ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Security Techniques of WSN: A Review

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 11)

Publication Date:

Authors : ; ; ;

Page : 167-172

Keywords : WSN; LEACH; Sinkhole;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The wireless sensor node characteristics which include low memory, low computation power, and they are deployed in hostile area and left unattended, small range of communication capability. Based on these characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack where compromised node tries to attract network traffic. The impacts of sinkhole attack are that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack or altered routing information. It can also use to send fake information to the base station. In this paper we are focus on exploring and analyzing the existing solutions, which are used to detect and identify of the sinkhole attack in wireless sensor network.

Last modified: 2018-12-01 16:31:30