A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks
<p>Components on a sensor node.</p> "> Figure 2
<p>Research classification in [<a href="#B11-applsci-15-02213" class="html-bibr">11</a>].</p> "> Figure 3
<p>Number of papers in research areas.</p> "> Figure 4
<p>Number of papers in published years.</p> "> Figure 5
<p>Categorization of EDAs in [<a href="#B23-applsci-15-02213" class="html-bibr">23</a>].</p> "> Figure 6
<p>Example of SFA detection in E-watchdog.</p> "> Figure 7
<p>Example of a wormhole attack.</p> ">
Abstract
:1. Introduction
- Research challenges for security in WSNs: To address security issues and research challenges, we reviewed surveys and compared them.
- Investigation for energy drain attack in WSNs: Specifically, we focused on energy drain attacks and countermeasures against this type of attack in the aspects of layers. In particular, we focused on and analyzed energy drainage attacks by denial of service (DoS) attacks.
- Further research challenges: We discussed the open research challenges for energy drainage attacks, including new network architecture and the use of machine learning (ML).
2. Security Issues in WSN
2.1. Literature Review for Overall Attacks
2.2. Literature Review for Specific Attacks
3. Energy Drain Attacks in WSNs
3.1. Motivation and Methodology
- Step 1: Search the literature for “energy drain attack WSNs”;
- Step 2: Extract lists from Step 1 by related titles as well as related abstracts;
- Step 3: Conduct a detailed analysis of the research content.
3.2. Background of Energy Consumption and Drain
3.3. Literature Review for Energy Drain Attacks
4. Recent Review Based on State-of-the-Art Works for Energy Drain Attack
4.1. Physical Layer
4.2. Data Link Layer
4.3. Network Layer
4.3.1. Selective Forwarding Attacks
4.3.2. Black Hole Attacks
4.3.3. Gray Hole Attacks
4.3.4. Wormhole Attacks
4.3.5. Sinkhole Attacks
4.3.6. Sybil and Vampire Attacks
4.4. Transport Layer
4.5. Application Layer
4.6. Framework for Energy Drainage Attacks in WSNs
5. Open Research Challenges and Discussion
- New network architecture: Most of the previous studies have been conducted in distributed systems, either flat or clustering. However, many schemes exhibit high computational costs and communication overheads when detecting several attacks. To address this problem, a centralized approach was proposed using software-defined WSNs (SDWSNs) supported by cloud computing. For example, Alturki et al. [91] proposed security issues for the sensor-cloud architecture from various security attacks to preserve its integrity. Miranda et al. [92] proposed a software-defined security framework to combine intrusion prevention and anomaly detection systems. Moreover, Luo et al. [93] discussed the security problem under SDWSNs. The authors proved that the edge gateway isolates the abnormal nodes and generates control messages to rapidly recover the network. However, challenges related to the failure of the controller in SDWSNs and communication overhead remain. Related to SDWSNs, as addressed in [94], centralized and resource-aware properties in SDWSNs can accommodate complex ML algorithms properly. The new ML-SDWSN architecture comprises the three SDN planes and a machine learning module. Usually, the ML module is installed in two locations: the control plane and the application plane. However, this SDN architecture is also vulnerable to security attacks. So, countermeasures for attacks are as follows [95]: forged traffic flows, attacks on the control plane, vulnerabilities in controllers, administrative station attacks, and a lack of trusted resources. Furthermore, SDN-Edge architecture [96] is also recently proposed for WSN-enabled IoT. Since the centralized controller becomes a prime target for attacks, resource-rich edge computing for SDN can contribute to improving the mitigation technique and reduce complexity. This approach can be extended to SDWSNs to improve their performance.
- Cross-layered approach: Even though there has been no recent cross-layered approach for energy drain attacks in WSN since 2019, we can estimate the impact of the cross-layered approach by referring to other work. R. Mustafa et al. [97] discussed multi-layered security approaches and suggested how to enhance the energy efficiency of resource-constrained devices in IoT networks. As an example of secure routing, it has been proven that network performance can be preserved while energy consumption is decreased across all these layers. As an instance for energy drain attacks, jamming detection at the physical layer can be delivered to the network layer so it can be used to avoid this node to be included in the routing path in the network layer.
- Integrating with the IoT: The IoT can be incorporated into WSNs to extend their communication capabilities. This result implies that most WSN technologies can be applied to the IoT. However, severe constraints in the IoT require existing schemes for WSNs to be lightweight. For example, Borgiani et al. [98] demonstrated the feasibility of the mitigation scheme for the DoS attack in time-limited critical scenarios and large-scale IoT-based WSNs. Furthermore, Chandnani and Khairnar [99] proposed secure data aggregation by detecting node behavior in the network, calculating the nodes’ trust value, and using a data gathering method. The proposed protocol provides a lightweight XOR-based encryption solution for securing data in a multi-hop environment and forwarding data for IoT WSNs. Practical applications and attack scenarios that involve the integration of the IoT in WSNs remain research challenges.
- Using a blockchain: Conventional identity authentication protocols that depend on trusted third parties to prevent several attacks face problems in terms of additional overhead and single-point failure. Therefore, blockchain technology with decentralization characteristics provides a novel perspective for WSNs. Ramasamy et al. [100] reviewed the in-depth survey of a blockchain-based approach for malicious node detection and energy drain prevention by integrating a blockchain technique with WSNs named BWSN. Arachchige et al. [101] investigated whether blockchains on IoT sensor network platforms are vulnerable to DDoS attacks through experiments over a blockchain testbed. However, the energy efficiency of blockchains remains unresolved.
