A Taxonomy of Internal Attacks in Wireless Sensor Network
Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
[1] X, Huang, M, Ahmed, D, Sharma, "The node became compromised
when an attacker gain control of the node that acts as a legitimate node,
after network deployment", 2011 Ninth IEEE/IFIP International
Conference on Embedded and Ubiquitous Computing. October 2011
Melbourne, Australia
[2] Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a
survey," IEEE Communications Surveys & Tutorials, 3rd Quarter 2008.
[3] K. Lu et al., "A Framework for a Distributed Key Management Scheme
in Heterogeneous Wireless Sensor Networks", IEEE Transactions on
Wireless Communications, vol. 7, no. 2, Feb. 2008, pp. 639-647.
[4] https://www.eol.ucar.edu/rtf/facilities/isa/internal/CrossBow/DataSheets
/mica2.pdf, [accessed on November 24, 2011]
[5] http://sentilla.com/files/pdf/eol/Tmote_Mini_Datasheet.pdf, [accessed
on November 24, 2011].
[6] O. E. Ochirkhand, M. Marine, V. Fabrice and K. Apostotlos,
"Resiliency of Wireless Sensor Networks: Definitions and Analyses",
17th international conference on Telecommunications 2010.
[7] S. K. Singh, M. P. Singh, and D. K. Singh, "A Survey on Network
Security and Attack Defense Mechanism For Wireless Sensor
Networks", International Journal of Computer Trends and Technology-
May to June Issue 2011
[8] T. G. Lupu "Main Types of Attacks in Wireless Sensor Networks"
International Conference in Recent Advances in Signals and Systems
2009, ISSN: 1790-5109, ISBN: 978-960-474- 114-4.
[9] M.Y. Hsieh, Y. M. Huang, "Adaptive Security Modules in Incrementally
Deployed Sensor Networks", International Journal on Smart
Sensing and Intelligent Systems, vol. 1, no. 1, March 2008
[10] K. Sharma, M. K. Gosh, "Wireless Sensor Networks: An Overview on
its Security Threats", IJCA Special Issue on Mobile Ad-hoc Networks
MANETs, 2010.
[11] H. K. D. Sharma, A. Kar, "Security Threats in Wireless Sensor
Networks", Carnahan Conferences Security Technology, Proceedings
2006 40th Annual IEEE International.
[12] H. Ghamgin, M. S. Akhger, M. T. Jafari, Z. Branch, "Attackes in
wireless sensor networks", Australian journal of Basic and applied
Sciences, 2011.
[1] X, Huang, M, Ahmed, D, Sharma, "The node became compromised
when an attacker gain control of the node that acts as a legitimate node,
after network deployment", 2011 Ninth IEEE/IFIP International
Conference on Embedded and Ubiquitous Computing. October 2011
Melbourne, Australia
[2] Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a
survey," IEEE Communications Surveys & Tutorials, 3rd Quarter 2008.
[3] K. Lu et al., "A Framework for a Distributed Key Management Scheme
in Heterogeneous Wireless Sensor Networks", IEEE Transactions on
Wireless Communications, vol. 7, no. 2, Feb. 2008, pp. 639-647.
[4] https://www.eol.ucar.edu/rtf/facilities/isa/internal/CrossBow/DataSheets
/mica2.pdf, [accessed on November 24, 2011]
[5] http://sentilla.com/files/pdf/eol/Tmote_Mini_Datasheet.pdf, [accessed
on November 24, 2011].
[6] O. E. Ochirkhand, M. Marine, V. Fabrice and K. Apostotlos,
"Resiliency of Wireless Sensor Networks: Definitions and Analyses",
17th international conference on Telecommunications 2010.
[7] S. K. Singh, M. P. Singh, and D. K. Singh, "A Survey on Network
Security and Attack Defense Mechanism For Wireless Sensor
Networks", International Journal of Computer Trends and Technology-
May to June Issue 2011
[8] T. G. Lupu "Main Types of Attacks in Wireless Sensor Networks"
International Conference in Recent Advances in Signals and Systems
2009, ISSN: 1790-5109, ISBN: 978-960-474- 114-4.
[9] M.Y. Hsieh, Y. M. Huang, "Adaptive Security Modules in Incrementally
Deployed Sensor Networks", International Journal on Smart
Sensing and Intelligent Systems, vol. 1, no. 1, March 2008
[10] K. Sharma, M. K. Gosh, "Wireless Sensor Networks: An Overview on
its Security Threats", IJCA Special Issue on Mobile Ad-hoc Networks
MANETs, 2010.
[11] H. K. D. Sharma, A. Kar, "Security Threats in Wireless Sensor
Networks", Carnahan Conferences Security Technology, Proceedings
2006 40th Annual IEEE International.
[12] H. Ghamgin, M. S. Akhger, M. T. Jafari, Z. Branch, "Attackes in
wireless sensor networks", Australian journal of Basic and applied
Sciences, 2011.
@article{"International Journal of Electrical, Electronic and Communication Sciences:60093", author = "Muhammad R Ahmed and Xu Huang and Dharmendra Sharma", title = "A Taxonomy of Internal Attacks in Wireless Sensor Network", abstract = "Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.", keywords = "Wireless sensor network, internal attacks, security,
OSI model.", volume = "6", number = "2", pages = "226-4", }