Visible to the public Network Layers Threats its Countermeasures in WSNs

TitleNetwork Layers Threats its Countermeasures in WSNs
Publication TypeConference Paper
Year of Publication2019
AuthorsPruthi, Vardaan, Mittal, Kanika, Sharma, Nikhil, Kaushik, Ila
Conference Name2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
PublisherIEEE
ISBN Number978-1-7281-4826-7
KeywordsBlackhole attack, Blackhole Attack And Hello Flood Attac, dimensionally diffused nodes, hello flood attack, network layer intrusions, network layer threats, pubcrawl, reliable file exchange, resilience, Resiliency, Scalability, security countermeasures, security hazards, security requirements, selective forwarding attack, Sinkhole attack, Sybil attack, telecommunication network reliability, telecommunication security, Wireless sensor networks, wormhole attack, WSN
Abstract

WSN can be termed as a collection of dimensionally diffused nodes which are capable of surveilling and analyzing their surroundings. The sensors are delicate, transportable and small in size while being economical at the same time. However, the diffused nature of these networks also exposes them to a variety of security hazards. Hence, ensuring a reliable file exchange in these networks is not an easy job due to various security requirements that must be fulfilled. In this paper we concentrate mainly on network layer threats and their security countermeasures to overcome the scope of intruders to access the information without having any authentication on the network layer. Various network layer intrusions that are discussed here include Sinkhole Attack, Sybil Attack, Wormhole Attack, Selective Forwarding Attack, Blackhole Attack And Hello Flood Attack.

URLhttps://ieeexplore.ieee.org/document/8974523
DOI10.1109/ICCCIS48478.2019.8974523
Citation Keypruthi_network_2019