This document summarizes the analysis of wireless sensor networks, including security issues, attacks, and challenges. It discusses the characteristics of wireless sensor networks and their architecture. It outlines various security goals for wireless sensor networks, including confidentiality, integrity, authentication, and availability. It then describes different types of attacks against wireless sensor networks at the physical, link, network, and transport layers. These include jamming, tampering, exhaustion, collision, and flooding attacks. Finally, it discusses key challenges for wireless sensor networks, such as limited resources, heterogeneous platforms, dynamic network topologies, and handling mixed traffic from different applications.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A survey on bio inspired security in wireless sensor networkseSAT Journals
Abstract Wireless sensor networks usually comprise of a large number of nodes which are geographically dis- tributed and are not physically connected. These nodes are frequently used to sense private data and can be necessary to transmit confidential and critical data. Hence it is important to provide security for wireless sensor networks. Research is still ongoing in this field and many models have been proposed for providing security. Looking into the symbiotic nature of biological systems can give us valuable in- sights for computer networks. Because of the analo- gies between network security and how the biotic components react to perceived threats in their sur- roundings, Bio-inspired approaches for providing se- curity in networks are interesting to evaluate . Many theories from nature such as swarm intelligence, ant colony optimisation (ACO), web spider defence, bird flocking, human immune system and so forth have been used to tackle various problems in the network- ing domain. In this paper, we intend to outline and categorize the various security attacks we encounter in a wireless sensor network and review the proposed conventional security mechanisms for them and also compare it with an alternative novel approach, i.e bio-inspired approach. Keywords— Wireless sensor network (WSN), Bio-inspired, security, attacks
Analysis of denial of service (dos) attacks in wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Analysis of security threats in wireless sensor networkijwmn
Wireless Sensor Network(WSN) is an emerging technology and explored field of researchers worldwide
in the past few years, so does the need for effective security mechanisms. The sensing technology
combined with processing power and wireless communication makes it lucrative for being exploited in
abundance in future. The inclusion of wireless communication technology also incurs various types of
security threats due to unattended installation of sensor nodes as sensor networks may interact with
sensitive data and /or operate in hostile unattended environments. These security concerns be addressed
from the beginning of the system design. The intent of this paper is to investigate the security related
issues in wireless sensor networks. In this paper we have explored general security threats in wireless
sensor network with extensive study.
A review of security attacks and intrusion detection schemes in wireless sens...ijwmn
Wireless sensor networks are currently the greatest innovation in the field of telecommunications. WSNs
have a wide range of potential applications, including security and surveillance, control, actuation and
maintenance of complex systems and fine-grain monitoring of indoor and outdoor environments. However
security is one of the major aspects of Wireless sensor networks due to the resource limitations of sensor
nodes. Those networks are facing several threats that affect their functioning and their life. In this paper we
present security attacks in wireless sensor networks, and we focus on comparison and analysis of recent
Intrusion Detection schemes in WSNs.
A comparative study of physical attacks on wireless sensor networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Simple Agent Based Model for Detecting Abnormal Event Patterns in a Distrib...CSCJournals
Wireless Sensor networks (WSN) is a promising technology for current as well as future. There is vast use of WSN in different fields like military surveillance and target tracking, traffic management, weather forecasting, habitat monitoring, designing smart home, structural and seismic monitoring, etc. For success application of ubiquitous WSN it is important to maintain the basic security, both from external and internal attacks else entire network may collapse. Maintaining security in WSN network is not a simple job just like securing wireless networks because sensor nodes are deployed in randomize manner. Hence major challenges in WSN are security. In this paper we have discussed different attacks in WSN and how these attacks are efficiently detected by using our agent based mode. Our model identifies the abnormal event pattern sensor nodes in a largely deployed distributed sensor network under a common anomaly detection framework which will design by agent based learning and distributed data mining technique.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...IJCNCJournal
With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers. Due to the constraints of resources in wireless sensor networks, it has been always a challenge to design efficient security protocols for wireless sensor networks. An novel elliptic curve signcryption based security protocol for wireless sensor networks has been presented in this paper, which provides anonymity, confidentiality, mutual authentication, forward security, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack. Results have revealed that the proposed elliptic curve signcryption based protocol consumes the least time in comparison to other protocols while providing the highest level of security.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,surveillance, emergency rescue operation and smart home technology etc. Apart from its inherent constraints such as limited memory and energy resources, when deployed in hostile environmental conditions, the sensor nodes are vulnerable to physical capture and other security constraints. These constraints put security as a major challenge for the researchers in the field of computer networking. This paper reflects various issues and challenges related to security of WSN, its security architecture. The paper also provides a discussion on various security mechanisms deployed in WSN environment to overcome its security threats.
