Countermeasures in Wireless Sensor Networks Attacks

A Summary of Countermeasures in Wireless Sensor Networks Attacks

Student’s Name:

Institutional /affiliation:

DSRT837 – M20 Prof Writing & Proposal Devel

Instructor’s Name:

Date of Submission:

A Summary of Countermeasures in Wireless Sensor Networks Attacks

Wireless sensor networks are gaining popularity in the world due to their wide applications in crucial areas such as smart homes, buildings, traffic surveillance, and battlegrounds. The major challenge facing wireless sensor networks is securing them from various cyberattacks (Shahzad et al., 2017). The network is vulnerable to cyber attacks massively affecting intrinsic memory and power restrictions of sensor nodes. There are high possibilities of abusing sensing knowledge and wireless communication when a cybersecurity attack hits. The article focuses on various countermeasures on wireless sensor networks as proposed by various researchers.

The wireless sensor network is applied in various areas such as environmental monitoring and medical care. The wireless sensor networks are widely used by homeland security and surveillance on the battlefields since they are effective and simple in installation. The systems require to be secured due to the hostility of the environment and major threats.

The main objective of wireless security networks regarding security is to protect their resources and data from attacks. The main threats include theft of information, access to data through traffic analysis, trojan horse, and altering the system’s data. The article categorizes security measures into confidentiality, integrity, availability, and non-repudiation measures.

The confidentiality security measures ensure that only the accepted recipients understand the messages and it can be made possible by ensuring there are strong passwords, firewalls with access control lists, audit logging, and an intrusion detection system (Borky & Bradley, 2019). Integrity countermeasure ensures no one can modify the intermediate nodes in the network. Experts can ensure the installation of digital signatures and offer access according to role-based access control.

Also Read  ERM contribution to shareholder value

In conclusion, the availability countermeasure ensures that there are services available even during the time of the attack. The non-repudiation ensures that no one can generate authenticity of the user’s signatures.


Borky, J. M., & Bradley, T. H. (2019). Protecting information with cybersecurity. In Effective Model-Based Systems Engineering (pp. 345-404). Springer, Cham.

Shahzad, F., Pasha, M., & Ahmad, A. (2017). A survey of active attacks on wireless sensor networks and their countermeasures. arXiv preprint arXiv:1702.07136.

Last Updated on June 13, 2021 by EssayPro