DeepAI
Log In Sign Up

An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques

Wireless Sensor Network (WSN) is the network of the future. As it gradually gains ground by transforming our lives and environments into a Smart World, it will definitely call for attention from selfish minded Attackers. The first section of this paper introduces the Wireless Sensor Network, its constraints, architecture, and mode of operation. It goes ahead to discuss the applications of WSN in health, agriculture, military, transportation, environment, industries. However, WSN automatically inherits the security challenges of the traditional network. The Network security goals which are Confidentiality, Integrity, Availability, and Authentication sometimes called the CIA of Network security is discussed with respect to WSN. This is followed by the security challenges of WSN, these challenges are categorized into two (2), Passive and Active Attacks, Passive attack is interested in the message, data or information that traverses the network without hindering the network channel or medium of communication while Active attack is interested in both the data as well as compromising and if possible shutting down the communication channel in order to hinders the smooth running of the network. In line with these security challenges, mitigation techniques are proffered to possibly prevent or lessen the severity of the attacks as its almost impossible to stop attackers from carrying out their malicious activities.

READ FULL TEXT

page 1

page 2

page 3

page 4

07/09/2020

Security in Wireless Sensor Networks: Issues and Challenges

A wireless sensor network (WSN) has important applications such as remot...
04/14/2021

Phishing Mitigation Techniques: A Literature Survey

Email is a channel of communication which is considered to be a confiden...
07/25/2017

Applications of Economic and Pricing Models for Wireless Network Security: A Survey

This paper provides a comprehensive literature review on applications of...
11/10/2017

Providing Physical Layer Security for Mission Critical Machine Type Communication

The design of wireless systems for Mission Critical Machine Type Communi...
07/26/2022

On the Security of IO-Link Wireless Communication in the Safety Domain

Security is an essential requirement of Industrial Control System (ICS) ...
07/14/2020

Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band

Nanoscale communication systems operating in Ter-ahertz (THz) band are a...