Wireless Sensor Network (WSN) has a huge range of applications such as battlefield,
surveillance, emergency rescue operation and smart home technology etc. Apart from its
inherent constraints such as limited memory and energy resources, when deployed in hostile
environmental conditions, the sensor nodes are vulnerable to physical capture and other
security constraints. These constraints put security as a major challenge for the researchers in
the field of computer networking. This paper reflects various issues and challenges related to
security of WSN, its security architecture. The paper also provides a discussion on various
security mechanisms deployed in WSN environment to overcome its security threats.
Recently, WSNs have drawn a lot of attention due to their broad applications in both military and civilian domains. Data security is essential for success of WSN applications, exclusively for those mission-critical applications working in unattended and even hostile environments which may be exposed to several attacks. This inspired the research on Data security for WSNs. Attacks due to node compromise include Denial of service (DoS) attacks such as selective forwarding attacks and report disruption attacks. Nearby many techniques have been proposed in the literature for data security. Hop-hop security works well when assuming a uniform wireless communication pattern and this security designs provides only hop-hop security. Node to sink communication is the dominant communication pattern in WSNs and hop-hop security design is not sufficient as it is exposed to several attacks due to node compromise. Location aware end-end data security (LEDS) provides end-end security
Integration of security and authentication agent in ns 2 and leach protocol f...Zac Darcy
Wireless Sensor Networks
(WSN) is an emerging technology for attraction of researchers with its research
challenges and various application
domain
s
.
Today, WSN applications can be used in environmental
detection, Moni
toring system
, medical system,
military and industrial monitoring for ability to transform
human life in various aspects.
Depending on
applications
used
for WSNs,
security
is the biggest challenges
in
WSNs
and security aspect is essential for WSNs b
efore designing WSNs
.
The routing pro
tocol
s for
WSNs
need security services for transmission
exact and secure
data to the users through the network
. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters.
Every sensor cluste
r is managed by a Cluster Head (CH) during the network operation
such
as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security.
T
his paper present
s
integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS
-
2 simulation software is use
d
and it is necessary to combine security agent into NS
-
2
tool for WSN
. But currently, NS
-
2 d
oes not support these features.
Therefore, the main aim of this paper is
to develop security and authentication agent into NS
-
2 and LEACH protocol for WSNs with the simulation
results
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion prevention mechanism is one of the major and efficient methods against attacks, but there might be some attacks for which prevention method is not known. Besides preventing the system from some known attacks, intrusion detection system gather necessary information related to attack technique and help in the development of intrusion prevention system. In addition to reviewing the present attacks available in wireless sensor network this paper examines the current efforts to intrusion detection
system against wireless sensor network. In this paper we propose a hierarchical architectural design based intrusion detection system that fits the current demands and restrictions of wireless ad hoc sensor network. In this proposed intrusion detection system architecture we followed clustering mechanism to build a four level hierarchical network which enhances network scalability to large geographical area and use both anomaly and misuse detection techniques for intrusion detection. We introduce policy based detection mechanism as well as intrusion response together with GSM cell concept for intrusion detection architecture.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
Abstract Now-a-days Wireless Sensor Networks (WSNs) have been used in a various applications including military and security monitoring, industrial control, health monitoring, home automation, intelligent agriculture and environmental sensing. The shared and easy to access medium is undoubtedly the biggest advantage of wireless networks. The shared nature of the medium in wireless Sensor Networks makes it easy for an attacker to launch a Denial of Service (DoS) attack. These attacks are happening to stop the legitimate node from accessing resources. There are many occasions where the attack can be much easier for an attacker. For example, in carrier sensing based networks (a) the transmissions at the sender are deferred because the medium is sensed to be busy, and/or (b) the reception at the receiver is interfered with due to the jamming signals. Both these effects degrade the wireless network performance significantly. As a result causes degradation in Quality-of-Service (QoS) of a sensor network. In proposed paper, Fuzzy Logic Secure Media Access Control (FSMAC) Protocol is reinvented using new intrusion detection parameter. These two parameters are Number of time channel sensed free and variation in Channel sensed period. Performance characteristics are measured in terms of successful data transmission rate and throughput of the network. Keywords: Wireless Sensor Networks, Denial-of-Service Attack, Quality of Service, Reinvented FSMAC Protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Securing WSN communication using Enhanced Adaptive Acknowledgement ProtocolIJMTST Journal
Wireless Sensor Networking is one of the most important technologies that have different applications. The
security of wireless sensor networks is a big concern. Hence for secure communication it is important to
detect and prevent the attacks in network. Major focus is given on security and on detection and prevention of
attacks. Adversary can create gray-hole attack and black-hole attack simultaneously. There are many
methods which do not provide proper method to defend against these kinds of attacks. The Ad-hoc On
Demand Distance Vector (AODV) scheme is used for detecting Gray-Hole attack and Enhanced Adaptive
Acknowledgment (EAACK) mechanism is used for detecting black-hole attack in network. But only by
detecting and preventing the attacks, it does not provide the better security to wireless network. Therefore, to
secure network a hybrid mechanism is deployed in wireless sensor network. Security algorithm for wireless
sensor networks such as CAWS and Modern Encryption Standard (MES-1) is used for secure communication.