- Introducing ML: ML technology can improve the attack detection performance by optimizing the model. Furthermore, ML techniques that can address dynamic situations with a successful learning process have been applied in WSNs. ML technology can be used to identify attacks, risks, and malicious nodes [101]. Evaluations based on both supervised and unsupervised ML for flooding, gray hole, and black hole DoS attacks [102] have been presented. Deep learning models for DoS attack detection in WSNs [103] have also been discussed. Integration between HMMs and Gaussian mixture models for routing security [104] can identify abnormal nodes and pinpoint malicious network behaviors from their origins. Lightweight ML algorithms specialized for ML and privacy in collecting data are promising research challenges. In addition, ML algorithm requires high costs for deployment, such as computing resources, data collection, and long training times. Thus, a lightweight ML algorithm and data collection should the main focus of further research. On the other hand, it is also considerable to create a hybrid ML approach that is suitable for working on such types of embedded devices. Similarly, it is very important to decide the location of the ML training process, such as the edge and controller in SDWSNs mentioned in the network architecture above.
- Preparing data set: The data set for attacks is difficult to obtain. Aside from a public WSNs-based dataset, Dener et al. [105] examined a WSNs-BFSF data set using learning models after necessary preprocessing. The WSN-BFSF data set consists of attack traffic data, including black holes, flooding, selective forwarding, and normal traffic data through ns-2 simulation. Specialized in IoT, the SimpleHome_XCS7_1003_WHT_Security_Camera dataset among N-BaIoT data sets [106] was examined. This data set was used to categorize the data set containing attack and normal traffic data with high accuracy using twenty-three supervised and unsupervised ML models. These included naive Bayes, naive Bayes updateable, random forest, and random tree. Table 8 lists the available data sets for security attacks and their properties. In addition to including these data sets, the development of data sets for energy drainage attacks is crucial.
- Validation by implementation: Most of the proposed approaches, except for ML-based methods analyzed in this review, were validated by simulation. Thus, it is also required to validate the proposed scheme through empirical experiments in the real world with scenarios that are equivalent to the collected and represented by data set for ML approaches. The data set can be transformed into a feasible format and used in mentioned frameworks such as [88,89,90]. The instances of EDA attacks through real implementation on sensor nodes were explained in [107,108,109,110,111]. Even though these implementations provide us with guidance for implementation, the most recent case was reported in 2016. So, it is required to implement the proposed algorithms on recent commercial products.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Tabella, G.; Ciuonzo, D.; Paltrinieri, N.; Rossi, P. Bayesian Fault Detection and Localization Through Wireless Sensor Networks in Industrial Plants. IEEE Internet Things 2024, 11, 13231–13246. [Google Scholar] [CrossRef]
- Wang, Y.; Attebury, G.; Ramaurthy, B. A Survey of Security Issues in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 2006, 8, 2–23. [Google Scholar] [CrossRef]
- Chen, X.; Makki, K.; Yen, K.; Pissinou, N. Sensor Network Security: A Survey. IEEE Commun. Surv. Tutorials 2009, 11, 52–73. [Google Scholar] [CrossRef]
- Sen, J. Security in Wireless Sensor Networks. In Wireless Sensor Networks: Current Status and Future Trends; CRC Press: Boca Raton, FL, USA, 2012; pp. 407–460. [Google Scholar]
- Yang, Q.; Zhu, X.; Fu, H.; Che, X. Survey of Security Technologies on Wireless Sensor Networks. J. Sensors 2015, 2015, 10585–10596. [Google Scholar] [CrossRef]
- Tomic, I.; McCann, J. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Internet Things J. 2017, 4, 1910–1923. [Google Scholar] [CrossRef]
- Yu, J.; Lee, E.; Oh, S.; Seo, Y.; Kim, Y. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access 2020, 8, 45304–45324. [Google Scholar] [CrossRef]
- Faris, M.; Mahmud, M.; Fadzli, M.; Salleh, M.; Alnoor, A. Wireless Sensor Network Security: A Recent Review Based on State-of-the-art Works. Int. J. Eng. Bus. Manag. 2023, 15, 1–29. [Google Scholar] [CrossRef]
- Ram, G.; Ilavarasan, E. Security Challenges in Wireless Sensor Network: Current Status and Future Trends. In Wireless Personal Communications; Springer: New York, NY, USA, 2024; pp. 1173–1202. [Google Scholar]
- Oztoprak, A.; Hassanpour, R.; Ozkan, A.; Oztopark, K. Security Challenges, Mitigation Strategies, and Future Trends in Wireless Sensor Networks: A Review. ACM Comput. Surv. 2024; in press. [Google Scholar] [CrossRef]
