A systematic review of routing attacks detection in wireless sensor networks.

PeerJ Comput Sci

Malaysian Institute of Information Technology (MIIT), Universiti Kuala Lumpur, Kuala Lumpur, Malaysia.

Published: October 2022

Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many home users and autonomous systems industries. With many users adopting WSN-based IoT technology, ensuring that the sensor's information is protected from attacks is essential. Many attacks interrupt WSNs, such as Quality of Service (QoS) attacks, malicious nodes, and routing attacks. To combat these attacks, especially on the routing attacks, we need to detect the attacker nodes and prevent them from any access to WSN. Although some survey studies on routing attacks have been published, a lack of systematic studies on detecting WSN routing attacks can be seen in the literature. This study enhances the topic with a taxonomy of current and emerging detection techniques for routing attacks in wireless sensor networks to improve QoS. This article uses a PRISMA flow diagram for a systematic review of 87 articles from 2016 to 2022 based on eight routing attacks: wormhole, sybil, Grayhole/selective forwarding, blackhole, sinkhole, replay, spoofing, and hello flood attacks. The review also includes an evaluation of the metrics and criteria used to evaluate performance. Researchers can use this article to fill in any information gaps within the WSN routing attack detection domain.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9680892PMC
http://dx.doi.org/10.7717/peerj-cs.1135DOI Listing

Publication Analysis

Top Keywords

routing attacks
28
attacks
12
wireless sensor
12
sensor networks
12
systematic review
8
routing
8
wsn routing
8
review routing
4
attacks detection
4
detection wireless
4

Similar Publications

Routing Protocol for Underwater Wireless Sensor Networks Based on a Trust Model and Void-Avoided Algorithm.

Sensors (Basel)

November 2024

Key Laboratory of Internet Information Retrieval of Hainan Province, School of Cyberspace Security, Hainan University, 58 Renmin Avenue, Haikou 570228, China.

Underwater wireless sensor networks have a wide range of application prospects in important fields such as ocean exploration and underwater environment monitoring. However, the influence of complex underwater environments makes underwater wireless sensor networks subject to many limitations, such as resource limitation, channel openness, malicious attacks, and other problems. To address the above issues, we propose a routing scheme for underwater wireless networks based on a trust model and Void-Avoided algorithm.

View Article and Find Full Text PDF

The Underwater Sensor Network (UWSN) comprises sensor nodes with sensing, data processing, and communication capabilities. Due to the limitation of underwater radio wave propagation, nodes rely on acoustic signals to communicate. The data gathered by these nodes is transmitted to coordinating nodes or ground stations for additional processing and analysis.

View Article and Find Full Text PDF

Enhanced lion swarm optimization and elliptic curve cryptography scheme for secure cluster head selection and malware detection in IoT-WSN.

Sci Rep

December 2024

Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India.

Wireless Sensor Networks present a significant issue for data routing because of the potential use of obtaining data from far locations with greater energy efficiency. Networks have become essential to modern concepts of the Internet of Things. The primary foundation for supporting diverse service-centric applications has continued to be the sensor node activity of both sensing phenomena in their local environs and relaying their results to centralized Base Stations.

View Article and Find Full Text PDF

The Internet's default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in the BGP have been almost exclusively focused on single observable monitoring points and Autonomous Systems (ASs).

View Article and Find Full Text PDF

Deep learning models have emerged as strong and efficient tools that can be applied to a broad spectrum of complex learning problems and many real-world applications. However, more and more works show that deep models are vulnerable to adversarial examples. Compared to vanilla attack settings, this paper advocates a more practical setting of data-free black-box attack, for which the attackers can completely not access the structures and parameters of the target model, as well as the intermediate features and any training data associated with the model.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!