You are on page 1of 5

Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Review of Wireless Sensor Networks: Challenges and


Threats
Ahmed R. Al-Breiki1, HothefaS. Jassim2, Baraa T. Sharef3and Zeyad T. Sharef4

Network and system administration specialist, Information TechnologyAuthority (ITA), Oman1

Modern College of Business & Science Al-Khuwair | 133, Muscat, Oman2

College of Information Technology, Ahlia University, Manama, Bahrain3

College of Engineering, Ahlia University, Manama, Bahrain4

Abstract:-Depending on global telecommunications humidity and air pressure. They additionally have a role to
networks and applying the concept of Internet of Things measure heart rate and levels of stress for
(IOT) in several applications led to make the need of patients.Accordingly, the scientists candeploythe sensors
wireless sensor networks (WSNs) higher than beforein capabilities, link the sensors to wireless networks and carry
order toachieve a set of basic requirements such as out the anticipated effectiveness of the tasks. Moreover,
connectivity with networks without human intervention. after the installation of wireless sensor networks, sensor
However, many challenges have appeared and node will take the role of self-organizing suitable network
madeWSNs to be targeted by many groups and infrastructure, processing data and routing in wireless sensor
institutions due toseveral advantageslike using such networks between sensor nodes. [2]Most of the sensor nods
networks for personal needs or to exploitthem in terms distribute in hostel filed with active intelligent opposition.[3]
of collecting data for analysis. Nowadays, the security Because of the limitation of the capacity, memory and
issues for WSN are one of the major challenges which power consuming, transferring the data throw wireless
acquire different types of security threats that may cause sensor networksbecome challenge. [1]Furthermore, the
or appear during the deployment of wireless sensors sensor node processes the data and my cause data
infrastructure. In addition to that, the restrictions in the manipulation, data fraud and replacement. [1]This study
process of energy consumption impose a big challenge specifically talks about the challenges in different kinds of
because of the slow progress in battery technology.Based attacks in WSN, the reliability, susceptibility for
on several detailed research papers and resources from programming andthe energy.
different aspects that are related to this issue,this paper
discusses the challenges which include differentkinds of II. ATTACKS IN WIRELESS SENSOR
attacks in WSNs, degree of reliability, energy and NETWORKS
susceptibility for programming.
Wireless sensor networks can be attacked or
Keywords:- WSN, IOT, Sensors, Challenges, Threats, exploitedthrough the weaknesses and their vulnerabilities
Attacks. due to the nature of transferring data between sensors/nods
and transmission medium. Wireless sensor networks’ attacks
I. INTRODUCTION have been classified as following:

Undeniably, technology is considered as the vain of A. Routing Attack


life. Recently, there is a huge explosion of technology Routing attack occurs in network layer while
development and revolution. Many devices have been routing the package. There are different kinds of routing
invented to facilitate the human being’s life. One of these attacks, they are discussed as follows:
crucial technologies is wireless sensor networks.
WSNscreate a scientific revolution in the field of wireless  Sybil attack
communications, which make global manufacturing Assign multi fake-identification for many
companies ofthese devices that tend to rely on making a nods while using them in many alternative paths in the
small hardware volume with capabilities of wireless network [3][4][12]. Usually, this kind of attack harm peer-
connection. Also, they can be easily installed in the devices. to-peer systems and create vulnerable points on them like
WSNs have been distributed and gaining popular in every vehicular Ad hoc Network(VANET) [4]. Also, Sybil attack
fields like military, environment monitoring, healthcare and can attack geographical routing protocol and location based
traffic management.[1] TheWSNs can directly interact with routing protocol because of using multipath routing. [12].
the surrounding environment through sensors, which can Fig.1 shows the Sybil attack where one of the malware node
recognize the physical phenomena such as high temperature, IDused to connect to their neighbour[14]. When the node

IJISRT18FB234 www.ijisrt.com 980


Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

responds as result, all malware nodes will respond and that data to base station[6].For that reason, the wireless sensor
will make the neighbour node to confuse and breakdown the networks become vulnerable to this kind of attack. Fig.3
network[14]. shows the malware node when it attracts all the traffics from
its neighbor by telling them that it the shortest path to the
target node[6].

