The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Security Threats in Wireless Sensor Networks
Abstract
Most of the applications of wireless sensor networks have critical tasks to be fulfilled; thus they must be secured. Recent studies focus on securing the communication between sensors and with the base station. An adversary can launch various types of attack on WSN depending on its ability and objective. These attacks can be broadly classified into two categories: 1) layer-dependent, and 2) layer-independent. Layer-dependent attacks are specific to communication protocol layers. They mostly target a node's functionality such as routing, availability, time synchronization, and data aggregation. Layer-independent attacks are not restricted to any communication protocol layers. These attacks can be launched independent of the communication protocol stack. In this chapter, we study the various attacks possessed by WSN and classify them based on their strength, action, security requirements and impact at different layers of WSN. We define metrics to evaluate the characteristic, behavior, and dependency of these attacks followed a discussion on various counter-measures to defend them.
Related Content
J. Mangaiyarkkarasi, J. Shanthalakshmi Revathy.
© 2024.
34 pages.
|
Gummadi Surya Prakash, W. Chandra, Shilpa Mehta, Rupesh Kumar.
© 2024.
22 pages.
|
Duygu Nazan Gençoğlan.
© 2024.
35 pages.
|
Smrity Dwivedi.
© 2024.
20 pages.
|
Pallavi Sapkale, Shilpa Mehta.
© 2024.
21 pages.
|
Pardhu Thottempudi, Vijay Kumar.
© 2024.
43 pages.
|
Sathish Kumar Danasegaran, Elizabeth Caroline Britto, S. Dhanasekaran, G. Rajalakshmi, S. Lalithakumari, A. Sivasangari, G. Sathish Kumar.
© 2024.
18 pages.
|
|
|