Security Attacks in Wireless Sensor Networks – A Study

K. Thamizhmaran*
Periodicity:December - February'2020

Abstract

As the MANET applications show rapid growth in a wireless sensor network. A recent development in hardware platform shows the popularity of miniaturized devices, computational power, and large connectivity. Generally, Wireless sensor network nodes are stricken by different attacks during the transmission of messages such as HELLO flood attack and Wormhole attack which causes unsystematic behavior of the nodes. This malicious behavior creates incorrect traffic and the network may experience redundancy and topology problems. The existing system is not efficient due to the lacking of flow, error control, and reliability. The survey paper gives a better solution to achieve flexible bandwidth, energy resource complications for recent communication protocols by finding malicious node. The node that produces any one of the following attacks is called a malicious node. The analysis of nodes is done under various environments such as indoor, outdoor models in rural and urban areas concerning the ISM Band which was allocated by FCC.

Keywords

Network security, Routing protocol, Quality of service, Wireless sensor networks, Computer security, Cryptography

How to Cite this Article?

References

If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.