The CAWS and Modern Encryption Standard (MES-1) is an advanced cryptography method which is used for
encryption and decryption process to provide special security.
A Survey on Threats and Security schemes in Wireless Sensor NetworksIJERA Editor
It is difficult to achieve and become particularly acute in wireless sensor networks due to the limitation in network capability, computational power and memory which do not allow for implementation of complex security mechanism because security being vital to the acceptance and use of wireless sensor networks for many applications. In this paper we have explored general security threats in wireless sensor networks and analyzed them. This paper is an attempt to survey and analyze the threats to the wireless sensor networks and focus on the type of attacks and achieve secure communication in wireless sensor networks.
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
This paper proposes a new top-down hierarchical, multi-hop, secure routing protocol for the wireless
sensor network, which is resilient to report fabrication attack. The report fabrication attack tries to
generate bogus reports by compromising the sensor nodes to mislead the environment monitoring
application executed by randomly deployed wireless sensor nodes. The proposed protocol relies on
symmetric key mechanism which is appropriate for random deployment of wireless sensor nodes. In the
proposed protocol, base station initiates the synthesis of secure hierarchical topology using top down
approach. The enquiry phase of the protocol provides assurance for the participation of all the cluster
heads in secure hierarchical topology formation. Further, this methodology takes care of failure of head
node or member node of a cluster. This protocol ensures confidentiality, integrity, and authenticity of the
final report of the monitoring application. The simulation results demonstrate the scalability of the
proposed protocol.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fpga implementation of image segmentation by using edge detection based on so...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Optimized mapping and navigation of remote area through an autonomous roboteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Appraisal of multilevel car parking facility at kg road cbd area, bengaluru cityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A comparative study of physical attacks on wireless sensor networkseSAT Journals
Abstract Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively. Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks,
A comparative study of physical attacks on wireless sensor networkseSAT Journals
Abstract Wireless Sensor Networks (WSN) have many potential applications and challenges They consists of hundreds or thousands of low power, low cost sensor nodes which have limited computing resources. WSNs are susceptible to many types of physical attacks due to wireless and shared nature of communication channel, un-trusted transmissions, deployment in open environments, unattended nature and limited resources. So security is a vital requirement for these networks. However wireless micro-sensor networks pose numerous design challenges. This challenge is especially difficult due to the energy constrained nature of the devices. In this paper we focus a wide variety of physical attacks and a comparison on them which enable s us to identify the purpose and capabilities of the attackers. Also this paper discusses known approaches of security detection and defensive mechanisms against the physical attacks effectively. Keywords- Communication channel, Open environment, Physical attacks, Sensor nodes, Wireless Sensor Networks,
SECURITY IN WIRELESS SENSOR NETWORKS: COMPARATIVE STUDYijcsit
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
The security in wireless sensor networks (WSNS) is a very important issue. These networks may be exposed
it different attacks. With this in mind, researchers propose in this area variety of security techniques for
this purpose, and this article describes security in wireless sensor networks. Discussed threats and attacks
of wireless sensor networks. The article also aims to provide the basic information related to determining
essential requirements for the protection WSNs. Lastly, we mention some security mechanisms against
these threats and attacks in Wireless Sensor Network.
Public encryption with two ack approach to mitigate wormhole attack in wsneSAT Journals
Abstract Wireless Sensor Network provides a solution for various applications like nuclear power plant, military. This type of application required continuous monitoring. WSN is unprotected by various attacks; wormhole attack is one of among them. In this attack an attacker able to receive a packet from one location and drop it into another location. We propose an algorithm to defend wormhole attack, which is based on public key encryption and acknowledgement based. Proposed algorithm provides secure communication and detects misbehaving nodes. Index Terms: Wireless Sensor Network, wormhole Attack
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Networkpijans
Sensor nodes, when deployed to form Wireless sensor network operating under control of central authority
i.e. Base station are capable of exhibiting interesting applications due to their ability to be deployed
ubiquitously in hostile & pervasive environments. But due to same reason security is becoming a major
concern for these networks. Wireless sensor networks are vulnerable against various types of external and
internal attacks being limited by computation resources, smaller memory capacity, limited battery life,
processing power & lack of tamper resistant packaging. This survey paper is an attempt to analyze threats
to Wireless sensor networks and to report various research efforts in studying variety of routing attacks
which target the network layer. Particularly devastating attack is Wormhole attack- a Denial of Service
attack, where attackers create a low-latency link between two points in the network. With focus on survey of
existing methods of detecting Wormhole attacks, researchers are in process to identify and demarcate the
key research challenges for detection of Wormhole attacks in network layer.
