4.6 Review

A systematic review of routing attacks detection in wireless sensor networks

Journal

PEERJ COMPUTER SCIENCE
Volume 8, Issue -, Pages -

Publisher

PEERJ INC
DOI: 10.7717/peerj-cs.1135

Keywords

Privacy; Things Wireless sensor networks; Routing attacks detection; Internet of things; Wormhole attack; Blackhole attack; Grayhole attack; Sinkhole attack; Sybil attack; Hello flood attack; Spoofing attack

Ask authors/readers for more resources

This article examines the detection techniques for routing attacks in wireless sensor networks, providing a taxonomy of current and emerging detection techniques through a systematic review of 87 articles. The review also evaluates the metrics and criteria used for performance evaluation.
Wireless sensor networks (WSNs) consist of hundreds, or thousands of sensor nodes distributed over a wide area and used as the Internet of Things (IoT) devices to benefit many home users and autonomous systems industries. With many users adopting WSN-based IoT technology, ensuring that the sensor's information is protected from attacks is essential. Many attacks interrupt WSNs, such as Quality of Service (QoS) attacks, malicious nodes, and routing attacks. To combat these attacks, especially on the routing attacks, we need to detect the attacker nodes and prevent them from any access to WSN. Although some survey studies on routing attacks have been published, a lack of systematic studies on detecting WSN routing attacks can be seen in the literature. This study enhances the topic with a taxonomy of current and emerging detection techniques for routing attacks in wireless sensor networks to improve QoS. This article uses a PRISMA flow diagram for a systematic review of 87 articles from 2016 to 2022 based on eight routing attacks: wormhole, sybil, Grayhole/ selective forwarding, blackhole, sinkhole, replay, spoofing, and hello flood attacks. The review also includes an evaluation of the metrics and criteria used to evaluate performance. Researchers can use this article to fill in any information gaps within the WSN routing attack detection domain.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available