Fig. 1:-Showing how the Sybil/malware node establishes the Fig. 3:-A sinkhole attack
Sybil attack
B. Denial of Services (DoS) Attack
 Black hole attack This kind of attack can be appearing due to failure
Malware node which pretend to have shortest action of nods or malicious activity and that cause subvert,
path in the network by broadcast to the nearby nods to disrupt and destroy the network. There are different kinds of
update their routing path to grab all the traffic in the Dos attack in different layers of OSI protocol and effect in
network. [4] while this node is in the network, the packages their functionality[3][5]. This attack may happen intwoways,
will not reach to the receiver because all the package are jamming the signal and power exhaustion[11]. For the
dropped by the malware node. Malware node start working jamming, it works by sending strong signal to destroy the
by wetting the nearby(victim) to send RREQ and once it exchanged message that flow between nodes in the network.
receives this message; will replay with error message RREP The idea ofpower exhaustion is to in destruct the role cycle
for the victim[4]. On that, it will increase the cost number of of sensor/node to loss the battery[11]. Denial of Services
that rout to be settled in the routing table of victim node path based happen as shown in Fig. 4.
before the true node replay with true and genuine message
[4] [6].Fig.2shows the malware node when it attracts all the
traffics from its neighbor and drop all the traffic of them.
[15]

Fig.4:- Path-based DoS attack

C. Hello Flood Attack


Fig. 2:- Black Hole attack In normal situation of the network, every node once
itattaches to a network will broadcast hello message to
 Sinkhole announce themselves to nodes inside the network[7]. For the
The mechanism of this attack is by putting neighbour node of that nodes, will assume that node is
attractive node inside a network to be more popular to the within rang. However, some times that assumption is false
nodes. [3] This kind of attack occurs inside the network after because some hackers (malware node) broadcast that
the intruder/hacker compromises a node (malware node) in message with large power which can be enough to convince
the network and activates the attack. After the malware node all neighbour nodes that the malwarenode is a neighbour for
settles down in the network, it will try to reach to the entire them[4][7].
neighbor node's traffic to lunches attack on them by exploit
the communication way of wireless sensor while sending the

IJISRT18FB234 www.ijisrt.com 981


Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

D. Wormholes Attack very critical[2][9]. For these restrictions, there are


This is one of the severe kinds of attack that expectations to solve this kind of problem but it seems that
targeting this kind of network. This attack starts by create the restrictions in consuming the power impose big
high-speed channel between two or mode nodes called challenges because of the slow progress in battery
wormhole link [8]. Fig. 5 shows wormhole link [8] [22].In technology [2] [10].
this attack, the twoends of the wormhole link forms channel
to send package and replay that package inside the network C. Security and Privacy
[7][8].By that, the attacker/malware node will increase their The wireless sensors network contrasts traditional
position in the network [8]. That can be represent in Fig.5. networks, sensors are usually deployed in the open and
This kind of attack can effect in routing protocol like exposed areas of environmental changes, sothe sensors are
AODV, DSDV and DSR [7][8].The effect can be prone to direct attacks [10].There are many elements that
representing while the malware node tunnel (using need to be taken into account when dealing with sensor
wormhole link) every RREQ message to another malware networks including the degree of reliability, security and
node which is very close to the destination node of that privacy. For the wireless sensors, usually suffer from
request [7]. The neighbours dynamically will rebroadcast transmission error or reception error which can be caused by
this RREQ once they hear the request and will ignore other the collision or traffic in the network. Moreover, the nodes
RREQ message that they received [7]. Additional to itself prone to failure due to either malfunction or
effecting on routing protocol, this attack can change the intervention. The nodes of this kind of network interact with
topology of the network. Also, the malware node can change surround nodes and people which make other security
message streaming, district and alter the packages. problems [10]. In addition, securing the wireless
communication, Transmission and the environment of the
network become more challenges with the different types of
attacks [2] [10].

D. Susceptibility to programming
One of the main challenges that is needed to be
addressed is the viability of devices in the wireless sensor
networks to be programmed. That is given because of the
current sensor need from the user to participate in different
part of the programming cods where they must prepare and
equip communication between sensors and determine
assembly ways in addition to other functionalities [10] [22].

