Review Article
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Table 1
Several attacks and their corresponding security mechanisms in WSN.
| Type of attack | Layer | Security mechanism |
|
Jamming |
Physical | () Lower duty cycle | () Spread-spectrum technique |
| Tampering | Physical | () Key management schemes |
| Collision | Data link | () Error correcting code |
| Exhaustion | Data link | () Rate limitation |
|
Replayed routing information |
Network | () Encryption techniques | () Authentication schemes |
|
Selective forwarding attack |
Network | () Redundancy technique | () Probing mechanism |
| Sybil attack | Network | () Authentication schemes |
|
Sinkhole attack |
Network | () Authentication schemes | () Redundancy technique | () Monitoring |
| Wormhole attack | Network | () Flexible route selection method |
|
HELLO flood attack |
Network | () 2-way authentication method | () 3-way handshake method |
| Flooding attack | Transport | () Minimizing connection numbers | () Client puzzles |
| Clone attack | Application | () Unique pairwise keys |
|
|