ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Secure and Reliable Data Routing in WSN

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)

Publication Date:

Authors : ; ;

Page : 1815-1819

Keywords : Wireless Sensor Networks; Network lifetime; Security; Trust; Attacks;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Wireless Sensor Networks (WSNs) are materializing as one of the dominant technologies of the future because of their large range of applications in military and civilian fields. Because of their operating behavior, they are often neglected and thus vulnerable to various types of attacks. For instance, an attacker could catch sensor nodes, getting all the information saved thereinsensor nodes are generally considered to not be tamper-proof. Hence, an attacker may clone catched sensor nodes and use them in the network to conduct a variety of mischievous activities. As the decisions taken by a sensor network rely on the information gathered by the sensor nodes, if an adversary inhibits the necessary or confidential data from being forwarded to the BS/ target, this will cause the whole breakdown of the network or outcomes in the wrong judgment being made, possibly causing deliberate loss. There are many types of attacks such as compromised node, denial of service attack, black hole attack, etc. Hence there is a necessity to find all such attacks in WSN, and to safely route our sensitive information to the target. This paper represents the survey of some types of attack and there detection techniques. Also the survey includes different techniques for secure and reliable data collection in Wireless Sensor Networks.

Last modified: 2021-07-01 14:47:12