Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:-Depending on global telecommunications humidity and air pressure. They additionally have a role to
networks and applying the concept of Internet of Things measure heart rate and levels of stress for
(IOT) in several applications led to make the need of patients.Accordingly, the scientists candeploythe sensors
wireless sensor networks (WSNs) higher than beforein capabilities, link the sensors to wireless networks and carry
order toachieve a set of basic requirements such as out the anticipated effectiveness of the tasks. Moreover,
connectivity with networks without human intervention. after the installation of wireless sensor networks, sensor
However, many challenges have appeared and node will take the role of self-organizing suitable network
madeWSNs to be targeted by many groups and infrastructure, processing data and routing in wireless sensor
institutions due toseveral advantageslike using such networks between sensor nodes. [2]Most of the sensor nods
networks for personal needs or to exploitthem in terms distribute in hostel filed with active intelligent opposition.[3]
of collecting data for analysis. Nowadays, the security Because of the limitation of the capacity, memory and
issues for WSN are one of the major challenges which power consuming, transferring the data throw wireless
acquire different types of security threats that may cause sensor networksbecome challenge. [1]Furthermore, the
or appear during the deployment of wireless sensors sensor node processes the data and my cause data
infrastructure. In addition to that, the restrictions in the manipulation, data fraud and replacement. [1]This study
process of energy consumption impose a big challenge specifically talks about the challenges in different kinds of
because of the slow progress in battery technology.Based attacks in WSN, the reliability, susceptibility for
on several detailed research papers and resources from programming andthe energy.
different aspects that are related to this issue,this paper
discusses the challenges which include differentkinds of II. ATTACKS IN WIRELESS SENSOR
attacks in WSNs, degree of reliability, energy and NETWORKS
susceptibility for programming.
Wireless sensor networks can be attacked or
Keywords:- WSN, IOT, Sensors, Challenges, Threats, exploitedthrough the weaknesses and their vulnerabilities
Attacks. due to the nature of transferring data between sensors/nods
and transmission medium. Wireless sensor networks’ attacks
I. INTRODUCTION have been classified as following:
ISSN No:-2456-2165
responds as result, all malware nodes will respond and that data to base station[6].For that reason, the wireless sensor
will make the neighbour node to confuse and breakdown the networks become vulnerable to this kind of attack. Fig.3
network[14]. shows the malware node when it attracts all the traffics from
its neighbor by telling them that it the shortest path to the
target node[6].
Fig. 1:-Showing how the Sybil/malware node establishes the Fig. 3:-A sinkhole attack
Sybil attack
B. Denial of Services (DoS) Attack
Black hole attack This kind of attack can be appearing due to failure
Malware node which pretend to have shortest action of nods or malicious activity and that cause subvert,
path in the network by broadcast to the nearby nods to disrupt and destroy the network. There are different kinds of
update their routing path to grab all the traffic in the Dos attack in different layers of OSI protocol and effect in
network. [4] while this node is in the network, the packages their functionality[3][5]. This attack may happen intwoways,
will not reach to the receiver because all the package are jamming the signal and power exhaustion[11]. For the
dropped by the malware node. Malware node start working jamming, it works by sending strong signal to destroy the
by wetting the nearby(victim) to send RREQ and once it exchanged message that flow between nodes in the network.
receives this message; will replay with error message RREP The idea ofpower exhaustion is to in destruct the role cycle
for the victim[4]. On that, it will increase the cost number of of sensor/node to loss the battery[11]. Denial of Services
that rout to be settled in the routing table of victim node path based happen as shown in Fig. 4.
before the true node replay with true and genuine message
[4] [6].Fig.2shows the malware node when it attracts all the
traffics from its neighbor and drop all the traffic of them.
[15]
ISSN No:-2456-2165
D. Susceptibility to programming
One of the main challenges that is needed to be
addressed is the viability of devices in the wireless sensor
networks to be programmed. That is given because of the
current sensor need from the user to participate in different
part of the programming cods where they must prepare and
equip communication between sensors and determine
assembly ways in addition to other functionalities [10] [22].
E. Real-Time communication
Fig. 5:- Establishing wormhole link between Wireless sensors network interacts with different
malware nodes. kinds of real world environments with variants of the
natures [10] [20] [21]. The accuracy of the time for
III. CHALLENGES OF WIRELESS SENSOR delivering packages on real- time is needed to take
NETWORKS appropriate observations which can help to take actions on
them. There are a small number of result have been find
Several kinds of challenges thatinterrupt or affect the regarding for real-time requirements in wireless sensors
performance of a wireless sensor network are presented as network. In case of take the real- time result in account,
follows: some of the protocols avoid it and the others try to make to
achieve the process before it passes the deadline.Accurate
A. Hostile Environment feedback and new results to guarantee real-time are
Deploying and spreading the wireless sensors is the requirements are necessary to be able to deal the realistic of
first stage of creating the infrastructure of the wireless wireless sensors network like lost messages, noise and
sensors networks. On that, they need to take care during the congestion. That will help to support different routing
distribution of the sensors to achieve the target protocols to enhance and to identify new services that can be
requirements. The Hostile nature of the target filed can used with this wireless network[2] [10] [24].
effect in the way of deploying the sensors. For that, the
sensors are vulnerable from different security attacks[13] IV. RECOMMENDATIONS
[18].
