Survey on Secure and Reliable Data Routing in WSN
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)Publication Date: 2016-11-05
Authors : Trupti Anil Bomble; M. D. Ingle;
Page : 1815-1819
Keywords : Wireless Sensor Networks; Network lifetime; Security; Trust; Attacks;
Abstract
Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved thereinsensor nodes are generally considered to not be tamper-proof. Hence, an attacker may clone catched sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attack and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.
Other Latest Articles
- Estimation of the Egg Albumen Weight in the Japanese Quails using Ridge Regression Method
- Multi-Scale Image Registration Algorithm Based on Morphological Gradient
- Review on Agricultural Soil Quality
- Histopathological Study of Fallopian Tube Carcinoma
- Reproductive Biology of Estuarine Catfish, Mystus Gulio (Hamilton-Buchanan)
Last modified: 2021-07-01 14:47:12