IDEAS home Printed from https://ideas.repec.org/a/igg/jisp00/v6y2012i4p1-39.html
   My bibliography  Save this article

A Full Review of Attacks and Countermeasures in Wireless Sensor Networks

Author

Listed:
  • Pejman Niksaz

    (Department of Computer Engineering, Islamic Azad University, Science and Research Branch, Yazd, Iran)

  • Mohammad Javad Kargar

    (Department of Computer Engineering, Islamic Azad University, Maybod Branch, Maybod, Iran)

Abstract

Wireless Sensor Networks (WSNs) have been recognized for their utility in a variety of different fields including military sensing and tracking, environmental monitoring, patient monitoring and tracking smart environments. The more scientists try to develop further cost and energy efficient computing devices and algorithms for WSNs, the more challenging it becomes to fit the security of WSNs into such a constrained environment. Thus, familiarity with the security aspects of WSNs is essential before designing WSN systems. In order to provide effective integrity, confidentiality, and authentication during communication, the need for additional security measures in WSNs emerges. In this paper, the authors review the security requirements for WSNs, the different kinds of possible attacks, and security mechanisms used to overcome these attacks. The authors also present some statistical data for such attacks in WSN and some tables that indicate a comparison between different security mechanisms.

Suggested Citation

  • Pejman Niksaz & Mohammad Javad Kargar, 2012. "A Full Review of Attacks and Countermeasures in Wireless Sensor Networks," International Journal of Information Security and Privacy (IJISP), IGI Global, vol. 6(4), pages 1-39, October.
  • Handle: RePEc:igg:jisp00:v:6:y:2012:i:4:p:1-39
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jisp.2012100101
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jisp00:v:6:y:2012:i:4:p:1-39. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.