secure routing in wireless sensor networks attacks and countermeasures pdf

Secure routing in wireless sensor networks attacks and countermeasures pdf

File Name: secure routing in wireless sensor networks attacks and countermeasures .zip
Size: 25524Kb
Published: 16.11.2020

Journal of Sensors

chapter and author info

A Secure Routing Protocol for Wireless Sensor Networks

Journal of Sensors

Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. Use of this web site signifies your agreement to the terms and conditions. Secure routing in wireless sensor networks: attacks and countermeasures Abstract: We consider routing security in wireless sensor networks.

Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols.

We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks. Article :. DOI: Need Help?

chapter and author info

Regret for the inconvenience: we are taking measures to prevent fraudulent form submissions by extractors and page crawlers. Received: December 27, Published: February 9, Citation: Kalnoor G, Agarkhed J. Intrusion threats and security solutions in wireless sensor networks. Int Rob Auto J. DOI:

A Secure Routing Protocol for Wireless Sensor Networks

The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sink-rooted tree in the network which is used for secure data transmissions from the source sensors to the base station. We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys.

Routing is one of the most important operations in wireless sensor networks WSNs as it deals with data delivery to base stations. Routing attacks can cripple it easily and degrade the operation of WSNs significantly. Traditional security mechanisms such as cryptography and authentication alone cannot cope with some of the routing attacks as they come from compromised nodes mostly. Recently, trust mechanism is introduced to enhance security and improve cooperation among nodes.

Skip to Main Content. A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. Use of this web site signifies your agreement to the terms and conditions. Secure routing in wireless sensor networks: attacks and countermeasures Abstract: We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal.

Сьюзан положила руку на мышку и открыла сообщение, Это решит судьбу Хейла, - подумала.  - Хейл - это Северная Дакота.  - На экране появилось новое окошко.  - Хейл - это… Сьюзан замерла. Должно быть, это какая-то ошибка.

International Robotics & Automation Journal

Створки с шипением разъехались в стороны.

0 comments

Leave a reply