Downloads: 107 | Views: 241
M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.2 / 10
A Review on Various Routing Attacks on Wireless Sensor Network
Aruna Rantore, Kapil Vyas
Abstract: Security is relevant for many sensor network applications. Wireless Sensor Networks (WSN) is often deployed in hostile environments as static or mobile, where an antagonist can physically capture some of the nodes, once a node is captured, antagonist collects all the credentials like keys and identity etc. the attacker can re-program it and repeat the node in order to eavesdrop the transmitted messages or adjustment the functionality of the network. Identity burglary leads to two types attack clone and Sybil. In particularly a catastrophic attack against sensor networks where one or more node (s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be enormously injurious to many important functions of the sensor network such as routing, resource allocation, mis-behavior detection, etc.
Keywords: Security, Clone, Sybil, node replication attack and static WSN
Edition: Volume 5 Issue 4, April 2016
Pages: 1994 - 1998
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Working Project, Electronics & Communication Engineering, India, Volume 11 Issue 11, November 2022
Pages: 807 - 810Voice Control Home Automation using Adafruitio and IFTTT
R. Kiruthikaa
Downloads: 0
Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022
Pages: 143 - 144Blockchain Based Access Control System for Cloud Storage
Kamisetty Vinay
Downloads: 0
Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022
Pages: 155 - 160Securing Data with Blockchain and AI
Kamisetty Vinay
Downloads: 1
Research Paper, Electronics & Communication Engineering, Egypt, Volume 10 Issue 12, December 2021
Pages: 1281 - 1287Feature Level Fusion of Palmprint and Iris Images for Person Identification
May Essam, Fayez Wanis Zaki, Mervat El-Seddek
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1067 - 1069A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking
Jagtap. D. V, M. D. Patil