TY - JOUR ID - 161800 TI - Application on Wireless Sensor Networks in Domestic and Hostile Environment JO - Computational Algorithms and Numerical Dimensions JA - CAND LA - en SN - 2980-7646 AU - fan, lu AD - Beijing Technology and Business University, China Y1 - 2022 PY - 2022 VL - 1 IS - 3 SP - 104 EP - 109 KW - Wireless Sensor Network KW - IoT KW - Smart Home DO - 10.22105/cand.2022.161800 N2 - Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2 which operate autonomously conditions such as cost invisible deployment and many application domains, lead to small size and limited resources sensors. WSNs are susceptible to many types of link layer attacks and most of traditional networks security techniques are unusable on WSNs  due to wireless and shared nature of communication channel, untrusted transmissions, deployment in open environments, unattended nature and limited resources. So, security is a vital requirement for these networks; but we have to design a proper security mechanism that attends to WSN's constraints and requirements. In this paper, we focus on security of WSNs, divide it (the WSNs security) into four categories and will consider them, include: an overview of WSNs, security in WSNs, the threat model on WSNs, a wide variety of WSNs' link layer attacks and a comparison of them. This work enables us to identify the purpose and capabilities of the attackers; also, the goal and effects of the link layer attacks on WSNs are introduced. Also, this paper discusses known approaches of security detection and defensive mechanisms against the link layer attacks; this would enable it security managers to manage the link layer attacks of WSNs more effectively. UR - https://www.journal-cand.com/article_161800.html L1 - https://www.journal-cand.com/article_161800_e3e77de7a30a97e5503cbb7430230c41.pdf ER -