Open Access Open Access  Restricted Access Subscription Access

Survey of Flooding and Gray Hole Attack in WSN

Ravi Parashar, Rajesh Singh

Abstract


Wireless Sensor Networks (WSN) is an emerging technology now-a-days and has a wide range of applications such as battlefield surveillance, traffic surveillance, forest fire detection, flood detection etc. But wireless sensor networks are susceptible to a variety of potential attacks which obstructs the normal operation of the network. The security of a wireless sensor network is compromised because of the random deployment of sensor nodes in open environment, memory limitations, power limitations and unattended nature. This paper focuses on various attacks that manifest in the network and provides a tabular representation of the attacks, their effects and severity. The paper depicts a comparison of attacks basis packet loss and packet corruption. Also, the paper discusses the known defence mechanisms and countermeasures against the attacks.

Keywords: Wireless sensor network, flooding attack, gray hole

 

Cite this Article
Ravi Parashar, Rajesh Singh. Survey of flooding and gray hole attack in WSN. Journal of Operating Systems Development & Trends. 2015; 2(3): 21–26p.


Full Text:

PDF

References


Yu Bo, Xiao Bin. Detecting Selective Forwarding Attacks in Wireless Sensor Networks. Proc. 20th International Parallel and Distributed Processing Symposium IPDPS 2006 (SSN2006). 2006; 25(29): 1–8p.

Maidamwar Priya, Chavhan Nekita. A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network. International Journal on Ad Hoc Networking Systems (IJANS). 2012; 2(4).

Virmani Deepali, Soni Ankita, Chandel Shringarica, Hemrajani Manas, Parshuram Bhagwan. Routing Attacks in Wireless Sensor Networks: A Survey. International Journal of Computer Science and Information Technologies. 2014; 5(2): 2665–2671p.

Mishra Dharmendra, Sukheja Deepak, Patel Sunil. A Review on Gray Hole Attack in Wireless Sensor Network. International Journal of Computer Applications. 2015; 122(2): 0975–8887p.

Demirbas Murat, Song Youngwhan. An RSSI-based scheme for Sybil attack detection in wireless sensor networks. Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks. ISBN: 0- 7695-2593-8.

Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, and Wang Liangmin. Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. 2009: 226–232p.

Hayajneh Thaier, Krishnamurthy Prashant, Tipper David. DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad hoc Networks. Third International Conference on Network and System Security IEEE. 2009.

Tumrongwittayapak Chanatip, Varakulsiripunth Ruttikorn. Detecting Sinkhole Attacks in Wireless Sensor Networks. ICROS-SICE International Joint Conference. 2009. 1966–1971p.

Sharmila S, Umamaheswari G. Detection of sinkhole Attack in Wireless Sensor Networks using Message Digest Algorithms. International Conference on Process Automation, Control and Computing (PACC). 2011: 1–6p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/