A Review on Various Routing Attacks on Wireless Sensor Network
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 4)Publication Date: 2016-04-05
Authors : Aruna Rantore; Kapil Vyas;
Page : 1994-1998
Keywords : Security; Clone; Sybil; node replication attack and static WSN;
Abstract
Security is relevant for many sensor network applications. Wireless Sensor Networks (WSN) is often deployed in hostile environments as static or mobile, where an antagonist can physically capture some of the nodes, once a node is captured, antagonist collects all the credentials like keys and identity etc. the attacker can re-program it and repeat the node in order to eavesdrop the transmitted messages or adjustment the functionality of the network. Identity burglary leads to two types attack clone and Sybil. In particularly a catastrophic attack against sensor networks where one or more node (s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be enormously injurious to many important functions of the sensor network such as routing, resource allocation, mis-behavior detection, etc.
Other Latest Articles
- Excretion Pattern of Nickel and Vanadium in Guinea-Pigs Treated With Bonny Light Crude Oil
- Setting New Agenda: Critical Study of Perspectives of CSR Practices in Indian Private Corporate Hospitals
- On Fuzzy Weakly ?-continuous Multifunction
- Cycle Index Formulas for Dn Acting on Ordered Pairs
- Effect of Chlorpyrifos on Some Biochemical Constituents in Liver and Kidney of Fresh Water Fish,Channa Gachua (F.Hamilton)
Last modified: 2021-07-01 14:33:56