Security Techniques of WSN: A Review
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 11)Publication Date: 2018-11-30
Authors : Gaurav Mehta; Parveen Singla; Rinkesh Mittal;
Page : 167-172
Keywords : WSN; LEACH; Sinkhole;
Abstract
The wireless sensor node characteristics which include low memory, low computation power, and they are deployed in hostile area and left unattended, small range of communication capability. Based on these characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack where compromised node tries to attract network traffic. The impacts of sinkhole attack are that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack or altered routing information. It can also use to send fake information to the base station. In this paper we are focus on exploring and analyzing the existing solutions, which are used to detect and identify of the sinkhole attack in wireless sensor network.
Other Latest Articles
- ¿Es el ABC la mejor técnica de costeo aplicable en el Sector Financiero?
- Los museos y el cuadro de mando integral: Una adaptación de la perspectiva del cliente
- Los costos. Desde el ayer hasta el hoy
- La valuación al costo de los bienes de cambio y la realidad económica
- The Development of Learning Tools Using Software in Informatics Engineering Department
Last modified: 2018-12-01 16:31:30