Integration of security and authentication agent in ns-2 and leach protocol f...Zac Darcy
Wireless Sensor Networks (WSN) is an emerging technology for attraction of researchers with its research
challenges and various application domains. Today, WSN applications can be used in environmental
detection, Monitoring system, medical system, military and industrial monitoring for ability to transform
human life in various aspects. Depending on applications used for WSNs, security is the biggest challenges
in WSNs and security aspect is essential for WSNs before designing WSNs. The routing protocols for WSNs
need security services for transmission exact and secure data to the users through the network. LEACH
(Low Energy Adaptive Clustering Hierarchy) is a routing protocol used in WSNs by arranging sensor
nodes into clusters. Every sensor cluster is managed by a Cluster Head (CH) during the network operation
such as routing and data aggregation from Cluster Member (CM). Therefore, security and authentication
is necessary between CH and CM. However, LEACH is lack of security. This paper presents integration of
security and authentication between CH and CM on LEACH routing protocol. For the implementation of
this integration, NS-2 simulation software is used and it is necessary to combine security agent into NS-2
tool for WSN. But currently, NS-2 does not support these features. Therefore, the main aim of this paper is
to develop security and authentication agent into NS-2 and LEACH protocol for WSNs with the simulation
results.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Requisite Trust Based Routing Protocol for WSNAM Publications
A mobile ad-hoc network (MANET) is an infrastructure less network of mobile devices connected by wireless
links. To secure a MANET in colluding nodes environment, the proposed work aims to detect and defend colluding nodes that
causes internal attacks. In order to achieve this, the work focuses on the novel algorithm of trust computation and route
detection that detects colluding nodes, without message and route redundancy during route discovery by using Requisite Trust
based Secure Routing Protocol (RTSR). The trust will be calculated in local forwarding nodes, which are used to discover the
route. The trust values from one hop neighbors are used to calculate the single trust value for each node using the constant
normalization concept. Route discovery and trust information will be stored in fixed cluster head (CH).
Security Attacks and its Countermeasures in Wireless Sensor NetworksIJERA Editor
Wireless Sensor Networks have come to the forefront of the scientific community recently. Present WSNs typically communicate directly with a centralized controller or satellite. Going on the other hand, a smart WSN consists of a number of sensors spread across a geographical area; each sensor has wireless communication ability and sufficient intelligence for signal processing and networking of the data. This paper surveyed the different types of attacks, security related issues, and it’s Countermeasures with the complete comparison between Layer based Attacks in Wireless Sensor Networks
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
Wireless sensor networks (WSNs) consists of small nodes with constrain capabilities. It enables numerous
applications with distributed network infrastructure. With its nature and application scenario, security of
WSN had drawn a great attention. In malicious environments for a functional WSN, security mechanisms
are essential. Malicious or internal attacker has gained attention as the most challenging attacks to
WSNs. Many works have been done to secure WSN from internal attacks but most of them relay on either
training data set or predefined thresholds. It is a great challenge to find or gain knowledge about the
Malicious. In this paper, we develop the algorithm in two stages. Initially, Abnormal Behaviour
Identification Mechanism (ABIM) which uses cosine similarity. Finally, Dempster-Shafer theory (DST)is
used. Which combine multiple evidences to identify the malicious or internal attacks in a WSN. In this
method we do not need any predefined threshold or tanning data set of the nodes.
Attacks and counterattacks on wireless sensor networksijasuc
WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth.
Their occupation depends on inspecting corporal and environmental conditions and communing through a
system and performing data processing. The application field is vast, comprising military, ecology,
healthcare, home or commercial and require a highly secured communication. The paper analyses different
types of attacks and counterattacks and provides solutions for the WSN threats.
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption
security, operating speed and power consumption for network. Here, we introduce a mechanism for secure transferring of data is WSN
and various security related issues. This energy-efficient encryption is a secure communication framework in which an algorithm is
used to encode the sensed data using like, RC5, AES and CAST Algorithm. The proposed scheme is most suitable for wireless sensor
networks that incorporate data centric routing protocols. An algorithm in sensor network is help to designers predict security
performance under a set of constraints for WSNs. This symmetric key function is used to guarantee secure communications between
in-network nodes and reliable operation cost. RC5 is good on the code point of view, but the key schedule consumes more resource
time for efficient security aspects.
