Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks
release_rev_5015f9d9-6396-4941-9e3f-bb050569b18f
by
Sunil Gupta, Harsh Verma, A Sangal
2012
Abstract
Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power. WSNs are mostly unguarded. Hence capturing a node physically, altering its code and getting private information like cryptographic keys is easily possible for an attacker. Wireless medium is inherently broadcast in nature. This makes them vulnerable to attacks. These attacks can disrupt the operation of WSN and can even defeat the purpose of their deployment. In this paper, we study techniques and examine their performance in terms of successful masquerade detection rate, traffic and computational overhead. Index Terms-masquerade detection, Sensor networks, security and Protection.
In text/plain
format
article-journal
Stage
unknown
Year 2012
access all versions, variants, and formats of this works (eg, pre-prints)
This is a specific, static metadata record, not necessarily linked to any current entity in the catalog.