Review Article

Comparative Study on Various Authentication Protocols in Wireless Sensor Networks

Table 1

Several attacks and their corresponding security mechanisms in WSN.

Type of attackLayerSecurity mechanism

Jamming Physical() Lower duty cycle
() Spread-spectrum technique

TamperingPhysical() Key management schemes

CollisionData link() Error correcting code

ExhaustionData link() Rate limitation

Replayed routing information Network() Encryption techniques
() Authentication schemes

Selective forwarding attack Network() Redundancy technique
() Probing mechanism

Sybil attackNetwork() Authentication schemes

Sinkhole attack Network() Authentication schemes
() Redundancy technique
() Monitoring

Wormhole attackNetwork() Flexible route selection method

HELLO flood attack Network() 2-way authentication method
() 3-way handshake method

Flooding attackTransport() Minimizing connection numbers
() Client puzzles

Clone attackApplication() Unique pairwise keys