Secure and Efficient Hierarchical Data Aggregation in Wireless Sensor NetworksIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Similar to Analysis of wireless sensor networks security, attacks and challenges (20)
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Analysis of wireless sensor networks security, attacks and challenges
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 160
ANALYSIS OF WIRELESS SENSOR NETWORKS: SECURITY, ATTACKS
AND CHALLENGES
Sunil Ghildiyal1
, Ashish Gupta2
, Musheer Vaqur3
, Anupam Semwal4
1
Assistant Professor, Department of CSE, Uttaranchal University, Prem Nagar, Dehradun (UK) India
2
Assistant Professor, Department of IT, Dev Bhoomi Institute of Technology, Dehradun (UK) India
3
Assistant Professor, Department of IT, Uttaranchal University, Prem Nagar, Dehradun (UK) India
4
Assistant Professor, Department of Mathematics, IEC University, Alal Nagar, Baddi, Solan (HP) India
Abstract
Recent advancements in MEMS technologies and development in the area of low power microcontrollers have resulted as
implementation of wireless sensor networks in real life problem solving in areas like traffic monitoring, patient monitoring ,
battlefield surveillance. These wireless sensors are very small in size and are operated at low power for low data rate applications.
WSN nodes include features like scalability, self-organizing, self-healing. WSN nodes face many challenges starting from deployment
till their life span which is dependent on very low battery strength. Since these nodes are operated in unattended environments, many
security threats are for them to survive. These nodes face variety of attacks at different layers of their architecture, ranging from
physical stealing, tempering to reprogramming. Applying any traditional security mechanism over wireless sensor nodes is also not
possible as those traditional algorithms or protocols consume very much processing and power due to their complexity. In this paper,
we have mentioned. This paper aims at reporting an initial introduction of WSN, WSN architecture, challenges and security threats
subsequently.
Keywords: Wireless, Sensor, Threat, Security, Power, Node
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Wireless Sensor networks (WSN) is an emerging technology
that shows result oriented promise for many applications for
defense as well as mass public[1].WSN nodes are low power,
low cost smart devices having limited computing
resources[2]. In last few recent years, Wireless Sensor
Networks (WSNs) have gained worldwide attention
particularly with the proliferation in Micro-Electro-
Mechanical Systems (MEMS) technology which has
facilitated the development of sensors[3]. Rapid demand of
wireless sensor nodes indicates how these can be utilized in
different areas of real-life applications. Main aim is to
interpret, observe and handle the WSN node data at base
station (BS). WSNs form an ad-hoc network that operate with
nominal or no infrastructure. WSNs merge a wide range of
information technology that spans multiple computer
hardware vendors, software, networking and programming
methodologies. WSNs make it possible to perceive what takes
place in the physical world in ways, was not previously
possible [4].
2. REVIEW OF LITERATURE
Set of challenges in sensor networks are diverse and focused
on supporting multi-hop communication, data management,
geographic routing challenges in networks and monitoring and
maintenance of such dynamic, resource-limited WSNs.
Ganeshan et al.[5] Current surveys and forecast predict that
the number of wireless devices is going to increase
tremendously. These wireless devices can be computers of all
kinds, notebooks, net-books, Smart-phones and sensor nodes
that evolve into real- world scenarios forming a ”Real-World-
Internet” in the future. Horst Hellbruck et al.[6] In WSNs.
application domains are diverse due to availability of tiny
micro sensors with low power wireless communications.
These can be densely deployed with their auto configuration
features in different areas of application to solve real world
problems. Kalitha et al.[7]. Wireless sensors are not isolated
from attacks easily. They are prone to physical attacks. Any
traditional security algorithm is not applicable due to resource
constraint. Kavitha et al.[8]
3. CHARACTERISTICS OF WSN
The main characteristics of a WSN include: WSN are getting a
lot of popularity day by day due to their low costing solutions
to variety of real world applications, many other favoring
factors of WSN use are low power consumption constraints
for nodes: portability, unattended operation, using batteries or
energy harvesting, ability to withstand bad environmental
conditions, having dynamic network topology, to cope with
node malfunctioning and failures, Mobility of deployed nodes,
Heterogeneity of nodes, Scalability, at the time of deployment
and after deployment, Easy use.
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 161
4. THREAT MODEL
In WSN, threats are from outside the network and within the
network. If attacks are from the nodes of the native network
then it is much harmful. Also, it is quite difficult to find out
the malicious or compromising node within the native
network. Another classification of the attacks may be passive
and active where passive attacks don‟t modify or alter the data
as active attacks do. If the opponent attack by using similar
capacity nodes for network penetration it is called mote class
attack but when powerful devices like laptop are used to
penetrate the network then such attack is called laptop attack.
5. WSN SECURITY GOALS
Traditional security goals for an ad-hoc network and specific
to the WSN security goals can be classifies in two categories
as primary and secondary [9]. The primary goals are known as
standard security goals such as Confidentiality, Integrity,
Authentication and Availability (CIAA). The secondary goals
are Data Freshness, Self-Organization, Time Synchronization
and Secure Localization.
5.1 Primary Goals:
5.1.1 Data Confidentiality
Confidentiality means to reveal the data to the authorized
persons only not to everyone in the networks. It is the ability
to conceal messages from a passive attacker so that any
message communicated via the sensor network remains
confidential.