- Gautam, A.; Kumar, R. A Comprehensive Study on Key Management, Authentication and Trust Management Techniques in Wireless Sensor Networks. SN Appl. Sci. 2021, 3, 1–27. [Google Scholar] [CrossRef]
- Yousefpoor, M.; Yousefpoor, E.; Barati, H.; Barati, A.; Movaghar, A.; Hosseinzadeh, M. Secure Data Aggregation Methods and Countermeasures against Various Attacks in Wireless Sensor Networks: A Comprehensive Review. J. Netw. Comput. Appl. 2021, 190, 1–42. [Google Scholar] [CrossRef]
- Rehman, A.; Rehman, S.; Raheem, H. Sinkhole Attacks in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 2019, 106, 2291–2313. [Google Scholar] [CrossRef]
- Szymoniak, S. Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey. ACM Comput. Surv. 2024, 56, 1–31. [Google Scholar] [CrossRef]
- Xie, H.; Yan, Z.; Yao, Z.; Atiquzzaman, M. Data Collection for Security Measurement in Wireless Sensor Networks: A Survey. IEEE Internet Things J. 2019, 6, 2205–2224. [Google Scholar] [CrossRef]
- Keerthikaa, M.; Shanmugapriya, D. Wireless Sensor Networks: Active and Passive attacks—Vulnerabilities and Countermeasures. Glob. Transitions Proc. 2021, 2, 362–367. [Google Scholar] [CrossRef]
- Engmann, F.; Katsriku, F.; Abdulai, J.; Adu-Manu, K.; Banaseka, F. Prolonging the Lifetime of Wireless Sensor Networks: A Review of Current Techniques. Wirel. Commun. Mob. Comput. 2018, 2018, 1–23. [Google Scholar] [CrossRef]
- Choudhary, A.; Barwar, N. Sensor Node Design Optimization Methods for Enhanced Energy Efficiency in Wireless Sensor Networks. In Proceedings of the International Conference on Cryptology & Network Security with Machine Learning; Springer: New York, NY, USA, 2024. [Google Scholar]
- Williams, A.; Torquato, M.; Cameron, I.; Fahmy, A.; Sienz, J. Survey of Energy Harvesting Technologies for Wireless Sensor Networks. IEEE Access 2021, 8, 77493–77510. [Google Scholar] [CrossRef]
- Leemput, D.; Hoebeke, J.; Poorter, E. Integrating Battery-Less Energy Harvesting Devices in Multi-Hop Industrial Wireless Sensor Networks. IEEE Commun. Mag. 2024, 62, 66–73. [Google Scholar] [CrossRef]
- Wang, Y.; Fu, X.; Yang, Y.; Postolache, O. Analysis on cascading robustness of energy-balanced scale-free wireless sensor networks. AEU—Int. J. Electron. Commun. 2021, 141, 1–15. [Google Scholar] [CrossRef]
- Antil, P.; Malik, A. Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey. J. Comput. Netw. Commun. 2014, 2014, 1–11. [Google Scholar] [CrossRef]
- Nguyen, V.; Lin, P.; Hwang, R. Energy Depletion Attacks in Low Power Wireless Networks. IEEE Access 2019, 7, 51915–51932. [Google Scholar] [CrossRef]
- Kundu, A.; Lin, Z.; Hammond, J. Energy Attacks on Mobile Devices. In Proceedings of the IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 28–31 October 2020. [Google Scholar]
- Al-Husseini, Z.; Chaiel, H.; Meddeb, A.; Fakhfakh, A. A Detailed Review of Wireless Sensor Network, Jammer, the Types, Location, Detection and Countermeasures of Jammers. Serv. Oriented Comput. Appl. 2024, 14, 225–247. [Google Scholar] [CrossRef]
- Tan, H.; Li, Z.; Xie, N.; Lu, J.; Niyato, D. Detection of Jamming Attacks for the Physical-Layer Authentication. IEEE Trans. Wirel. Commun. 2023, 22, 9579–9594. [Google Scholar] [CrossRef]
- Misra, S.; Mondal, A.; Bhavathankar, P.; Alouini, M. M-JAW: Mobility-Based Jamming Avoidance in Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2019, 69, 5381–5390. [Google Scholar] [CrossRef]
- Mariappan, S.; Selvakumar, S. A Novel Location Pinpointed Anti-Jammer with Knowledged Estimated Localizer for secured Data Transmission in Mobile Wireless Sensor Network. Wirel. Pers. Commun. 2021, 118, 2073–2094. [Google Scholar] [CrossRef]
- Yang, F.; Shu, N.; Hu, C.; Huang, J.; Niur, Z. Jammer Location-Aware Method in Wireless Sensor Networks Based on Fibonacci Branch Search. J. Sensors 2023, 2023, 2261730. [Google Scholar] [CrossRef]
- Hasana, M.; Mustafa, H. An Anti-jamming Technique by Jammer Localization for Multi-channel Wireless Sensor Networks. Int. J. Comput. Netw. Commun. 2024, 16, 87–107. [Google Scholar]
- Permatasari, E.; Saifullah, A.; Zhang, H. Jamming-Resilient Channel Hopping for WirelessHART Networks. In Proceedings of the International Conference on Distributed Computing and Networking (ICDCN), Hyderabad, India, 4–7 January 2025. [Google Scholar]
- Del-Valle-Soto, C.; Mex-Perera, C.; Nolazco-Flores, J.; Rodríguez, A.; Rosas-Caro, J.; Martínez-Herrera, A. A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks. Sensors 2021, 21, 1179. [Google Scholar] [CrossRef]
- Zhou, Q.; Li, Y.; Niu, Y. Intelligent Anti-Jamming Communication for Wireless Sensor Networks: A Multi-Agent Reinforcement Learning Approach. IEEE Open J. Commun. Soc. 2021, 2, 775–784. [Google Scholar] [CrossRef]