Nowadays, researchers focus on three different categories
B. Power Management to afford security for wireless sensors network; signature
Due to dependency in battery powered, it means management, routing security and authentication, and
the limitation amount of the energy even if there are services to deliver data safely. [17] [23] [24]The Security
additional power supplies, so that makes this challenge is requirements for the wireless sensors network does
ISSN No:-2456-2165
notaffect the flow of the work only, it’s also affect in the [2] Mahesh P., Kale G. and Jaywant A. “Review: Features,
availability of the resources in whole the network[17]. It is Protocols, Threats and Challenges of WSN”.International
very important to understand this kind of requirements in Journal of Advanced Research in Computer Science and
order to be able to handle the errors that can happened Software Engineering (IJARCSSE2016), ISSN: 2277 128X,
during the communication [17].The main requirements Volume 6, Issue 3, March 2016.
that are needed to be considered are data integrity, data
[3] Padmavathi G. and Shanmugapriya D. “A Survey of
availability, data confidentiality and data authentication.
Attacks, Security Mechanisms and
There are many techniques to insure this kind of
requirements like Watermarking technique witch insure Challenges in Wireless Sensor Networks” International
the integrity and authenticity of the wireless sensors Journal of Computer Science and Information Security
network. Watermarking is the most popular technique for (IJCSIS), ISSN 1947-5500, Vol. 4, No. 1 & 2, 2009.
this purpose which prevents the packets to be
[4] Virmani D., Soni A., Chandel S. and Hemrajani M.
intercepted.Fig. 6 shows how this techniqueworks [16].
“Routing Attacks in Wireless Sensor Networks: A Survey”
Intrusion detection system is one the powerful technique
International Journal of Computer Science and Information
that can used in wireless networks which have the ability
Technologies (IJCSIT), ISSN: 0975-9646, Vol. 5 (2), 2014.
of differentiating between the activities of the node if it is
normal or abnormal in order to define the malware nodes [5] Roopak M., bhardwaj T., Soni S. and Batra G. “Review
[17]. For preventing from different attaches, there are of Threats in Wireless Sensor Networks”. International
many techniques and mechanism that can be used in order Journal of Computer Science and Information Technologies
to prevent many attacks [18][19].For preventing from (IJCSIT), ISSN: 0975-9646. Vol. 5(1), 2014.
Denial of Services,message, encryption and authorization
mechanism can be used.Also, for wormhole attack, [6] Keerthana G., Padmavathi G. “Detecting Sinkhole
Dawwsen proactive routing protocols can be used which Attack in Wireless Sensor Network using Enhanced Particle
are involved in data link layer of OSI model. Sybil attack Swarm Optimization Technique”. International Journal of
candefenseagainst them by using ID certificatesfor the Security and Its Applications. Vol. 10, No. 3 (2016), pp.41-
nodes [18]. 54
[7] Virendra Pal Singh V., Jain S. and Singhai J. “Hello
Flood Attack and its Countermeasures in Wireless Sensor
Networks”. International Journal of Computer Science
Issues (IJCSI). ISSN: 1694-0784, Vol. 7, Issue 3, No 11,
May 2010.
[8] Shree and Khan R. “Wormhole Attack in Wireless
Sensor Network”. International Journal of Computer
Networks and Communications Security (IJCNCS). ISSN:
2308-9830, vol.2, no.1, 2014, pp.22–26.
[9] Gupta A., Rautela B. and Kumar B. “Power
Management in Wireless Sensor Networks”. International
Fig. 6:-Watermarking technique Journal of Advanced Research in Computer Science and
Software Engineering. ISSN: 2277-128X, Volume 4, Issue
V. CONCLUSION 4, April 2014.
[10] Stankovic J. “Research Challenges for Wireless Sensor
In conclusion, every new technology is exposed to different Networks”.ACM SIGBED Review - Special issue on
kind of attacks, threats and challenges. Providing the privacy embedded sensor networks and wireless computing, July
in such wireless sensor networks is a vital need in the 2004,pp. 9-12.
network against the attacks.The nature of network
deployment area can affect different features of WSNs. [11] Vidya M and Reshmi S. “Denial of Service Attacks in
Also, power consumption is still considered as a big Wireless Sensor Networks” ISSN: 2319-2526, Volume -3,
challenge that has a lot of limitations in performance of the Issue -2, 2014.
wireless sensors.
[12] Abirami.K and Santhi.B. “Sybil attack in Wireless
Sensor Network”. International Journal of Engineering and
REFERENCES
Technology (IJET). ISSN: 0975-4024, Vol 5 No 2, Apr-May
[1] Potins A. and Rajeshwari C. “Wireless Sensor Network: 2013.
Challenges, Issues and Research” International Conference [13] Kumar V., Jain A. and Bareal P. “Wireless Sensor
on Future Computational Technologies (ICFCT'2015), Networks: Security Issues, Challenges and Solutions”.
ISBN 978-93-4468-20-0, Issue March 29-30, 2015, pp.224 - International Journal of Information & Computation
228.
ISSN No:-2456-2165