A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues

Gaurav Sharma, Stilianos Vidalis, Niharika Anand, Catherine Menon, Somesh Kumar

Research output: Contribution to journalReview articlepeer-review

37 Downloads (Pure)


Security is a mandatory issue in any network, where sensitive data are transferred safely in the required direction. Wireless sensor networks (WSNs) are the networks formed in hostile areas for different applications. Whatever the application, the WSNs must gather a large amount of sensitive data and send them to an authorized body, generally a sink. WSN has integrated with Internet-of-Things (IoT) via internet access in sensor nodes along with internet-connected devices. The data gathered with IoT are enormous, which are eventually collected by WSN over the Internet. Due to several resource constraints, it is challenging to design a secure sensor network, and for a secure IoT it is essential to have a secure WSN. Most of the traditional security techniques do not work well for WSN. The merger of IoT and WSN has opened new challenges in designing a secure network. In this paper, we have discussed the challenges of creating a secure WSN. This research reviews the layer-wise security protocols for WSN and IoT in the literature. There are several issues and challenges for a secure WSN and IoT, which we have addressed in this research. This research pinpoints the new research opportunities in the security issues of both WSN and IoT. This survey climaxes in abstruse psychoanalysis of the network layer attacks. Finally, various attacks on the network using Cooja, a simulator of ContikiOS, are simulated.
Original languageEnglish
Article number2365
Number of pages23
Issue number19
Early online date28 Sept 2021
Publication statusPublished - 1 Oct 2021


  • denial of service
  • Internet-of-Things
  • routing protocol
  • low power
  • lossy network (RPL), physical attacks
  • sybil attacks
  • Wireless Sensor Network (WSN)
  • Denial of service
  • Low power
  • Sybil attacks
  • Routing protocol
  • Lossy network (RPL), physical attacks


Dive into the research topics of 'A Survey on Layer-Wise Security Attacks in IoT: Attacks, Countermeasures, and Open-Issues'. Together they form a unique fingerprint.

Cite this