Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures
#1

Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures

[attachment=16578]

INTRODUCTION
Our focus is on routing security in wireless sensor networks. Current proposals for routing protocols in sensor networks optimize for the limited capabilities of the nodes and the application specific nature of the networks, but do not consider security.


We make five main contributions.
_
• We propose threat models and security goals for secure routing in wireless sensor networks.
_
• We introduce two novel classes of previously undocumented attacks against sensor networks1 – sinkhole attacks and HELLO floods.
_
• We show, for the first time, how attacks against ad-hoc wireless networks and peer to-peer networks [1], [2] can Funded in These attacks are relevant to some ad-hoc wireless networks as well be adapted into powerful attacks against sensor networks.


BACKGROUND
We use the term sensor network to refer to a heterogeneous system combining tiny sensors and actuators with general purpose computing elements. Sensor networks may consist of hundreds or thousands of low-power, low-cost nodes, possibly mobile but more likely at fixed locations, deployed en masse to monitor and affect the environment.


RELATED WORK
Security issues in ad-hoc networks are similar to those in sensor networks and have been well enumerated in the literature [8], [9], but the defense mechanisms developed for ad-hoc networks are not directly applicable to sensor networks. There are several reasons for why this is so, but they all relate to the differences between sensor and ad-hoc networks enumerated in the previous section


CONCLUSION
Secure routing is vital to the acceptance and use of sensor networks for many applications, but we have demonstrated that currently proposed routing protocols for these networks are insecure.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: what is identity theft attack countermeasures ppt, java code of attacks on wireless sensor networks, simulation attacks wireless sensor networks, ns2 code for attacks on wireless sensor networks, ethical hacking and countermeasures threats and defense mechanisms, what is secure routing in underrwater wireless sensor networks, wireless security attacks,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures - by seminar addict - 25-01-2012, 01:13 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,160 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,526 25-08-2014, 05:40 PM
Last Post: Guest
  Mobile Ad Hoc Networks project uploader 1 1,768 20-12-2012, 12:31 PM
Last Post: seminar details
  3G WIRELESS TECHNOLOGY:- project uploader 1 1,672 27-11-2012, 01:03 PM
Last Post: seminar details
  WIRELESS TECHNOLOGY project uploader 1 1,512 27-11-2012, 01:03 PM
Last Post: seminar details
  Current generation moves into wireless technology project uploader 1 1,684 27-11-2012, 01:03 PM
Last Post: seminar details
  SECURE DATA TRANSMISSION USING STEGANOGRAPHY seminar paper 1 1,924 24-11-2012, 01:35 PM
Last Post: seminar details
  WIRELESS POWER TRANSMISSION project uploader 1 1,718 22-11-2012, 01:34 PM
Last Post: seminar details
  AUTOMATIC ROOM LIGHT CONTROLLER WITH VISITOR COUNTER (IR SENSOR). seminar details 1 2,513 22-11-2012, 12:09 PM
Last Post: seminar details
  WIRELESS SWITCH project uploader 1 1,434 12-11-2012, 04:07 PM
Last Post: seminar details

Forum Jump: