Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks release_rev_5015f9d9-6396-4941-9e3f-bb050569b18f

by Sunil Gupta, Harsh Verma, A Sangal

Released as a article-journal .

2012  

Abstract

Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power. WSNs are mostly unguarded. Hence capturing a node physically, altering its code and getting private information like cryptographic keys is easily possible for an attacker. Wireless medium is inherently broadcast in nature. This makes them vulnerable to attacks. These attacks can disrupt the operation of WSN and can even defeat the purpose of their deployment. In this paper, we study techniques and examine their performance in terms of successful masquerade detection rate, traffic and computational overhead. Index Terms-masquerade detection, Sensor networks, security and Protection.
In text/plain format

Type  article-journal
Stage   unknown
Year   2012
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Revision

This is a specific, static metadata record, not necessarily linked to any current entity in the catalog.

Catalog Record
Revision: 5015f9d9-6396-4941-9e3f-bb050569b18f
API URL: JSON