Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 12)Publication Date: 2014-12-05
Authors : Riyazahmed A Jamadar; Mousami. S Vanjale;
Page : 1410-1413
Keywords : Wireless Sensor network; Threat Analysis; Routing Protocol; Performance;
Abstract
In this paper, we emphasize and discuss some attacks on wireless sensor network which are of crucial significance to the performance and existence of it. The wireless sensor networks are resource constrained, more particularly power and memory. Attacks such as Sybil, HELLO, Wormhole and Sinkhole basically target routing of packets and degrade the throughput and performance of network by draining out power and memory. This paper underlines and describes the need of robust routing protocols to secure the wireless sensor network against such attacks. A comprehensive study of existing protocols such as Directed Diffusion, TinyOS beaconing, Geographic and Rumor routings is been presented here along with future research scope.
Other Latest Articles
- Electrochemical Sensor Based On Carbon Printed Electrode
- Nutrition Potential, Amino Acid Content and Mineral Analysis of Telfaira Occidentalis Vegetable Leaf Protein Concentrates
- Prediction of Energy Consumption in Residential Buildings Before and After Retrofitting using Artificial Neural Networks
- Survey on Software Defect Prediction Using Machine Learning Techniques
- A Survey on Integrity Protection Mechanisms for Open Mobile Platform
Last modified: 2021-06-30 21:15:01