- Pirayesh, H.; Sangdeh, P.; Zeng, H. Securing ZigBee Communications Against Constant Jamming Attack Using Neural Network. IEEE Internet Things J. 2021, 8, 4957–4968. [Google Scholar] [CrossRef]
- Rao, N.; Xu, H.; Qi, Z.; Wang, D.; Zhang, Y. Fast Adaptive Jamming Resource Allocation Against Frequency-Hopping Spread Spectrum in Wireless Sensor Networks via Meta-Deep Reinforcement-Learning. IEEE Trans. Aerospeace Electron. Syst. 2024, 60, 7676–7693. [Google Scholar] [CrossRef]
- Cortés-Leal, A.; Del-Valle-Soto, C.; Cardenas, C.; Valdivia, L.; Puerto-Flores, J. Performance Metric Analysis for a Jamming Detection Mechanism under Collaborative and Cooperative Schemes in Industrial Wireless Sensor Networks. Sensors 2021, 22, 178. [Google Scholar] [CrossRef]
- Hasan, M.; Hanapi, Z.; Hussain, M. Wireless Sensor Security Issues on Data Link Layer: A Survey. Comput. Mater. Contin. 2023, 75, 4065–4084. [Google Scholar]
- Khashan, O.; Ahmad, R.; Khafajah, N. An Automated Lightweight Encryption Scheme for Secure and Energy-efficient Communication in Wireless Sensor Networks. Ad Hoc Netw. 2021, 115, 102448. [Google Scholar] [CrossRef]
- Hasan, M.; Hanapi, Z. Efficient and Secured Mechanisms for Data Link in IoT WSNs: A Literature Review. Electronics 2023, 12, 458. [Google Scholar] [CrossRef]
- Tropea, M.; Spina, M.; Rango, F.; Gentile, A. Security in Wireless Sensor Networks: A Cryptography Performance Analysis at MAC Layer. Future Internet 2022, 14, 145. [Google Scholar] [CrossRef]
- Aloufi, B.; Alhakami, W. A Lightweight Authentication MAC Protocol for CR-WSNs. Sensors 2023, 23, 2015. [Google Scholar] [CrossRef]
- Fotohi, R.; Bari, S.; Yusefi, M. Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol. Int. J. Commun. Syst. 2020, 33, 1–25. [Google Scholar] [CrossRef]
- Park, H. Anti-Malicious Attack Algorithm for Low-Power Wake-Up Radio Protocol. IEEE Access 2020, 8, 127581–127592. [Google Scholar] [CrossRef]
- Kardi, A.; Zagrouba, R. Securing Wake Up Radio for Green Wireless Sensor Networks against Denial of Sleep Attacks. Int. J. Sens. Netw. 2021, 36, 115–124. [Google Scholar] [CrossRef]
- Fotohi, R.; Bari, S. A Novel Countermeasure Technique to Protect WSN against Denial-of Sleep Attacks Using Firefly and Hopfield Neural Networks (HNN) Algorithms. J. Supercomput. 2020, 76, 6860–6886. [Google Scholar] [CrossRef]
- Kim, S.; Park, S.; Lee, J.; Lee, I. Secure Triggering Frame-Based Dynamic Power Saving Mechanism against Battery Draining Attack in Wi-Fi-Enabled Sensor Networks. Sensors 2024, 24, 5131. [Google Scholar] [CrossRef] [PubMed]
- Mujhtar, M.; Lashari, M.; Alhussein, M.; Karim, S.; Aurangzeb, K. Energy-Efficient Framework to Mitigate Denial of Sleep Attacks in Wireless Body Area Networks. IEEE Access 2024, 12, 122918–122928. [Google Scholar] [CrossRef]
- Islam, M.; Fahmin, A.; Hossain, M.; Atiquzzaman, M. Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques. Wirel. Pers. Commun. 2020, 79, 1993–2021. [Google Scholar] [CrossRef]
- Premkumar, M.; Sundararajan, T. DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks. Microprocess. Microsystems 2021, 116, 103278. [Google Scholar] [CrossRef]
- Fu, H.; Liu, Y.; Dong, Z.; Wu, Y. A Data Clustering Algorithm for Detecting Selective Forwarding Attack in Cluster-Based Wireless Sensor Networks. Sensors 2019, 20, 23. [Google Scholar] [CrossRef] [PubMed]
- Li, Y.; Wu, Y. Combine Clustering with Game to Resist Selective Forwarding in Wireless Sensor Networks. IEEE Access 2020, 8, 138382–138395. [Google Scholar] [CrossRef]
- Zhang, Q.; Zhang, W. Accurate Detection of Selective Forwarding Attack in Wireless Sensor Networks. Int. J. Distrib. Sens. Netw. 2019, 15, 1–8. [Google Scholar] [CrossRef]
- Ding, J.; Zhang, H.; Guo, Z.; Wu, Y. The DPC-Based Scheme for Detecting Selective Forwarding in Clustered Wireless Sensor Networks. IEEE Access 2021, 9, 20954–20967. [Google Scholar] [CrossRef]
- Ding, J.; Wang, H.; Wu, Y. The Detection Scheme Against Selective Forwarding of Smart Malicious Nodes With Reinforcement Learning in Wireless Sensor Networks. IEEE Sensors 2022, 22, 13696–13706. [Google Scholar] [CrossRef]
- Singh, S.; Saini, H. Learning-Based Security Technique for Selective Forwarding Attack in Clustered WSN. Wirel. Pers. Commun. 2021, 118, 789–814. [Google Scholar] [CrossRef]
- Huang, X.; Wu, Y. Identify Selective Forwarding Attacks Using Danger Model: Promote the Detection Accuracy in Wireless Sensor Networks. IEEE Sensors J. 2022, 22, 9997–10008. [Google Scholar] [CrossRef]
- Huang, X.; Li, S.; Wu, Y. LSTM-NV: A Combined Scheme against Selective Forwarding Attack in Event-driven Wireless Sensor Networks under Harsh Environments. Eng. Appl. Artif. Intell. 2023, 137, 106441. [Google Scholar] [CrossRef]
- Li, Q.; Ma, Y.; Wu, Y. Utilize DBN and DBSCAN to Detect Selective Forwarding Attacks in Event-driven Wireless Sensors Networks. Eng. Appl. Artif. Intell. 2023, 126, 107122. [Google Scholar] [CrossRef]
