International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 107

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 5 Issue 4, April 2016


A Review on Various Routing Attacks on Wireless Sensor Network

Aruna Rantore, Kapil Vyas


Abstract: Security is relevant for many sensor network applications. Wireless Sensor Networks (WSN) is often deployed in hostile environments as static or mobile, where an antagonist can physically capture some of the nodes, once a node is captured, antagonist collects all the credentials like keys and identity etc. the attacker can re-program it and repeat the node in order to eavesdrop the transmitted messages or adjustment the functionality of the network. Identity burglary leads to two types attack clone and Sybil. In particularly a catastrophic attack against sensor networks where one or more node (s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be enormously injurious to many important functions of the sensor network such as routing, resource allocation, mis-behavior detection, etc.


Keywords: Security, Clone, Sybil, node replication attack and static WSN


Edition: Volume 5 Issue 4, April 2016,


Pages: 1994 - 1998


How to Cite this Article?

Aruna Rantore, Kapil Vyas, "A Review on Various Routing Attacks on Wireless Sensor Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=2041603, Volume 5 Issue 4, April 2016, 1994 - 1998

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Security'

Downloads: 1

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 10 Issue 10, October 2021

Pages: 762 - 764

Smart Antennas: Technological Advancement for Wireless Communication Networks

Jyoti Jha

Share this Article

Similar Articles with Keyword 'Clone'

Downloads: 103

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1477 - 1481

Design and Implementation of Rijindael's Encryption and Decryption Algorithm using NIOS-II Processor

Monika U. Jaiswal, Nilesh A. Mohota

Share this Article

Downloads: 113

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2338 - 2341

SOC Based Cryptosystem Implementation Using RC4 and IDEA Algorithm

Surekha Pujar, Sleeba Mathew

Share this Article

Similar Articles with Keyword 'Sybil'

Downloads: 107

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1410 - 1413

Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks

Riyazahmed A Jamadar, Mousami. S Vanjale

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2191 - 2194

The Detection of Sybil Attack by Location Based Privacy System

Wilren Dcruz

Share this Article
Top