IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security Challenges in Wireless Sensor Network

Security Challenges in Wireless Sensor Network
View Sample PDF
Author(s): Meenakshi Tripathi (Malaviya National Institute of Technology, India), M.S. Gaur (Malaviya National Institute of Technology, India)and V. Laxmi (Malaviya National Institute of Technology, India)
Copyright: 2016
Pages: 26
Source title: Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8751-6.ch083

Purchase

View Security Challenges in Wireless Sensor Network on the publisher's website for pricing and purchasing information.

Abstract

Wireless Sensor Networks are a subset of ad hoc networks. Their unique characteristics are smaller node size, high node density, unattended operation in remote areas. Dynamic topology and wireless communication make them vulnerable to numerous types of attacks. In addition to that, memory, processing, and energy constraint make it difficult to incorporate compute-intensive security solutions in these networks. Existing solutions for developing cost and energy efficient algorithms do not fit the security parameters for these resource constrained networks. As a result, these networks remain vulnerable to several types of attacks. This chapter presents a survey of various attacks at the different layers of WSN protocol stack, their detection, and countermeasures. Although every layer of the stack has its own security challenges, the network layer is most vulnerable to many security attacks because it provides an excellent basis for traffic monitoring activities, which helps the attacker form a strategy to perform the attack. The most common attacks on this layer are the Sybil attack, selective forwarding attack, wormhole attack, sinkhole attack, etc. This survey provides a comprehensive view of present attacking strategies to disrupt the normal functioning of WSN.

Related Content

Mostafa Hefnawi, Jamal Zbitou. © 2023. 28 pages.
Jayant Gajanan Joshi, Shyam S. Pattnaik. © 2023. 19 pages.
Mohamed Bayjja, Jamal Zbitou, Ahmed El Oualkadi. © 2023. 31 pages.
Mohamed Hayouni, Fethi Choubani. © 2023. 18 pages.
Emna Jebabli, Mohamed Hayouni, Fethi Choubani. © 2023. 22 pages.
Kok Yeow You, Man Seng Sim, Fandi Hamid. © 2023. 47 pages.
Souad Berhab, Abderrahim Annou, Fouad Chebbara. © 2023. 35 pages.
Body Bottom