ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SURVEY OF IDENTIFICATION TECHNIQUES OF ADVERSARY ATTACKS IN WIRELESS SENSOR NETWORK

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.6, No. 7)

Publication Date:

Authors : ; ;

Page : 1-9

Keywords : GMFAD; CDAL-M; RSS; DoS and WSN; Iaeme Publication; IAEME; Technology; Engineering; IJCET;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Adversary Attackers take the identity of another node in the wireless sensor network and establish a connection that will allow gaining access to the other hosts and their important and personnel data. It will reduce the performance of the network and disrupt many security issues. With the open medium, distributed cooperation and constrained capabilities, the wireless sensor nodes are more unprotected to such type of attacks compared with wired networks. The conventional security approaches such as cryptographic mechanisms are not always desirable because it requires key management and additional infrastructural overheads. The detection and localization of multiple attacks makes complex when the multiple number of attackers attacks the wireless sensor network. This paper describes to use spatial information received signal strength, a natural property associated with each node identity, difficult to falsify, and not relevant process on cryptography, as the basis for 1) Detection of adversary attacks 2) Determining the number of attackers when multiple adversaries masquerading as the same node identity 3) Localizing multiple adversary attackers and 4) Detection of Denial of service attack.

Last modified: 2016-05-27 21:29:16