Network Layers Threats its Countermeasures in WSNs
Title | Network Layers Threats its Countermeasures in WSNs |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Pruthi, Vardaan, Mittal, Kanika, Sharma, Nikhil, Kaushik, Ila |
Conference Name | 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) |
Publisher | IEEE |
ISBN Number | 978-1-7281-4826-7 |
Keywords | Blackhole attack, Blackhole Attack And Hello Flood Attac, dimensionally diffused nodes, hello flood attack, network layer intrusions, network layer threats, pubcrawl, reliable file exchange, resilience, Resiliency, Scalability, security countermeasures, security hazards, security requirements, selective forwarding attack, Sinkhole attack, Sybil attack, telecommunication network reliability, telecommunication security, Wireless sensor networks, wormhole attack, WSN |
Abstract | WSN can be termed as a collection of dimensionally diffused nodes which are capable of surveilling and analyzing their surroundings. The sensors are delicate, transportable and small in size while being economical at the same time. However, the diffused nature of these networks also exposes them to a variety of security hazards. Hence, ensuring a reliable file exchange in these networks is not an easy job due to various security requirements that must be fulfilled. In this paper we concentrate mainly on network layer threats and their security countermeasures to overcome the scope of intruders to access the information without having any authentication on the network layer. Various network layer intrusions that are discussed here include Sinkhole Attack, Sybil Attack, Wormhole Attack, Selective Forwarding Attack, Blackhole Attack And Hello Flood Attack. |
URL | https://ieeexplore.ieee.org/document/8974523 |
DOI | 10.1109/ICCCIS48478.2019.8974523 |
Citation Key | pruthi_network_2019 |
- security countermeasures
- WSN
- wormhole attack
- wireless sensor networks
- telecommunication security
- telecommunication network reliability
- Sybil attack
- Sinkhole attack
- selective forwarding attack
- security requirements
- security hazards
- Blackhole attack
- Scalability
- Resiliency
- resilience
- reliable file exchange
- pubcrawl
- network layer threats
- network layer intrusions
- hello flood attack
- dimensionally diffused nodes
- Blackhole Attack And Hello Flood Attac