- Sharmaa, D.; Dhurandhera, S.; Kumarama, S.; Guptab, K.; Sharma, P. Mitigation of Black hole Attacks in 6LoWPANRPL-based Wireless Sensor Network for Cyber Physical Systems. Comput. Commun. 2022, 189, 182–192. [Google Scholar] [CrossRef]
- Suma, S.; Harsoor, B. An Approach to Detect Black Hole Attack for Congestion Control Utilizing Mobile Nodes in Wireless Sensor Network. Mater. Today Proc. 2022, 56, 2256–2260. [Google Scholar] [CrossRef]
- Hasan, A.; Khan, M.; Shabir, B.; Munir, A.; Malik, A.; Anwar, Z.; Ahmad, J. Forensic Analysis of Blackhole Attack in Wireless Sensor Networks/Internet of Things. Appl. Sci. 2022, 12, 11442. [Google Scholar] [CrossRef]
- Binthiya, A.; Ravindran, S. Intelligent Fuzzy Logic Based Intrusion Detection System for Effective Detection of Black Hole Attack in WSN. In Peer-to-Peer Networking and Applications; Springer: New York, NY, USA, 2024. [Google Scholar]
- Ye, Q.; Wang, Y.; Xi, M.; Tang, Y. Recognition of Grey Hole Attacks in Wireless Sensor Networks Using Fuzzy Logic in IoT. Trans. Emerg. Telecommun. Technol. 2019, 31, e3873. [Google Scholar] [CrossRef]
- Chinnaraju, G.; Nithyanandam, S. Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks. Comput. Syst. Sci. Eng. 2022, 42, 373–386. [Google Scholar] [CrossRef]
- Shahid, J.; Muhammad, Z.; Iqbal, Z.; Almadhor, A.; Javed, A. Cellular Automata Trust-based Energy Drainage Attack Detection and Prevention in Wireless Sensor Networks. Comput. Commun. 2021, 191, 360–367. [Google Scholar] [CrossRef]
- Bhatti, D.S.; Saleem, S.; Ali, Z.; Park, T.J.; Suh, B.; Kamran, A.; Buchanan, W.J.; Kim, K.I. Design and Evaluation of Memory Efficient Data Structure Scheme for Energy Drainage Attacks in Wireless Sensor Networks. IEEE Access 2023, 12, 41499–41516. [Google Scholar] [CrossRef]
- Sihomnou, I.; Benslimane, A.; Ahmed, H.; Hemida, A.; Deugoue, G.; Kamhoua, C. Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks. In Proceedings of the International Conference on Computing, Networking and Communications, Big Island, HI, USA, 19–22 February 2024. [Google Scholar]
- Luo, X.; Chen, Y.; Li, M.; Luo, Q.; Xue, K.; Liu, S. CREDND: A Novel Secure Neighbor Discovery Algorithm for Wormhole Attacks. IEEE Access 2019, 7, 18194–18205. [Google Scholar] [CrossRef]
- Ahutu, O.; El-ocla, H. Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks. IEEE Access 2020, 80, 63270–63282. [Google Scholar] [CrossRef]
- Tamilarasi, N.; Santhi, S. Detection of Wormhole Attack and Secure Path Selection in Wireless Sensor Network. Wirel. Pers. Commun. 2020, 114, 329–345. [Google Scholar] [CrossRef]
- Shahid, H.; Ashraf, H.; Javed, H.; Humayun, M.; Jhanjhi, N.; AlZain, M. Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks. Comput. Mater. Contin. 2020, 68, 1967–1981. [Google Scholar] [CrossRef]
- Teng, Z.; Du, C.; Li, M.; Zhang, H.; Zhu, W. A Wormhole Attack Detection Algorithm Integrated with the Node Trust Optimization Model in WSNs. IEEE Sensors J. 2022, 22, 7361–7370. [Google Scholar] [CrossRef]
- Alajlan, A. Multi-Step Detection of Simplex and Duplex Wormhole Attacks over Wireless Sensor Networks. Comput. Mater. Contin. 2022, 70, 4241–4259. [Google Scholar] [CrossRef]
- Garg, R.; Gulati, T.; Kumar, S. Wormhole Attack Detection and Recovery for Secure Range Free Localization in Large-scale Wireless Sensor Networks. Peer-to-Peer Netw. Appl. 2023, 16, 2833–2849. [Google Scholar] [CrossRef]
- Babareer, H.; Al-ahmadi, S. Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking. IEEE Access 2020, 8, 92098–92109. [Google Scholar]
- Teng, Z.; Li, M.; Yu, L.; Gu, J.; Li, M. Sinkhole Attack Defense Strategy Integrating SPA and Jaya Algorithms in Wireless Sensor Networks. Sensors 2023, 23, 9709. [Google Scholar] [CrossRef] [PubMed]
- Khedr, A.; Raj1, P.; Rani, S. Time Synchronized Multivariate Regressive Convolution Deep Neural Network Model for Sinkhole Attack Detection in WSN. Wirel. Pers. Commun. 2024, 134, 361–382. [Google Scholar] [CrossRef]
- Arshad, A.; Hanapi, Z.; Subramaniam, S.; Latip, R. A Survey of Sybil Attack Countermeasures in IoT-based Wireless Sensor Networks. PeerJ Comput. Sci. 2021, 7, e673. [Google Scholar] [CrossRef] [PubMed]
- Khan, T.; Singh, K. DTMS: A Dual Trust-Based Multi-level Sybil Attack Detection Approach in WSNs. Wirel. Pers. Commun. 2024, 134, 1389–1420. [Google Scholar] [CrossRef]
- Gong, P.; Chen, T.; Xu, P. Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks. Networks 2022, 2, 83–105. [Google Scholar] [CrossRef]
- Arunachalam, R.; Kanmani, E. Detection and Mitigation of Vampire Attacks with Secure Routing in WSN Using Weighted RNN and Optimal Path Selection. Comput. Secur. 2024, 145, 103991. [Google Scholar] [CrossRef]
- Al-naeem, M. Prediction of Re-Occurrences of Spoofed ACK Packets Sent to Deflate a Target Wireless Sensor Network Node by DDOS. IEEE Access 2021, 9, 87070–87078. [Google Scholar] [CrossRef]
