An analytical Survey of Attack Scenario Parameters on the Techniques of Attack Mitigation in WSN
نویسندگان
چکیده
Abstract Wireless sensor networks (WSN) were cataloged as one of the most important emerging technologies last century and are considered basis Internet Things paradigm. However, an undeniable disadvantage WSN is that resources available for these types networks, such processing capacity, memory, battery, usually in short supply. This limitation implements security mechanisms a difficult task. work reviews 93 recent proposals which different solutions formulated attacks network layer; total, 139 references considered. According to literature, mainly Sybil, wormhole, sinkhole, selective forwarding. The main goal this contribution present evaluation metrics used state art mitigate forwarding show topologies each proposals.
منابع مشابه
An Exhaustive Survey on Physical Node Capture Attack in WSN
Node capture attack is one of the most dreadful security attack exist in wireless sensor networks. An adversary steals cryptographic key information from a captured node to compromise entire network. So, Security of wireless sensor network is an important issue for maintaining confidentiality and integrity of wireless links. Now-a-days, researchers are paying attention towards developing securi...
متن کاملSpectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
متن کاملHardware Attack Mitigation Techniques Analysis
The goal of a hardware attack is to physically access a digital system to obtain secret information or modify the system behavior. These attacks can be classified as covert or overt based on the awareness of the attack. Each hardware attack has capabilities as well as objectives. Some employ hardware trojans, which are inserted during, manufacture, while others monitor system emissions. Once a ...
متن کاملthe effect of using critical discourse analytical tools on the improvement of the learners level of critical thinking in reading comprehension
?it is of utmost priority for an experienced teacher to train the mind of the students, and enable them to think critically and correctly. the most important question here is that how to develop such a crucial ability? this study examines a new way to the development of critical thinking utilizing critical discourse analytical tools. to attain this goal, two classes of senior english la...
survey on the rule of the due & hindering relying on the sheikh ansaris ideas
قاعده مقتضی و مانع در متون فقهی کم و بیش مستند احکام قرار گرفته و مورد مناقشه فقهاء و اصولیین می باشد و مشهور معتقند مقتضی و مانع، قاعده نیست بلکه یکی از مسائل ذیل استصحاب است لذا نگارنده بر آن شد تا پیرامون این قاعده پژوهش جامعی انجام دهد. به عقیده ما مقتضی دارای حیثیت مستقلی است و هر گاه می گوییم مقتضی احراز شد یعنی با ماهیت مستقل خودش محرز گشته و قطعا اقتضاء خود را خواهد داشت مانند نکاح که ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Personal Communications
سال: 2021
ISSN: ['1572-834X', '0929-6212']
DOI: https://doi.org/10.1007/s11277-021-09107-6