Survey on data aggregation based security attacks in wireless sensor network

Nikhath Tabassum, Geetha D. Devanagavi, Rajashekhar C. Biradar, Chaya Ravindra

Abstract


Wireless sensor network (WSN) has applications in military, health care, environmental monitoring, infrastructure, industrial and commercial applications. The WSN is expected to maintain data integrity in all its network operations. However, due to the nature of wireless connectivity, WSN is prone to various attacks that alter or steal the data exchanged between the nodes. These attacks can disrupt the network processes and also the accuracy of its results. In this survey paper, we have reviewed various attacks available in the literature till date. We have also listed existing methods that focus on data aggregation based security mechanisms in WSN to counter the attacks. We have classified and compared these methods owing to their encryption techniques. This paper intends to support researchers to understand the basic attacks prevalent in WSN and schemes to counter such attacks.


Keywords


attacks in wireless sensor network; black hole attack; decryption; encryption; symmetric key;

Full Text:

PDF


DOI: http://doi.org/10.11591/ijece.v13i3.pp3131-3139

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

International Journal of Electrical and Computer Engineering (IJECE)
p-ISSN 2088-8708, e-ISSN 2722-2578

This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).