Security Techniques of WSN: A ReviewJournal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 11)
Publication Date: 2018-11-30
Authors : Gaurav Mehta; Parveen Singla; Rinkesh Mittal;
Page : 167-172
Keywords : WSN; LEACH; Sinkhole;
The wireless sensor node characteristics which include low memory, low computation power, and they are deployed in hostile area and left unattended, small range of communication capability. Based on these characteristics makes this network vulnerable to several attacks, such as sinkhole attack. Sinkhole attack is a type of attack where compromised node tries to attract network traffic. The impacts of sinkhole attack are that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack or altered routing information. It can also use to send fake information to the base station. In this paper we are focus on exploring and analyzing the existing solutions, which are used to detect and identify of the sinkhole attack in wireless sensor network.
Other Latest Articles
Last modified: 2018-12-01 16:31:30