A Review on Various Routing Attacks on Wireless Sensor Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107 | Views: 321

M.Tech / M.E / PhD Thesis | Electronics & Communication Engineering | India | Volume 5 Issue 4, April 2016 | Popularity: 6.2 / 10


     

A Review on Various Routing Attacks on Wireless Sensor Network

Aruna Rantore, Kapil Vyas


Abstract: Security is relevant for many sensor network applications. Wireless Sensor Networks (WSN) is often deployed in hostile environments as static or mobile, where an antagonist can physically capture some of the nodes, once a node is captured, antagonist collects all the credentials like keys and identity etc. the attacker can re-program it and repeat the node in order to eavesdrop the transmitted messages or adjustment the functionality of the network. Identity burglary leads to two types attack clone and Sybil. In particularly a catastrophic attack against sensor networks where one or more node (s) illegitimately claims an identity as replicas is known as the node replication attack. The replication attack can be enormously injurious to many important functions of the sensor network such as routing, resource allocation, mis-behavior detection, etc.


Keywords: Security, Clone, Sybil, node replication attack and static WSN


Edition: Volume 5 Issue 4, April 2016


Pages: 1994 - 1998


DOI: https://www.doi.org/10.21275/2041603


Please Disable the Pop-Up Blocker of Web Browser

Verification Code will appear in 2 Seconds ... Wait



Text copied to Clipboard!
Aruna Rantore, Kapil Vyas, "A Review on Various Routing Attacks on Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 5 Issue 4, April 2016, pp. 1994-1998, https://www.ijsr.net/getabstract.php?paperid=2041603, DOI: https://www.doi.org/10.21275/2041603

Top