- Kumar, B.; Gowda, K. Detection and Prevention of TCP SYN Flooding Attack in WSN Using Protocol Dependent Detection and Classification System. In Proceedings of the IEEE International Conference on Data Science and Information System, Hassan, India, 29–30 July 2022. [Google Scholar]
- Shi, L.; Liu, Q.; Shao, J.; Cheng, Y. Distributed Localization in Wireless Sensor Networks Under Denial-of-Service Attacks. IEEE Control. Syst. Lett. 2021, 5, 493–498. [Google Scholar] [CrossRef]
- Shi, L.; Shi, H.; Ma, Z.; Yan, S.; Zhou, Y. Barycentric Coordinate-Based Distributed Localization for Mobile Sensor Networks Under Denial-of-Service Attacks. IEEE Trans. Ind. Inform. 2024, 20, 8019–8030. [Google Scholar] [CrossRef]
- Nguyen, T.; Le, V.; Chu, S.; Liu, B.; Hsu, Y. Secure Localization Algorithms Against Localization Attacks in Wireless Sensor Networks. Wirel. Pers. Commun. 2022, 127, 767–792. [Google Scholar] [CrossRef]
- Yu, X.; Wang, X.; Liu, Y. Secure Positioning of Wireless Sensor Networks against Wormhole Attacks. Telecommun. Syst. 2024, 87, 835–843. [Google Scholar] [CrossRef]
- John, A.; Isnin, I.; Madni, S.; Faheem, M. Cluster-based Wireless Sensor Network Framework for Denial-of-service Attack Detection Based on Variable Selection Ensemble Machine Learning Algorithms. Intell. Syst. Appl. 2024, 22, 200381. [Google Scholar] [CrossRef]
- Khan, M.; Shalu; Naveed, Q.; Lasisi, A.; Kaushik, S.; Kumar, S. A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks. Wirel. Pers. Commun. 2024, 137, 1997–2036. [Google Scholar] [CrossRef]
- Hu, J.; Yang, X.; Yang, L. A Framework for Detecting False Data Injection Attacks in Large-Scale Wireless Sensor Networks. Sensors 2024, 24, 1643. [Google Scholar] [CrossRef] [PubMed]
- Alturki, R.; Altamain, H.; Ikram, M.; Rrhman, M.; Alshehri, M.; Khan, F.; Haleem, M. Sensor-Cloud Architecture: A Taxonomy of Security Issues in Cloud-Assisted Sensor Networks. IEEE Access 2021, 9, 89344–89359. [Google Scholar] [CrossRef]
- Miranda, C.; Kaddoum, G.; Bou-har, E.; Garg, S.; Kaur, K. A Collaborative Security Framework for Software-Defined Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2602–2615. [Google Scholar] [CrossRef]
- Luo, S.; Lai, Y.; Liu, J. Selective Forwarding Attack Detection and Network Recovery Mechanism Based on Cloud-edge Cooperation in Software-defined Wireless Sensor Network. Comput. Secur. 2023, 126, 103083. [Google Scholar] [CrossRef]
- Jurodo-lasso, F.; Marchegiani, L.; Jurado, J.; Abu-mahfouz, A.; Fafoutis, X. A Survey on Machine Learning Software-Defined Wireless Sensor Networks (ML-SDWSNs):Current Status and Major Challenges. IEEE Access 2022, 10, 23560–23592. [Google Scholar] [CrossRef]
- Mathebula, I.; Isong, B.; Gasela, N.; Abu-Mahfouz, A. Analysis of SDN-Based Security Challenges and Solution Approaches for SDWSN Usage. In Proceedings of the IEEE 28th International Symposium on Industrial Electronics (ISIE), Vancouver, BC, Canada, 12–14 June 2019. [Google Scholar]
- Belachew, H.; Beyene, M.; Desta, A.; Alemu, B.; Musa, S.; Muhammed, A. Design a Robust DDoS Attack Detection and Mitigation Scheme in SDN-Edge-IoT by Leveraging Machine Learning. IEEE Access 2025, 13, 10194–10214. [Google Scholar] [CrossRef]
- Mustafa, R.; Sarkar, N.; Mohaghegh, M.; Pervez, S. A Cross-Layer Secure and Energy-Efficient Framework for the Internet of Things: A Comprehensive Survey. Sensors 2024, 24, 7209. [Google Scholar] [CrossRef]
- Borgiani, V.; Moratori, P.; Kazienko, J.; Tubino, E.; Quincozes, S. Toward a Distributed Approach for Detection and Mitigation of Denial-of-Service Attacks Within Industrial Internet of Things. IEEE Internet Things J. 2021, 8, 4569–4578. [Google Scholar] [CrossRef]
- Chandnani, N.; Khairnar, C. Bio-Inspired Multilevel Security Protocol for Data Aggregation and Routing in IoT WSNs. Mob. Netw. Appl. 2022, 27, 1030–1049. [Google Scholar] [CrossRef]
- Ramasamy, L.; Firoz, K.; Imoize, A.; Ogbebor, J.; Kadry, S.; Rho, S. Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey. IEEE Access 2021, 9, 128765–128785. [Google Scholar] [CrossRef]
- Arachchige, K.; Branch, P.; But, J. An Analysis of Blockchain-Based IoT Sensor Network Distributed Denial of Service Attacks. Sensors 2024, 24, 3083. [Google Scholar] [CrossRef] [PubMed]
- Ahmad, R.; Wazirali, R.; Abu-ain, T. Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 2022, 22, 4730. [Google Scholar] [CrossRef] [PubMed]
- Ahmad, R.; Wazirali, R.; Abu-ain, T. An Extended Evaluation on Machine Learning Techniques for Denial-of-Service Detection in Wireless Sensor Networks. Internet Things 2023, 22, 100684. [Google Scholar]
- Salmi, S.; Oughdir, L. Performance Evaluation of Deep Learning Techniques for DoS Attacks Detection in Wireless Sensor Network. J. Big Data 2023, 10, 17. [Google Scholar] [CrossRef]