E. Real-Time communication
Fig. 5:- Establishing wormhole link between Wireless sensors network interacts with different
malware nodes. kinds of real world environments with variants of the
natures [10] [20] [21]. The accuracy of the time for
III. CHALLENGES OF WIRELESS SENSOR delivering packages on real- time is needed to take
NETWORKS appropriate observations which can help to take actions on
them. There are a small number of result have been find
Several kinds of challenges thatinterrupt or affect the regarding for real-time requirements in wireless sensors
performance of a wireless sensor network are presented as network. In case of take the real- time result in account,
follows: some of the protocols avoid it and the others try to make to
achieve the process before it passes the deadline.Accurate
A. Hostile Environment feedback and new results to guarantee real-time are
Deploying and spreading the wireless sensors is the requirements are necessary to be able to deal the realistic of
first stage of creating the infrastructure of the wireless wireless sensors network like lost messages, noise and
sensors networks. On that, they need to take care during the congestion. That will help to support different routing
distribution of the sensors to achieve the target protocols to enhance and to identify new services that can be
requirements. The Hostile nature of the target filed can used with this wireless network[2] [10] [24].
effect in the way of deploying the sensors. For that, the
sensors are vulnerable from different security attacks[13] IV. RECOMMENDATIONS
[18].
Nowadays, researchers focus on three different categories
B. Power Management to afford security for wireless sensors network; signature
Due to dependency in battery powered, it means management, routing security and authentication, and
the limitation amount of the energy even if there are services to deliver data safely. [17] [23] [24]The Security
additional power supplies, so that makes this challenge is requirements for the wireless sensors network does

IJISRT18FB234 www.ijisrt.com 982


Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

notaffect the flow of the work only, it’s also affect in the [2] Mahesh P., Kale G. and Jaywant A. “Review: Features,
availability of the resources in whole the network[17]. It is Protocols, Threats and Challenges of WSN”.International
very important to understand this kind of requirements in Journal of Advanced Research in Computer Science and
order to be able to handle the errors that can happened Software Engineering (IJARCSSE2016), ISSN: 2277 128X,
during the communication [17].The main requirements Volume 6, Issue 3, March 2016.
that are needed to be considered are data integrity, data
[3] Padmavathi G. and Shanmugapriya D. “A Survey of
availability, data confidentiality and data authentication.
Attacks, Security Mechanisms and
There are many techniques to insure this kind of
requirements like Watermarking technique witch insure Challenges in Wireless Sensor Networks” International
the integrity and authenticity of the wireless sensors Journal of Computer Science and Information Security
network. Watermarking is the most popular technique for (IJCSIS), ISSN 1947-5500, Vol. 4, No. 1 & 2, 2009.
this purpose which prevents the packets to be
[4] Virmani D., Soni A., Chandel S. and Hemrajani M.
intercepted.Fig. 6 shows how this techniqueworks [16].
“Routing Attacks in Wireless Sensor Networks: A Survey”
Intrusion detection system is one the powerful technique
International Journal of Computer Science and Information
that can used in wireless networks which have the ability
Technologies (IJCSIT), ISSN: 0975-9646, Vol. 5 (2), 2014.
of differentiating between the activities of the node if it is
normal or abnormal in order to define the malware nodes [5] Roopak M., bhardwaj T., Soni S. and Batra G. “Review
[17]. For preventing from different attaches, there are of Threats in Wireless Sensor Networks”. International
many techniques and mechanism that can be used in order Journal of Computer Science and Information Technologies
to prevent many attacks [18][19].For preventing from (IJCSIT), ISSN: 0975-9646. Vol. 5(1), 2014.
Denial of Services,message, encryption and authorization
mechanism can be used.Also, for wormhole attack, [6] Keerthana G., Padmavathi G. “Detecting Sinkhole
Dawwsen proactive routing protocols can be used which Attack in Wireless Sensor Network using Enhanced Particle
are involved in data link layer of OSI model. Sybil attack Swarm Optimization Technique”. International Journal of
candefenseagainst them by using ID certificatesfor the Security and Its Applications. Vol. 10, No. 3 (2016), pp.41-
nodes [18]. 54
[7] Virendra Pal Singh V., Jain S. and Singhai J. “Hello
Flood Attack and its Countermeasures in Wireless Sensor
Networks”. International Journal of Computer Science
Issues (IJCSI). ISSN: 1694-0784, Vol. 7, Issue 3, No 11,
May 2010.
[8] Shree and Khan R. “Wormhole Attack in Wireless
Sensor Network”. International Journal of Computer
Networks and Communications Security (IJCNCS). ISSN:
2308-9830, vol.2, no.1, 2014, pp.22–26.
[9] Gupta A., Rautela B. and Kumar B. “Power
Management in Wireless Sensor Networks”. International
Fig. 6:-Watermarking technique Journal of Advanced Research in Computer Science and
Software Engineering. ISSN: 2277-128X, Volume 4, Issue
V. CONCLUSION 4, April 2014.
[10] Stankovic J. “Research Challenges for Wireless Sensor
In conclusion, every new technology is exposed to different Networks”.ACM SIGBED Review - Special issue on
kind of attacks, threats and challenges. Providing the privacy embedded sensor networks and wireless computing, July
in such wireless sensor networks is a vital need in the 2004,pp. 9-12.
network against the attacks.The nature of network
deployment area can affect different features of WSNs. [11] Vidya M and Reshmi S. “Denial of Service Attacks in
Also, power consumption is still considered as a big Wireless Sensor Networks” ISSN: 2319-2526, Volume -3,
challenge that has a lot of limitations in performance of the Issue -2, 2014.
wireless sensors.
[12] Abirami.K and Santhi.B. “Sybil attack in Wireless
Sensor Network”. International Journal of Engineering and
REFERENCES
Technology (IJET). ISSN: 0975-4024, Vol 5 No 2, Apr-May
[1] Potins A. and Rajeshwari C. “Wireless Sensor Network: 2013.
Challenges, Issues and Research” International Conference [13] Kumar V., Jain A. and Bareal P. “Wireless Sensor
on Future Computational Technologies (ICFCT'2015), Networks: Security Issues, Challenges and Solutions”.
ISBN 978-93-4468-20-0, Issue March 29-30, 2015, pp.224 - International Journal of Information & Computation
228.

