Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 364

Survey Paper | Electronics & Communication Engineering | India | Volume 3 Issue 12, December 2014 | Popularity: 6.4 / 10


     

Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks

Riyazahmed A Jamadar, Mousami. S Vanjale


Abstract: In this paper, we emphasize and discuss some attacks on wireless sensor network which are of crucial significance to the performance and existence of it. The wireless sensor networks are resource constrained, more particularly power and memory. Attacks such as Sybil, HELLO, Wormhole and Sinkhole basically target routing of packets and degrade the throughput and performance of network by draining out power and memory. This paper underlines and describes the need of robust routing protocols to secure the wireless sensor network against such attacks. A comprehensive study of existing protocols such as Directed Diffusion, TinyOS beaconing, Geographic and Rumor routings is been presented here along with future research scope.


Keywords: Wireless Sensor network, Threat Analysis, Routing Protocol, Performance


Edition: Volume 3 Issue 12, December 2014


Pages: 1410 - 1413



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Riyazahmed A Jamadar, Mousami. S Vanjale, "Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1410-1413, https://www.ijsr.net/getabstract.php?paperid=SUB14728, DOI: https://www.doi.org/10.21275/SUB14728

Top