- Dener, M.; Okur, C.; Al, S.; Orman, A. WSN-BFSF: A New Data Set for Attacks Detection in Wireless Sensor Networks. IEEE Internet Things 2024, 11, 2109–2125. [Google Scholar] [CrossRef]
- Okur, C.; Orman, A.; Dener, M. DDOS Intrusion Detection with Machine Learning Models: N-BaIoT Data Set. In Proceedings of the International Conference on Artificial Intelligence and Applied Mathematics in Engineering; Springer: New York, NY, USA, 2022. [Google Scholar]
- Xu, W.; Ma, K.; Trappe, W.; Zhang, Y. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Netw. 2006, 20, 41–47. [Google Scholar]
- Cao, X.; Shila, D.; Cheng, Y.; Yang, Z.; Zhou, Y.; Chen, J. Ghostin-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks. IEEE Internet Things 2016, 3, 816–829. [Google Scholar] [CrossRef]
- Dong, Q.; Liu, D.; Ning, P. Providing DoS Resistance for Signature Based Broadcast Authentication in Sensor Networks. ACM Trans. Embed. Comput. Syst. 2013, 12, 1–26. [Google Scholar] [CrossRef]
- Wood, A.; Stankovic, J.; Zhou, G. DEEJAM: Defeating Energy Efficient Jamming in IEEE 802.15.4-Based Wireless Networks. In Proceedings of the IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, USA, 18–21 June 2007. [Google Scholar]
- Capossele, A.; Cervo, V.; Petrioli, C.; Spenza, D. Counteracting Denial-of-sleep Attacks in Wake-up-radio-based Sensing Systems. In Proceedings of the Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), London, UK, 27–30 June 2016. [Google Scholar]
Acronym | Meaning |
---|---|
WSNs | Wireless Sensor Networks |
EDA | Energy Depletion Attack |
IoT | Internet of Things |
PLA | Physical-Layer Authentication |
JAD | Jamming Attack Detection |
DRL | Deep Reinforcement Learning |
MAC | Medium Access Control |
BMAC | Berkeley MAC |
LMAC | Lightweight MAC |
DoS | Denial of Service |
WUR | Wake-Up Radio |
DCA | Data Clustering Algorithm |
CH | Cluster Head |
LSTM | Long Short-Term Memory |
RPL | Ripple Routing Protocol |
AODV | Ad hoc On-demand Distance Vector |
GHA | Gray Hole Attack |
RSSI | Received Signal Strength Index |
DP | Detection Packet |
FP | Feedback Packet |
PSO | Particle Swarm Optimization |
FCM | Fuzzy C-Means |
PCA | Principal Component Analysis |
SDN | Software Defined Networks |
Reference | Year | Number of Articles | Requirement | Surveyed Research Areas | Research Challenges |
---|---|---|---|---|---|
[2] | 2006 | 106 | availability, authorization, authentication, confidentiality, integrity, non-repudiation, freshness | cryptography, key management, secure routing, secure data aggregation, intrusion detection | private key operations on sensor nodes, secure routing protocols for mobile sensor networks, Continuous stream security in WSNs, QoS and security |
[3] | 2009 | 152 | availability, authorization, authentication, confidentiality, integrity, non-repudiation, freshness | cryptography, key management, attack detections and preventions, secure routing, secure location, secure data fusion | security–energy evaluation, information assurance, survivability evaluation, trust evaluation, end-to-end security |
[4] | 2012 | 172 | availability, authorization, authentication, confidentiality, integrity, non-repudiation, freshness, self-organization, secure localization, time synchronization | cryptography, key management, secure routing, secure data aggregation, intrusion detection, traffic analysis, sensor privacy, sybil attack, node replication, trust management | time synchronization, scalability and efficiency, defending DoS attacks, continuous stream security |
[5] | 2015 | 37 | availability, confidentiality, integrity, freshness, robustness, access control | key management, authentication, secure routing | key management, certification, security routing |
[6] | 2017 | 70 | availability, confidentiality, integrity, freshness, accessibility, robustness/resiliency, self-Organization, time synchronization | cryptography, key management, encryption | evaluation of the network’s performance |
[7] | 2020 | 95 | availability, authorization, authentication, confidentiality, integrity, non-repudiation, freshness, access control, self-organization, time synchronization, secure location, forward & backward secrecy, quality of service | secure energy, secure infrastructure, secure mobility, secure deployment, secure connectivity, secure heterogeneity | consistency of proposed argument |
[8] | 2023 | 145 | availability, confidentiality, integrity | key management, secure routing, intrusion detection | machine learning, privacy, resilience, dataset |
[9] | 2024 | 72 | availability, authentication, confidentiality, integrity | cryptography, key management, secure routing, intrusion detection, privacy preservation, traffic management, position and path Verification | secure routing protocols, stream security, QoS and security |
