SURVEY OF IDENTIFICATION TECHNIQUES OF ADVERSARY ATTACKS IN WIRELESS SENSOR NETWORK

2015 
Adversary Attackers take the identity of another node in the wireless sensor network and establish a connection that will allow gaining access to the other hosts and their important and personnel data. It will reduce the performance of the network and disrupt many security issues. With the open medium, distributed cooperation and constrained capabilities, the wireless sensor nodes are more unprotected to such type of attacks compared with wired networks. The conventional security approaches such as cryptographic mechanisms are not always desirable because it requires key management and additional infrastructural overheads. The detection and localization of multiple attacks makes complex when the multiple number of attackers attacks the wireless sensor network. This paper describes to use spatial information received signal strength, a natural property associated with each node identity, difficult to falsify, and not relevant process on cryptography, as the basis for 1) Detection of adversary attacks 2) Determining the number of attackers when multiple adversaries masquerading as the same node identity 3) Localizing multiple adversary attackers and 4) Detection of Denial of service attack.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    18
    References
    0
    Citations
    NaN
    KQI
    []