Wireless Sensor Network Security Issues and Attacks 1 SHAGUN KHANNA, Department of IT, sheenu_92@live.com SHALU JAIN, Department of IT,shalujain064@gmail.com NEELESH MISHRA, Department of IT, neeleshmishra@rkgitw.edu.in 2 Abstract: Wireless Sensor Networks will give an outstanding opportunity to control the environment .WSNs has many applications, some of them are very sensitive in nature. Due to some limitations in WSNs, maintaining security is a vital issue. In this paper, we have made an effort to submit all the security issues in WSN and have provided the directions for research towards counter measures against the threats posed by some issues. I. INTRODUCTION Wireless sensor network (WSN) usually comprises of number of sensors and actuators with limited resources. Sensor networks require unique security challenges because of their inherent limitations in communications network is to disperse tiny sensing devices include a data processing unit, sensing equipment ,a short range radio device, and a battery, which are capable of sensing some changes in environment. The other two components are called aggregation and base station. In Aggregation, the data from the neighbouring nodes are collected, integrated and forwarded to the base station for the further processing. Some of the applications of WSNs are farming, buildings and bridges, monitoring soil make up and variety of smart and intelligent systems. RADIO TRANSRECEIVER POWER SENSORS CONTROLLER MEMORY Fig. 1 Sensor node components II. SENSORS NETWORK TYPES A. Terrestrial WSNs In these, sensor nodes are either randomly placed into the target area by dropping it from plane or placed according to grid or optical placements, these are known as ad hoc manner and pre-planned manner respectively. Solar cells are also used for extra battery charge as the power is limit. B. Underwater WSNs In these, the sensor nodes are located under the water. For collecting data, autonomous vehicles are used. Scattered deployment of the nodes is done. Related issues while communicating are long propagation delay, signal fading and limited bandwidth. C. Underground WSNs The underground conditions are monitored by sensor nodes buried underground or in cave. The information gathered are forwarded through sink nodes that are on ground to the base station. As these can give more reliable communication through water, rock and soil than the terrestrial sensor networks, therefore these are expensive. D. Multimedia WSNs Cameras and microphones are equipped with low cost sensor. These guarantees Coverage as they are placed in grid and optical manner in a pre-planned way. Main problems are high energy consumption, data processing and compression techniques, and high bandwidth and cross layer design. III. WSN SECURITY The goal of creating security in Sensor networks is that what data we are going to protect. Security is one of the major aspects of each and every system. The four major security goals in sensor networks are – Confidentiality, Integrity, Authentication and Availability. Confidentiality is an acceptance of authorised access to information from a certified sender to a certified receiver. In this, encryption is used for secure communication. A secret key is available to authorised user only. Confidentiality is the ability to conceal message from the passive attacker. Integrity is the ability to confirm that the message is not tempered, altered or changed while transferring through the network. It also ensures that nothing is added to the content of the packet. Authentication is the assurance that the communicating entity is the one that it claims to be. An adversary can change the entire packet stream by adding extra packets to it. The authentication service is concerned with assuring that a communication is authentic. Availability refers to that authorized parties are able to access the information when needed and to determine that if node has the ability to consume the resources and the network is always available for the transmission of the messages. SECURITY CLASSES PFleeger has four classes of security in computing system. We can integrate these four threat classes in sensor networks. In sensor networks, our goal is to protect the network itself, the nodes and the communication taking place between them. The four classes is given below In an interruption, a communication link in sensor networks becomes lost or unavailable. Examples of this sort of threats are node capture, message corruption, addition of malicious code etc. An interception means sensor network has been compromised by an adversary where the attacker gains unauthorised access to sensor node or data in it. Example of this attack is node capture attacks. Modification means a malicious user party not only have accesses to the data but tampers it, for example modifying the data packets being transmitted causing a denial of service attack such as flooding the network with bogus data. In fabrication, an attacker enters the false data and compromises the trustworthiness of information. IV. ATTACKS ON WSN WSNs are power-constraint networks which have limited energy and computational resources due t which these are more exposed to the attackers. The broadcast nature is the reason why sensor networks are susceptible to security attacks. In WSNs, it is easy for an attacker to assume the security mechanisms. Base stations are regarded as most trustworthy in WSNs. A. Node subversion Capture of the node may reveal Cryptographic keys to the attacker hence compromising the whole sensor network. B. Jamming This attack is on physical layer of WSN’s structure. Jamming is of two typesIntermittent jamming (communication by the nodes are periodic not continuous) and Constant jamming (jam the whole network). C. Collision This is the type of link layer jamming in which collision occurs when two nodes transfer data at the same time and with same frequency without sensing the channel. This attack reduces the network perfection as some packets are discarded during collision and re-transmitted by the sender. D. False Node Addition by the adversary of the malicious node to inject the false data. False node is more robust. E. Homing In this attack, attacker firstly senses the traffic on the channel to interpret the cluster heads. And then attack the crucial nodes to physically destroy the network. F. Sybil attack This is a network layer attack. An awful node represents more than one illegal identities by stealing identies of legitimate nodes. Data integrity, security and geographical routing protocols are affected. G. Node outage It halts the working of the nodes by disturbing their respective routes. It affects the availability and integrity. G. Traffic Analysis Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication.The messages are transferred in encrypted form but there is high probability of being intercept by an attacker. H. Sinkhole Attack These are the network layer attacks also called Black holes. It creates a fake node which attracts the neighbouring nodes by presenting the low cost route due to which maximum traffic flow towards these fake nodes. This results in collision and message destruction. I. Flooding In this, the adversary sends request for the connection establishment with the selected node. This may result in the bombarding of energy resources and the effusion of the memory. CONCLUSION In this paper, we present a brief survey on wireless sensor network’s characteristics and some of its types. Then we discussed about the security in sensor networks, security issues and DoS attacks on different layers and Pfleeger four classes of security in computing system .Security is an important requirement of any network and complicates enough to set up in different domains of Wireless Sensor Network (WSN). We also discuss various dimensions of security (that are Confidentiality, Integrity, Authentication and Availability) directed by different physical attacks and active attacks. In this paper we have discussed threat models and unique security issues faced by wireless sensor networks. REFERENCES [1] Bhattacharya, “A Comparative Study of Physical Attacks on Wireless Sensor Networks”, IJET, Jan 2013. [2] I.F. Akyildiz, Sankarasubramaniam, Cayirci, “A survey on sensor networks”, 104–112 [3] I.F. Akyildiz, Stuntebeck, “Wireless underground sensor networks”, (2006) [4] Kriti Jain, Upasana , “Survey on Wireless Sensor Network”, JSTM, Vol. 3 Issue 2, 8390, Sept 2012. [5] C.P. Fleeger, Security in computing, 3rd edition, Prenticl Inc. 2003