Research Article

A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

Table 1

Summarization of layer wise attacks on localization in WSNs [9].

LayersAttacksAttack behaviourResults

Physical layerStealingSignal eavesdropping and tamperingPacket error and packet loss
JammingSending jamming signal in the working frequency rangePacket loss

Data link layerCollisionRepetition of messagesPacket loss
ExhaustionSending of unnecessary messagePacket loss
UnfairnessExplicitly take the control of the channelPacket loss

Network layerDoS AttacksExhaustion of energy of the unknown nodesPacket loss
Selective forwardingSelectively forward packetsPacket loss
SybilPossessing multiple identitiesPacket error
SinkholeMaliciously tamper with routingPacket error
WormholeShortening the distance to make a fast routing pathPacket loss

Transport layerFloodingEstablishing false connectionsPacket loss
TamperingTampering localization beaconsPacket error