IJISRT18FB234 www.ijisrt.com 983


Volume 3, Issue 2, February – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Technology. ISSN 0974-2239, Volume 4, Number 8 (2014),


pp. 859-868
[14] Manjunatha T., Sushma M. andShiva K. “Security
Concepts and Sybil Attack Detection in Wireless Sensor
Networks”. International Journal of Emerging Trends and
Technology in Computer Science. ISSN 2278-6856 Volume
2, Issue 2, March – April 2013, pp 383-390.
[15] Baviskar B. and Patil V. “Black Hole Attacks
Mitigation and Prevention in Wireless Sensor Network”.
International Journal of Innovative Research in Advanced
Engineering. ISSN: 2349-2163, Volume 1 Issue 4, May
2014, pp 167-169.
[16] Sun X., Su J., Wang B. and liu Q. “Digital
Watermarking Method for Data Integrity Protection in
Wireless Sensor Networks”. International Journal of
Security and Its Applications.Vol. 7, No. 4, July2013, pp
407-416.
[17] Ali S. “Intrusion Detection System in Wireless Sensor
Networks”.International Journal of Science and Research.
ISSN: 2319-7064, Volume 4 Issue 7, July 2015, pp 1052-
1058.
[18] Sharma K. and Ghose M. “Wireless Sensor Networks:
An Overview on its Security Threats”. International Journal
of Computer ApplicationsSpecial Issue on MANET, 2010,
pp 42-45.
[19]SR Al Dhabooni, HS Jassim, ZT Sharef and BT Sharef.
“Survey: Security Attacks in Wireless Sensor Networks”.
International Advanced Research Journal in Science,
Engineering and Technology, 2017.
[20] KA Rasbi, H Shaker and ZT Sharef. “Survey on Data-
Centric based Routing Protocols for Wireless Sensor
Networks”. International Journal of Electrical, Electronics
and Computers, 2017, pp.9-16.
[21] BT Sharef, RA Alsaqour and M Ismail.“Vehicular
communication ad hoc routing protocols: A survey”.Journal
of network and computer applications, 2014, pp. 363-396.
[22] ZT Sharef, AE Alaradi and BT Sharef. "Performance
evaluation for WiMAX 802.16e OFDMA physical
layer”. IEEE Proceedings of Fourth International
Conference on Computational Intelligence, Communication
systems, and Networks, 2012, pp. 351-355.
[23] B Tariq, R Alsaqour, M Alawi, M Abdelhaq and E
Sundararajan. “Robust and trust dynamic mobile gateway
selection in heterogeneous vanet-umts network”, Vehicular
Communications, 2018.
[24] BT Sharef, RA Alsaqour, M Ismail and SM Bilal. “A
comparison of various vehicular ad hoc routing protocols
based on communication environments”. In ACM
Proceedings of the 7th International Conference on
Ubiquitous Information Management and Communication,
2013, p. 48.

IJISRT18FB234 www.ijisrt.com 984

You might also like