5.1.2 Data Integrity
It ensures the data during transition is not altered, tempered by
an unauthorized one may be an attacker. Even if the network
has confidentiality measures, there is still a possibility that the
data integrity has been compromised by alterations. If any
malicious node is present in the network or medium of
transmission is damages, then also integrity may get affected
[10].
5.1.3 Data Authentication
Authentication ensures the reliability of the message by
identifying its origin. In WSN attacks, adversaries can also
inject additional false packets [11]. Data authentication
verifies the identity of the senders and receivers.
5.1.4 Data Availability
It is the ability of a node to ensure the availability of the
resources for use. It also ensures the network for message
communications. This goal of security ensures the
functionality of the network. However failure of central hub or
cluster head may make a node unavailable for use.
5.2 Secondary Goals:
5.2.1 Data Freshness
It ensures that data contents are recent and there no replay of
any old content. Even though Integrity and confidentiality is
there, data freshness is to be checked separately.
5.2.2 Self-Organization
Each node must be self organized, self configured while
joining its ad-hoc nature networking environment. Nodes must
be independent and must have self-healing capabilities even in
critical situations. There is no any fixed infrastructure for
WSN implementation, so nodes must their selves adapt the
topology and deployment strategy.
5.2.3 Time Synchronization
Many WSN applications demand some form of time
synchronization for execution. Sensors organized in group
collaboration may require time synchronization for application
tracking.
5.2.4 Secure Localization
Sensors may get displaced while deploying them or after a
time interval or even after some critical displacement incident.
The utility of a sensor network will rely on its ability to
accurately and automatically locate each sensor in the
network. A sensor network designed to locate faults will
require precise location in order to detecting fault location.
6. ATTACKS ON SENSOR NETWORKS
Broadcast nature of communication is WSN is vulnerability
for them. Subsequently, wireless sensor networks have an
additional threat from their physical deployment as these
nodes are not physically protected. Mainly, attacks are
classified as active attacks and passive attacks. All the
classical techniques of attacks will also be applied on WSN.
But due to limited capability of node, some specific attacks
can also damage node and network subsequently. For
examples an adversary can eavesdrop on the communication,
perform traffic analysis of the observed network behavior, can
replay the communication traffic later on. [12].
The attacks of WSN can be classified into two categories:
invasive and non-invasive. Non-invasive attacks generally
target to timings, power and frequency of channel. Invasive
attacks target to availability of service, transit of information,
routing etc. In DoS attack, hacker tries to make service or
system inaccessible.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 162
6.1 Attacks at Physical Layer
6.1.1 Jamming
Jamming attacks leads to the interference by identical radio
frequencies used by the network nodes. The adversary can
either disrupt entire network or a particular small portion of it.
It depends on the power of jamming nodes distributed nearby
the network. Jamming is of various types Constant, Deceptive,
Random and Reactive[13]. Handling the jamming at MAC
layer needs to control the requests which may exhaust the
resources by ignoring them. However network layer also deals
with jamming by mapping jamming area in the network or in
surrounding routing area.
6.1.2 Tempering
As nodes are operated in unattended areas, attacker may
physically temper the node and can compromise with them. It
is not possible to control hundreds of nodes spread over large
area. Attacker may extract the sensitive information like
cryptographic keys from node by damaging it.
6.2 Attacks at Link Layer
6.2.1 Exhaustion (Continuous Channel Access)
In this attack, attacker may disrupt the channel by
continuously requesting and transmitting over it. It results in
starvation for channel access for other nodes. It is usually done
by sending a large numbers of RTS (Request to Send) packets
over channel, leading multiple collisions and draining out the
nodes of their power.
6.2.2 Collision
Collision occurs when two nodes intend for simultaneous
transmission on same frequency channel. If the packets
collide, a small change in packet will take place which will be
encountered as mismatch at the time of checksum at receiving
end and hence packets will be discarded, to be re transmitted.
6.2.3 Unfairness
Unfairness is referred as repeated collision based or
exhaustion based attacks or an abusive use of cooperative
MAC layer priority mechanisms. Also may be called as a
weaker form of DoS. This threat may not entirely prevent
legitimate access to the access channel but it could degrade
service in order to gain an advantage such as causing other
nodes in a real-time MAC protocol to miss their transmission
deadline.
6.3 Attack s at Network Layer
6.3.1 False Routing or Spoofed, Altered, Replayed
Routing Information
Such attacks primarily focus on routing protocols mainly for
routing information. While nodes exchanging the routing
information, by changing the routing information by a
malicious node, it is possible to change the routing of entire
WSN structure or its any network partition. This can be done
by altering or changing the routing information, by shortening
or extending the route information in the routing table or by
generation of false error messages.
