Abstract

WSN are made of hundreds of constraints dependent sensors for solving real world sensitive applications. These nodes are scattered over an area to monitor and record the data as desired by the application and to forward same to the center node for further observation, which may generate an alert to control the situation. In recent years, WSN has been grown tremendously in the applications, resulted the demand of a strong, consistent security mechanism. WSN issues, challenges are needed to be addressed for designing such security mechanism. Irrespective of various limited capabilities of nodes, even, on-time collection of information and reliable, secure delivery is expected in WSN. Tiny sensors with small hardware, processing capabilities and limited power resource cannot afford traditional security measures to fight against vulnerabilities. Different layers of WSN nodes have variety of roles to play for proper their proper functioning at different layers like signaling, framing, forwarding, reliable transportation and user interaction at both receiving as well as sending end. Many denial of service attacks are identified at each layer which are meant for purposeful, planned attacks to jeopardize the availability of service, restricting the WSN utility for application. In this paper we will focus on the WSN characteristics, constraints and types of DoS attacks at different layer.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call