engineering Technologies (ICANMEET), pp.576-581, July 2013.
[4] K. R. Begam, M. S. Devi, “A complete Survey on Facts and Attacks in Wireless Sensor Network,” International Journal of Science and Research (IJSR), vol 3, issue 3, March 2014.
[5] M. Riecker, D. Thies, M. Hollick, "Measuring the impact of denial-of-service attacks on wireless sensor networks," IEEE 39th Conference on Local Computer Networks (LCN), pp.296-304, September 2014.
[6] A. Tayebi, S. Berber, A. Swain, "Wireless Sensor Network attacks: An overview and critical analysis," Seventh International Conference on Sensing Technology (ICST), pp. 97-102, December 2013.
[7] Xu Huang, M. Ahmed, D. Sharma, "Protecting from Inside Attacks in Wireless Sensor Networks," IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), pp. 186-191, December 2011.
[8] M. V. Ramesh, A. B. Raj, T. Hemalatha, "Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks," Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 783-787, November 2012.
[9] S. Prasanna, S. Rao, “An Overview of Wireless Sensor Networks Application and Security,” International Journal of Soft Computing and Engineering (IJSCE), vol. 2, issue 2, May 2012.
[10] S. Gupta, H. K. Verma, “Security Attacks & Prerequisite for Wireless Sensor Network,” Internation Journal of Engineering and Advanced Technology (IJEAT), vol. 2, issue 5, June 2013.
[11] A. Muruganandam, P. Bagyalakshmi, “A Study on Threats in Wireless Sensor Network,” International Journal of Science and Research (IJSR), vol. 3, issue 3, March 2014.
[12] K. Venkatraman, J. V. Deniel, G. Murugaboopathi, “Various Attacks in Wireless Sensor Network: Survey,” International Journal of Soft Computing and Engineering (IJSCE), vol 3, issue 1, March 2013.
[13] B. K. Mishra, M.C. Nikam, P. Lakkadwala, "Security against Black Hole Attack in Wireless Sensor Network - A Review," Fourth International Conference on Communication Systems and Network Technologies (CSNT), pp. 615-620, April 2014.
[14] L. K. Bysani, A. K. Turuk, "A Survey on Selective Forwarding Attack in Wireless Sensor Networks," International Conference onDevices and Communications (ICDeCom), pp.1-5, Ferbuary 2011
[15] Qi Jin, Hong Tang, XiaohuiKuang, Qiang Liu, "Detection and defence of Sinkhole attack in Wireless Sensor Network," 2012 IEEE 14th International Conference onCommunication Technology (ICCT), pp. 809-813, November 2012.
[16] D. Buch, D. Jinwala, “Detection of Wormhole attacks in Wireless Sensor Network,” 3rd International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2011), pp. 7-14, November 2011.
[17] B. Veeramulllu, S. Sathiya, Ch. LavanyaSusanna, “Confidentiality in Wireless Sensor Network,” International Journal of Soft Computing and Engineering (IJSCE), vol. 2, issue 6, January 2013.
[18] M. M. Patel, A. Aggarwal, "Security attacks in wireless sensor networks: A survey," International Conference on Intelligent Systems and Signal Processing (ISSP), pp. 329-333, March 2013.