ATTACKS ON WIRELESS SENSOR NETWORK: A SURVEY

Abstract

Security is a crucial service in wireless sensor networks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. With a widespread growth in the potential applications of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and issues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Network in this paper.

Authors and Affiliations

Dr. Yudhvir Singh

Keywords

Related Articles

Web Crawler: A Review

In a large distributed system like the Web, users find resources by following hypertext links from one document to another. When the system is small and its resources share the same fundamental purpose, users can find r...

Performance Evaluation of Clustering in Web-Log Analysis Based on Agent

Web mining is the use of data mining Technique to automatically discover & extract information from web documents. When user searches for goods the management agent receives order from graphical user interface .Manag...

Keel A Data Mining Tool: Analysis With Genetic

This work is related to the KEEL (Knowledge Extraction based on Evolutionary Learning) tool, an open source software that supports data management and provides a platform for the analysis of evolutionary learning for Dat...

Content Based Image Retrieval through Clustering

Content-based image retrieval (CBIR) is a technique used for extracting similar images from an image database. CBIR system is required to access images effectively and efficiently using information contained in image dat...

DISASTER RECOVERY OF DATA BY USING DATA GUARD

Oracle Data Guard is the management, monitoring, and automation software infrastructure that creates, maintains, and monitors one or more standby databases to protect enterprise data from failures, disasters, errors, and...

Download PDF file
  • EP ID EP151003
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

Dr. Yudhvir Singh (2012). ATTACKS ON WIRELESS SENSOR NETWORK: A SURVEY. International Journal of Computer Science and Management Studies (IJCSMS) www.ijcsms.com, 12(3), 144-148. https://europub.co.uk/articles/-A-151003