A Comparison of Link Layer Attacks on Wireless Sensor Networks
Shahriar Mohammadi, Reza Ebrahimi Atani, Hossein Jadidoleslamy
DOI: 10.4236/jis.2011.22007   PDF   HTML     7,470 Downloads   15,457 Views   Citations


Wireless sensor networks (WSNs) have many potential applications [1,2] and unique challenges. They usually consist of hundreds or thousands of small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and resource limited sensors [3]. WSNs are susceptible to many types of link layer attacks [1] and most of traditional network security techniques are unusable on WSNs [3]; This is due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources [1]. Therefore security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN’s constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs’ link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; furthermore, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable IT security managers to manage the link layer attacks of WSNs more effectively.

Share and Cite:

S. Mohammadi, R. Atani and H. Jadidoleslamy, "A Comparison of Link Layer Attacks on Wireless Sensor Networks," Journal of Information Security, Vol. 2 No. 2, 2011, pp. 69-84. doi: 10.4236/jis.2011.22007.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] W. Znaidi, M. Minier and J. P. Babau, “An Ontology for At-tacks in Wireless Sensor Networks,” Institute National de Re-cherche en Informatique et en Automatique, October 2008.
[2] M. Saxena, “Security in Wireless Sensor Networks: A Layer-Based Classification,” 2011. https://www.cerias.purdue.edu/apps/reports_and_papers/view/3106/
[3] K. Sharma and M. K. Ghose, “Wireless Sensor Networks: An Overview on Its Security Threats,” In-ternational Journal of Computers and Their Applications, Spe-cial Issue on “Mobile Ad-hoc Networks”, Vol. 1, 2010, pp. 42-45.
[4] K. Xing, S. S. R. Srinivasan, M. Rivera, J. Li and X. Z. Cheng, “Attacks and Countermeasures in Sensor Net-works: A Survey,” Network Security, Springer, Berlin, 2010, pp. 251-272. doi:10.1007/978-0-387-73821-5_11
[5] T. A. Zia, “A Security Framework for Wireless Sensor Networks,” PhD Thesis, University of Sydney, Sydney, February 2008.
[6] G. Padmavathi and D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Net-works,” International Journal of Computer Science and Infor-mation Security, Vol. 4, No. 1-2, 2009, pp. 115-119.
[7] T. Kavitha and D. Sridharan, “Security Vulnerabilities in Wireless Sensor Networks: A Survey,” Journal of Information Assur-ance and Security, Vol. 5, 2010, pp. 31-44.
[8] Z. Li and G. Gong, “A Survey on Security in Wireless Sensor Networks,” 2011. http://www.cacr.math.uwaterloo.ca/techreports/2008/cacr2008-20.pdf
[9] A. Dimitrievski, V. Pejovska and D. Davcev, “Security Issues and Approaches in WSN,” 2011 http://ict-act.org/ICT Innovations.../ictinnovations 2009_submission_21.pdf
[10] J. Yick, B. Mukherjee and D. Ghosal, “Wireless Sensor Network Survey,” Computer Net-works, Vol. 52, No. 12, 2008, pp. 2292-2330. doi:10.1016/j.comnet.2008.04.002
[11] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proceedings of the 1st IEEE In-ternational Workshop on Sensor Network Protocols and Ap-plications, Alaska, 11 May 2003, pp. 113-127.
[12] Y. Wang, G. Attebury and B. Ramamurthy, “A Survey of Security Issues in Wireless Sensor Networks,” IEEE Communication Surveys, 2006.
[13] C. Tumrongwittayapak and R. Varakulsiripunth, “Detecting Sinkhole Attacks in Wireless Sensor Networks,” I CROS-SICE International Joint Conference, Fukuoka, 18-21 August 2009.
[14] R. H. Khokhar, M. A. Ngadi and S. Man-dala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks,” International Journal of Computer Science and Security, Vol. 2, No. 3, 2008, pp. 18-29.
[15] Y. Zhou, Y. Fang and Y. Zhang, “Security Wireless Sensor Networks: A Survey,” IEEE Communication Surveys, 2008.
[16] A. Perrig, R. Szewczyk, V. Wen, D. Culler and D. Tygar, “SPINS: Secu-rity Protocols for Sensor Networks,” Proceedings of 7th Annual International Conference on Mobile Computing and Networks, Rome, July 2001.
[17] I. Krontiris, T. Giannetsos and T. Di-mitriou, “Launching a Sinkhole Attack in Wireless Sensor Networks, the Intruder Side,” IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, Dalian, 12-14 October 2008, pp. 526-531.
[18] A. Perrig, J. Stankovic and D. Wagner, “Security in Wireless Sensor Networks,” Communications of the ACM, Vol. 47, No. 6, 2004, pp. .
[19] A. Saini and H. Kumar, “Comparison between Var-ious Black Hole Detection Techniques in MANET,” National Conference on Computational Instrumentation, Chandigarh, 19-20 March 2010, pp. 157-161.
[20] I. Ullah and S. U. Reh-man, “Analysis of Black Hole attack On MANETs Using Dif-ferent MANET Routing Protocols,” Master Thesis, Blekinge Institute of Technology, Sweden, 2010.
[21] R. Maheshwari, J. Gao and S. R. Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information,” IEEE INFOCOM, Alaska, 2007.
[22] Y-C. Hu, A. Perrig and D. B. Johnson, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the 2nd ACM Workshop on Wireless Security ACM, New York, 2003.
[23] J. R. Douceur, “The Sybil Attack,” Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), Cambridge, 7-8 March 2002.
[24] J. Newsome, E. Shi, D. Song and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004.
[25] L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004.
[26] B. Parno, A. Perrig and V. Gligor, “Distributed Detection of Node Replication Attacks in Sensor Networks,” Proceedings of the 2005 IEEE Symposium on Security and Privacy, 8-11 May, 2005, Oakland, pp. 49-63.
[27] A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer Magazine; Vol. 35, No. 10, 2002, pp. 54-62.
[28] Y. Hu, A. Perrig and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, Vol. 3, 30 March-3 April 2003, pp. 1976-1986.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.