[10] | 2025 | 120 | availability, authentication, confidentiality, integrity | cryptography, secure group management, secure data aggregation, intrusion detection, distributed node behavior control | physical layer key generation, post-quantum security, artificial intelligence, blockchain |
Mode | Sensing | Processing | Reception | Transmission | Stand by | Idle |
---|---|---|---|---|---|---|
Percent | 4.4% | 6.7% | 26.7% | 33.3% | 24.4% | 4.4% |
Mode | Sensing | Processing | Communications | Stand by | Init, Actuation, Log |
---|---|---|---|---|---|
Percent | 6.0% | 12.0% | 51.0% | 24.4% | 21.6% |
Reference | Key Features | Advantage | Disadvantage |
---|---|---|---|
[26] | Physical-layer authentication | High applicability | High complexity |
[27] | Game theoretic mobility scheme | Low energy consumption and less network overhead | Flow-table updates |
[28] | Pinpointed anti-jammer localizer | Low energy consumption | Comparison with relative old standards |
[29] | Evolutionary Fibonacci Branch Search | High reachability and fast convergence | High complexity |
[33] | Multi-agent Q-learning | prompt decision for anti-jamming strategy | Space complexity for Q-table and joint Q-table |
[34] | Neural network | High adaptability | Multiple antennas |
[35] | Deep reinforcement learning | Quick adaptability for new environments | High complexity |
Reference | Key Features | Advantage | Disadvantage |
---|---|---|---|
[42] | Cryptography and authentication | High adaptability | Maintenance overhead for clustering |
[43] | Threshold limit | Specified WUR networks | Certain training period |
[44] | Distributed cooperation model | Load balancing | Overhead for data collection |
[45] | Cryptography and authentication | Low computational cost consumption | High memory usage |
[46] | Secure trigger frame | Supporting multi links | Increased latency |
[47] | Event aggregation and controlled transmissions | Low computing overhead | Low adaptability |
Reference | Key Features | Advantage | Disadvantage |
---|---|---|---|
[68] | Hop difference and local monitoring | Low computing overhead | Low adaptability |
[69] | Time Ratio Threshold | Centralized routing protocol | Single of failure on base station |
[70] | Round trip time | Multiple paths | Comparison with old method |
[71] | Round trip time | Low computing overhead | Comparison with one method |
[72] | Node trust optimization model | No additional hardware | No quantitative evaluation for delivery ratio, delay, throughput |
[73] | Localization for anchor node | No additional hardware | Comparison with benchmarks not specialized for WSN |
Year | Dataset Name | Security Relevance | Attack Types | Simulation Environment |
---|---|---|---|---|
1999 | KDD Cup | Yes | Denial of Service, Probing Attack, Remote to Local Attack, User to Root Attack | Yes |
2009 | NSL-KDD | Yes | Denial of Service, Probing Attack, Remote to Local Attack, User to Root Attack | No |
2015 | SWaT | Yes | Various cyber attack scenarios | No |
2015 | UNSW-NB15 | Yes | Denial of Service, Exploitation Attack, General Cyber Attack, Shellcode Injection Attack, Backdoor Attack, Fuzzing Attack, Reconnaissance Attack, Worms, Normal | No |
2016 | WSN-DS | Yes | Blackhole, Grayhole, Flooding, Scheduling (TDMA), Normal | Yes |
2017 | CIC-IDS2017 | Yes | Brute Force Attack, HeartBleed Attacks, Botnet Attack, Distributed Denial of Service, Denial of Service, Web-based Attack, Network Infiltration Attack | No |
2022 | Edge-IIoTset | Yes | Distributed Denial of Service, Mirai Botnet Attack, Man-in-the-Middle Attack, Malware Injection Attack | No |
2023 | DoS/DDoS-MQTT-IoT | Yes | Brute Force Denial of Service, Delay-based Denial of Service, Invalid Subscription Flooding Denial of Service, Will Payload Attack | No |
2024 | WSN-Leach | Yes | Blackhole, Grayhole, Flooding, TDMA (Scheduling) | Yes |
2024 | WSN-BFSF | Yes | Blackhole, Flooding, Selective Forwarding, Normal | Yes |
2024 | ROS-WSN-DS | Yes | Blackhole, Grayhole, Flooding, Scheduling | Yes |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, J.-K.; Choi, Y.-R.; Suh, B.-K.; Jung, S.-W.; Kim, K.-I. A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks. Appl. Sci. 2025, 15, 2213. https://doi.org/10.3390/app15042213
Lee J-K, Choi Y-R, Suh B-K, Jung S-W, Kim K-I. A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks. Applied Sciences. 2025; 15(4):2213. https://doi.org/10.3390/app15042213
Chicago/Turabian StyleLee, Joon-Ku, You-Rak Choi, Beom-Kyu Suh, Sang-Woo Jung, and Ki-Il Kim. 2025. "A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks" Applied Sciences 15, no. 4: 2213. https://doi.org/10.3390/app15042213
APA StyleLee, J.-K., Choi, Y.-R., Suh, B.-K., Jung, S.-W., & Kim, K.-I. (2025). A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks. Applied Sciences, 15(4), 2213. https://doi.org/10.3390/app15042213