Visible to the public A Study on Security Attacks in Wireless Sensor Network

TitleA Study on Security Attacks in Wireless Sensor Network
Publication TypeConference Paper
Year of Publication2021
AuthorsKaur, Rajwinder, Kaur Sandhu, Jasminder
Conference Name2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
Date Publishedmar
KeywordsComputer hacking, machine learning, Network Security Architecture, pubcrawl, resilience, Resiliency, security, security attacks, sensor security, Task Analysis, Weather forecasting, Wireless communication, Wireless sensor networks
AbstractWireless Sensor Network (WSN)is the most promising area which is widely used in the field of military, healthcare systems, flood control, and weather forecasting system. In WSN every node is connected with another node and exchanges the information from one to another. While sending data between nodes data security is an important factor. Security is a vital issue in the area of networking. This paper addresses the issue of security in terms of distinct attacks and their solutions provided by the different authors. Whenever data is transferred from source to destination then it follows some route so there is a possibility of a malicious node in the network. It is a very difficult task to identify the malicious node present in the network. Insecurity intruder attacks on data packets that are transferred from one node to another node. While transferring the data from source to destination node hacker hacks the data and changes the actual data. In this paper, we have discussed the numerous security solution provided by the different authors and they had used the Machine Learning (ML) approach to handle the attacks. Various ML techniques are used to determine the authenticity of the node. Network attacks are elaborated according to the layer used for WSN architecture. In this paper, we will categorize the security attacks according to layer-wise and type-wise and represent the solution using the ML technique for handling the security attack.
DOI10.1109/ICACITE51222.2021.9404619
Citation Keykaur_study_2021