Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks release_qvjzf2s5hvb2vc7feffnku2sxi

by Sunil Gupta, Harsh Verma, A Sangal

Released as a article-journal .

2012  

Abstract

Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power. WSNs are mostly unguarded. Hence capturing a node physically, altering its code and getting private information like cryptographic keys is easily possible for an attacker. Wireless medium is inherently broadcast in nature. This makes them vulnerable to attacks. These attacks can disrupt the operation of WSN and can even defeat the purpose of their deployment. In this paper, we study techniques and examine their performance in terms of successful masquerade detection rate, traffic and computational overhead. Index Terms-masquerade detection, Sensor networks, security and Protection.
In text/plain format

Archived Files and Locations

application/pdf  501.3 kB
file_5sze6gd7wfd35eosiqgbmsyqh4
web.archive.org (webarchive)
www.ijctee.org (web)
Read Archived PDF
Preserved and Accessible
Type  article-journal
Stage   unknown
Year   2012
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 5015f9d9-6396-4941-9e3f-bb050569b18f
API URL: JSON