A Survey on Wireless Sensor Networks Attacks

File Size:
914.87 kB
Volume 4, Issue 5 (May, 2018)
Publication No:
Simranjit Kaur, Maninder Kaur, Vijay Paul Singh
7 x

Wireless sensor nodes gathers vital information from environment. Authentication, confidentiality and integrity plays the significant role in order to provide the secure communication between the sensor nodes and a sink node. Authentication mechanism verifies if a sensor node is allowed to utilize the resources and have communication with other genuine nodes. That's why, a mechanism should be provided to authenticate a user over remote devices by keeping in consideration the low computation capability of a sensor node. To provide secure and efficient mechanism, we review on WSN attacks. In this paper we survey on various security attacks i.e. masquerade attacks, Man in the middle attack, replay attacks, Password guessing attacks etc.

WSN, Security, Authentication, Attacks.

Tags Associated: WSN Security Authentication Attacks