Sinkhole Vulnerabilities in Wireless Sensor Networks
نویسندگان
چکیده
منابع مشابه
Dealing with Sinkhole Attacks in Wireless Sensor Networks
Wireless sensor networks (WSNs) consist of many small wireless sensor nodes which are capable of sensing data and sending it to base stations. WSNs face resource constraints including limitations on communication, power, memory capacity and computational power. Also, since they are frequently deployed in hostile environments and left unattended, they are vulnerable to several attacks such as si...
متن کاملVulnerabilities and Attacks in Wireless Sensor Networks
We investigate how wireless sensor networks can be attacked in practice. From this we develop a generic adversary model that allows to classify adversaries according to two dimensions of power: presence and intervention. Thus, we provide a framework for realistic security analysis in wireless sensor networks.
متن کاملIntrusion Detection of Sinkhole Attacks in Wireless Sensor Networks
In this paper, we present an Intrusion Detection System designed for wireless sensor networks and show how it can be configured to detect Sinkhole attacks. A Sinkhole attack forms a serious threat to sensor networks. We study in depth this attack by presenting how it can be launched in realistic networks that use the MintRoute protocol of TinyOS. MintRoute is the most widely used routing protoc...
متن کاملHash Based Sinkhole Attack Detection Scheme For Wireless Sensor Networks
This paper investigates one of the most severe routing attacks in sensor networks, namely sinkhole attack. A compromised node tries to draw all or as much traffic as possible from a particular area, by making it look attractive to the surrounding nodes with respect to the underlying routing metric. The detection of sinkhole attack in wireless sensor networks is proposed using an enhanced double...
متن کاملSecurity Vulnerabilities In Wireless Sensor Networks: A Survey
The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network (WSN). Security is becoming a major concern for WSN protocol designers because of the wide security-critical applicat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2014
ISSN: 1738-9976,1738-9976
DOI: 10.14257/ijsia.2014.8.1.37