A systematic review of routing attacks detection in wireless sensor networks

Author:

Alansari Zainab12ORCID,Anuar Nor Badrul1,Kamsin Amirrudin1,Belgaum Mohammad Riyaz34ORCID

Affiliation:

1. Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia

2. College of Computing and Information Sciences, University of Technology and Applied Sciences, Muscat, Sultanate of Oman

3. Malaysian Institute of Information Technology (MIIT), Universiti Kuala Lumpur, Kuala Lumpur, Malaysia

4. Computer Science and Engineering, G. Pullaiah College of Engineering and Technology, Kurnool, India

Abstract

Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many home users and autonomous systems industries. With many users adopting WSN-based IoT technology, ensuring that the sensor’s information is protected from attacks is essential. Many attacks interrupt WSNs, such as Quality of Service (QoS) attacks, malicious nodes, and routing attacks. To combat these attacks, especially on the routing attacks, we need to detect the attacker nodes and prevent them from any access to WSN. Although some survey studies on routing attacks have been published, a lack of systematic studies on detecting WSN routing attacks can be seen in the literature. This study enhances the topic with a taxonomy of current and emerging detection techniques for routing attacks in wireless sensor networks to improve QoS. This article uses a PRISMA flow diagram for a systematic review of 87 articles from 2016 to 2022 based on eight routing attacks: wormhole, sybil, Grayhole/selective forwarding, blackhole, sinkhole, replay, spoofing, and hello flood attacks. The review also includes an evaluation of the metrics and criteria used to evaluate performance. Researchers can use this article to fill in any information gaps within the WSN routing attack detection domain.

Publisher

PeerJ

Subject

General Computer Science

Reference107 articles.

1. Performance evaluation of wireless sensor network under hello flood attack;Abdus Salam;International Journal of Computer Networks & Communications,2016

2. Multi-step detection of simplex and duplex wormhole attacks over wireless sensor networks;Alajlan;Computers, Materials & Continua,2022

3. Design of wireless sensor network in the agricultural sector;Alansari;3rd Smart Cities Symposium (SCS 2020),2021

4. Internet of things: infrastructure, architecture, security and privacy;Alansari;2018 International Conference on Computing, Electronics & Communications Engineering (iCCECE),2018

5. A comparison analysis of fault detection algorithms in wireless sensor networks;Alansari;2018 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT),2018

Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3