6.3.2 Selective Forwarding
Fundamental principle of WSN is „Multi-hop”. It means that
sensor nodes will forward the entire message to next node in
line what they have received. In this attack, nodes drop few
messages instead of forwarding everything of what they have
received. Attacking nodes deny routing some messages and
drop them. If all the packets are denied for forwarding by
anode after receiving, is called black hole attack.
6.3.3 Sinkhole Attacks
In this attack attackers seem to be more attractive to its
surrounding nodes by forging the routing information. Main
aim of attacker is to tempt all the nodes in close proximity,
constructive a figurative sinkhole. It results in the malicious
node to be most chosen for data forwarding through it by other
surrounding nodes.
6.3.4 Sybil Attack
In this attacker attacks a single node in the network with a
malevolent code masked with multiple identities. Then this
node behaves as polymorphic. Its multiple identities mislead
to all other nodes. Some of such identities are decreasing
topology maintenance schemes, disparity in storage, disparity
in routing.
6.3.5 Wormhole
Wormhole is referred as low latency link between two
portions of a WSN network over which an attacker replays
network messages [14]. Here an adversary convinces the
nodes which are multi hop away that they are closer to the
base station (BS).The wormhole attack usually engage two
different and far away malevolent codes conspire to minimize
their remoteness from each other by replaying packets next to
an out-of-reach channel, is only available to attacker.
6.3.6 Hello Flood
Malicious nodes sometime can cause of immense traffic of
useless messages. It is known as flooding. Malicious nodes,
sometime replay some broadcast traffic which is useless but
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 163
congest the channel. In hello flood type attack, attackers use
very high power RF transmitters to handle the large area of
nodes into trusting that they are neighbors of it. Attacker will
broadcast a false superior route so that other nodes will
attempt very far from it in RF distance.
6.4 Attacks at Transport Layer
6.4.1 Flooding
Any protocol which maintain state at either end, it has to face
a problem called flooding. Attacker may repeatedly establish
new connection requests until the resources are exhausted,
which were required by each connection or reached maximum
limit. Under such conditions, further legitimate requests will
be ignored. Limiting the number of connections prevents from
complete resource exhaustion.
6.4.2 De-synchronization
Connection between two endpoints can be disrupted by de-
synchronization. In this attack, the adversary repeatedly forges
messages to either or both endpoints. For example, there may
be requests for retransmissions of missed frames by the
repeated spoof messages. If timed correctly, an attacker may
degrade the functionality, capability of end hosts by
retransmission of frames unnecessarily. It causes endpoints to
waste the energy for attempt to recover from errors which
never really exist.
7. WSN CHALLENGES
WSNs. are specific real world problem solving methods not
merely as combination of sensor and electronics circuit along
with wireless communication linking capability. Many
challenges on WSN are to be considered before applying
wireless sensors to a particular application, solving a problem
7.1 Resource Constraints
Wireless sensors are low costing, low power tiny devices
which may handle and process a limited amount of data , low
amount of data transmission capability since transmission
require a significant amount of power, very low battery life
and memory space. Cause of limited transmission capability
bandwidth of channel is also limited resulting limiting radio
range of channel. Since it is not possible to replace or recharge
the battery of sensor nodes after deployed once, conservation
of energy is also to be considered as main factor before
designing any software routine or protocol for WSNs.
7.2 Platform Heterogeneity
Wireless sensor network (WSN) may run different
applications for different tasks, such as event detection,
localization, tracking, or monitoring. Different types of sensor
node are therefore required, and to handle heterogeneous
WSNs with a large number of these different sensor nodes,
comprehensive heterogeneity management architecture is also
necessary. When deployed in large networks, sensors, may
behave differently due to environment they are deployed in
terms of infrastructure or networking technologies. Hence
capability and functionality of sensor node may vary.
7.3 Dynamic Network Topology
WSNs may consist of mobile nodes instead of static nodes.
Many application demand node mobility such as intelligent
transportation, planetary exploration, and animal control. In
such solutions new nodes are to added with sleep or
replacement on existing nodes. Even after a time period many
node me die due to power exhaust. These factors lead to
network topology of WSNs to be dynamic, not static. This
dynamic topology results in uncertainty of QoS in WSNs.
7.4 Mixed Traffic
Sensor nodes are randomly deployed at large scale to fulfill
the requirements of multiple application over heterogeneity.
Those application may use or handle the data which are
different in nature like as streaming, periods. To meet out such
mixed traffic demands WSNs have to be scalable as needed by
the applications. However some extra sensor may be required
to detect such uncommon properties of applications. Variety
of detected inputs or data may vary in size, magnitude,
resulting handling of this mixed traffic generated from input of
different types of sensors.
