Survey on Various Attacks including Selective Forwarding Attack in Wireless Sensor Network

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-35 Number-4
Year of Publication : 2016
Authors : Shashank Mundhra

MLA

Shashank Mundhra "Survey on Various Attacks including Selective Forwarding Attack in Wireless Sensor Network". International Journal of Computer Trends and Technology (IJCTT) V35(4):189-192, May 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The need for human efforts are on the verge of reduction as the need for automation is on a constant rise and one of the most important tool towards achieving this is with the use of Wireless Sensor Networks(WSN). With its constantly evolving needs like in traffic surveillance, smart cities, commercial and military applications it is essential to preserve the information theft in terms of both privacy and security of the data that flows through these wireless sensors networks. This rises because of the fact that most of the times these nodes are often placed in a hostile environments where they are not physically protected. Some security threats like Black hole attack, Sinkhole attack, Sybil attack are a notable concern. Among these attacks, one of them is Selective forwarding attack. In this attack malicious nodes behave like normal nodes and selectively drop packets containing certain messages. The selection of dropping nodes may be random. The objective behind writing this paper is to study these attacks and the challenges posed by them.

References
[1] Sushil Sarwa and Rajeev Kumar, “Selective Forwarding Attacks and Its Detection Algorithms: A Review”, IJCSIS Vol: 7, No: 7, pg 918-921, 2013.
[2] Kalpana Sharma and M K Ghose, “Wireless Sensor Networks: An Overview on its Security Threats”, IJCA, pg. 42-45, 2010.
[3] http://tldp.org/HOWTO/Security-HOWTO/x82.html
[4] Dr. G. Padmavathi and Mrs. D. Shanmuganpriya, “A Survey of Attacks, Security Mechanism and Challenges in Wireless Sensor Networks”, IJCSIS Vol: 4, No: 1 & 2, 2009.
[5] Tran Hoang Hai and Eui-Nam Huh, Detecting Selective Forwarding Attack in Wireless Sensor Networks using Two-Hops Neighbour Knowledge, 7th IEEE International Symposium on Network Computing and Applications, 2008, 325-331.
[6] Bhargavi Singh, “Security Mechanism for Selective Forwading Attack in Wireless Sensor Networks: Review and Analysis”, IOSR-JCE, pp: 7-13, 2014
[7] Susma, Deepak Nadal and Vikas Nadal, “Security Threats in Wireless Sensor Networks”, IJCSMS Vol 11, pg. 59-63, 2011.
[8] Preeti Sharma, Monika Saluja and Krishan Kumar Saluja, “A Review of Selective Forwading Attack in Wireless Sensor Networks”, IJASSN Vol: 2, pg: 37-42, 2012.
[9] Sophia Kaplantzis, A. Shilton, N. Mani and Y. Sekercioglu, Detecting Selective Forwarding Attack in Wireless Sensor Networks using Support Vector Machines, 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP), 2007,335-340.
[10] Jiang changyong, Zhang jianming. “The selective forwarding attacks detection in WSNs”. Computer Engineering, 2009, 35(21):140-143.
[11] Tran Hoang Hai and Eui-Nam Huh, Detecting Selective Forwarding Attack in Wireless Sensor Networks using Two-Hops Neighbour Knowledge, 7th IEEE International Symposium on Network Computing and Applications, 2008, 325-331.

Keywords
Wireless Sensor Networks, Security Attacks, Selective forwarding attack.