Security against Selective Forward Attack in Wireless Sensor Network
نویسندگان
چکیده
منابع مشابه
Defensive Mechanisms of Selective Forward Attack in Wireless Sensor Networks
Wireless sensor networks are composed of a large number of sensors and their major challenge is energy consumption in order to prolong the life time of the network. From the security point of view, detecting schemes must be very light to increase the life time of the network. In this paper, defensive mechanisms based on cumulative acknowledgement and energy based is proposed to detect selective...
متن کاملSecurity against Sybil Attack in Wireless Sensor Network through Location Verification
A new functional for planar triangulation called Inner Core has been proposed in [4] for a location verification based defense against Sybil attack for sensor network, and also has been shown that the legitimacy of a new node inside the Inner Core of a triangle obtained by the triangulation of the set of sensor nodes can be established. In [4] it has been conjectured that Inner Core of a triang...
متن کاملSelective Forwarding Attack in Wireless Sensor Networks
Wireless mesh network represent a solution to provide wireless connectivity. There are number of assaults on remote sensor systems like dark gap attack, sink gapa attack, Sybil attack, selective sending and so on. In this paper we will focus on particular sending assault. Particular Forwarding Attack is one among the numerous security dangers in remote sensor systems which can debase arrange ex...
متن کاملWormhole Attack in Wireless Sensor Network
In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor network or mobile ad hoc network. In our paper we are going to discuss about a particularly devastating attack, known as the wormhole attack. ...
متن کاملSecurity of Wireless Sensor Network
Wireless Sensor Networks (WSN) is an emerging technology and day by day it is attracting the attention of researchers with its challenging characteristics and diversified application domain. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN into that constrained environment. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Engineering
سال: 2012
ISSN: 2278-8719,2250-3021
DOI: 10.9790/3021-020512001206