Abstract
In wireless sensor networks, we look at routing security. There have been numerous sensor network routing protocols proposed, but none of them have been developed with security in mind. We propose security goals for sensor network routing, show how ad-hoc and peer-to-peer network attacks can be adapted into powerful sensor network attacks, introduce two new types of sensor network attacks––sinkholes and HELLO floods––and assess the security of all major sensor network routing protocols. We detail all of them as targets for debilitating attacks and offer countermeasures and design considerations. This is the first study of secure routing in sensor networks of its kind.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Research in Science, Communication and Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.