Review Article
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Table 1
Several attacks and their corresponding security mechanisms in WSN.
| | Type of attack | Layer | Security mechanism |
| |
Jamming |
Physical | () Lower duty cycle | | () Spread-spectrum technique |
| | Tampering | Physical | () Key management schemes |
| | Collision | Data link | () Error correcting code |
| | Exhaustion | Data link | () Rate limitation |
| |
Replayed routing information |
Network | () Encryption techniques | | () Authentication schemes |
| |
Selective forwarding attack |
Network | () Redundancy technique | | () Probing mechanism |
| | Sybil attack | Network | () Authentication schemes |
| |
Sinkhole attack |
Network | () Authentication schemes | | () Redundancy technique | | () Monitoring |
| | Wormhole attack | Network | () Flexible route selection method |
| |
HELLO flood attack |
Network | () 2-way authentication method | | () 3-way handshake method |
| | Flooding attack | Transport | () Minimizing connection numbers | | () Client puzzles |
| | Clone attack | Application | () Unique pairwise keys |
|
|