7.5 Sensor Deployment and Location:
In WSNs. applications based geographical constraints; require
random deployment of sensors in an affected area like as
avalanche prone area, volcano prone area. Since sensors are
scattered in such critical areas from a distance to be deployed
in unknown manner, their position after deployment is
uncertain, resulting drastic variance in topology they have
formed their selves after deployment. Even some sensor may
get damaged or lost during deployment.
7.6 Security
Wireless medium of linking between the node itself is a
vulnerability to the architecture due to its easy access to all.
Any standard cryptographic strategy or similar one can also
not be applied directly to the sensor nodes due to their
execution complexity and required many resources like space,
memory and energy.
8. WSN SECURITY COMPLICATIONS
Several constraints of the WSN architecture and their low
capabilities make security issue complicated in WSN.
Physical stealing or capture is one of the issue while securing
wireless sensor network. As these network use open air
medium for communication, which is easy to penetrate is
another security implementation issue with WSN. Any
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 164
attacker may inject malicious information or data easily into
the wireless network. Many anti-jamming techniques are
available to eliminate attacks like jamming but those are very
complex, energy and processing consuming, hence difficult to
be implemented on tiny sensor nodes. Sensors are very tiny,
low powered and low processing capable hence more
susceptible for DoS attacks. Since sensor nodes form ad-hoc
network, attacker may get access to the network easily and can
damage the infrastructure.
9. CONCLUSIONS
Limited capability and less capable hardware of WSN nodes
make them more susceptible for attacks.
Any traditional security mechanism can also not be applied at
any level of WSN architecture to prevent for its respective
attacks as nodes will not be able to execute same mechanism
or will be exhausting their power and life. Large scale
deployment for tightening the security measures are also not
possible over low capability nodes. If security is maximized
then consumption of resources will increase, result of node‟s
life exhaust. Since sensor nodes usually have severely
constrained, asymmetric cryptography is often too expensive
for many applications. Thus, a promising approach is to use
more efficient symmetric cryptographic alternatives.
REFERENCES
[1]. Al-Sakib Khan Pathan, Hyung-Woo Lee and Choong
Seon Hong “Security in Wireless sensor Networks: Issues and
Challenges” ISBN 89- 5519-129-4 Feb 22-22, 2006
ICACT2006
[2]. Ritu sharma, Yogesh Chaba and Y.Singh “Ánalysis of
Security Protocols in Wireless Sensor Network” International
Journal Avanced Networking and Applications Volume 02,
issue 03, pages:707-713(2010)
[3]. Neelam Srivastava “Challenges of Next- Generation
Wireless Sensor Networks and its impact on Society”
JOURNAL OF TELE COMMUNICATIONS, VOLUME 1,
ISSUE 1, FEB 2010 128
[4]. Satvika Khanna, Ms. Priyanka Singh, Akhil Kaushik
“Wireless Sensor Network: Issues & Challenges” IJMA Vol
2, No 11, 2011
[5]. Deepak Ganesan et al. “ Parallel and Distributed
Computing issues in WSN” Journal of Parallel and Distributed
Computing, Volume 64, Issue 7, July 2004
[6]. Horst Hellbruck, Max Pagely, Alexander Krollery “Using
and Operating Wireless Sensor Network Testbeds with
WISEBED” 2011 The 10th IFIP Annual Mediterranean Ad
Hoc Net. Workshop
[7]. Hemanta Kumar kalitha and Avijit Kar “Wireless Sensor
Network Security Analysis” IJNGN Vol 1, Dec 2009
[8]. Kavitha, D. Sridharan “Security Vulnerabilities in
wireless Sensor Networks” IJAS 5 (2010)
[9]. John Paul Walters et. Al. “Wireless Sensor Network
Security: A Survey”, Security in Distributed, Grid and
Pervasive Computing Yang Xiao (Eds), Page3-5, 10-15, year
2006
[10]. Ian F. Akykildiz et. Al. “A Survey on Sensor Networks”,
IEEE Communication Magazine, year 2002
[11]. Y. Wang, G. Attebury, and B. Ramamurthy, “A Survey
of Security issues in Wireless Sensor Networks,” IEEE
Commun. Surveys Tutorials, vol. 8, pp. 2–23, year 2006.
[12]. Chaudhari H.C. and Kadam “Wireless Sensor Networks:
Security, Attacks and Challenges” L.U. International Journal
of Networking Volume 1, Issue 1, 2011, pp-04-16
[13]. Xu, W., Trappe, W., Zhang, Y., and Wood, T. “The
Feasibility of Launching and Detecting Jamming Attacks in
Wireless Networks” ACM MobiHoc‟05, May 25–27, 2005,
Urbana -Champaign, Illinois,USA, pp 46-57.
[14]. C. Karlof and D. Wagner, “Secure routing in wireless
sensor networks: Atttacks and 4 counter measures”, In
Proceedings of the 1st IEEE Int. Workshop on Sensor
Network Protocols and Applications, May 2003