A Taxonomy of Internal Attacks in Wireless Sensor Network

Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.




References:
[1] X, Huang, M, Ahmed, D, Sharma, "The node became compromised
when an attacker gain control of the node that acts as a legitimate node,
after network deployment", 2011 Ninth IEEE/IFIP International
Conference on Embedded and Ubiquitous Computing. October 2011
Melbourne, Australia
[2] Y. Zhou, Y. Fang, and Y. Zhang, "Securing wireless sensor networks: a
survey," IEEE Communications Surveys & Tutorials, 3rd Quarter 2008.
[3] K. Lu et al., "A Framework for a Distributed Key Management Scheme
in Heterogeneous Wireless Sensor Networks", IEEE Transactions on
Wireless Communications, vol. 7, no. 2, Feb. 2008, pp. 639-647.
[4] https://www.eol.ucar.edu/rtf/facilities/isa/internal/CrossBow/DataSheets
/mica2.pdf, [accessed on November 24, 2011]
[5] http://sentilla.com/files/pdf/eol/Tmote_Mini_Datasheet.pdf, [accessed
on November 24, 2011].
[6] O. E. Ochirkhand, M. Marine, V. Fabrice and K. Apostotlos,
"Resiliency of Wireless Sensor Networks: Definitions and Analyses",
17th international conference on Telecommunications 2010.
[7] S. K. Singh, M. P. Singh, and D. K. Singh, "A Survey on Network
Security and Attack Defense Mechanism For Wireless Sensor
Networks", International Journal of Computer Trends and Technology-
May to June Issue 2011
[8] T. G. Lupu "Main Types of Attacks in Wireless Sensor Networks"
International Conference in Recent Advances in Signals and Systems
2009, ISSN: 1790-5109, ISBN: 978-960-474- 114-4.
[9] M.Y. Hsieh, Y. M. Huang, "Adaptive Security Modules in Incrementally
Deployed Sensor Networks", International Journal on Smart
Sensing and Intelligent Systems, vol. 1, no. 1, March 2008
[10] K. Sharma, M. K. Gosh, "Wireless Sensor Networks: An Overview on
its Security Threats", IJCA Special Issue on Mobile Ad-hoc Networks
MANETs, 2010.
[11] H. K. D. Sharma, A. Kar, "Security Threats in Wireless Sensor
Networks", Carnahan Conferences Security Technology, Proceedings
2006 40th Annual IEEE International.
[12] H. Ghamgin, M. S. Akhger, M. T. Jafari, Z. Branch, "Attackes in
wireless sensor networks", Australian journal of Basic and applied
Sciences, 2011.