Although the computing devices in today's era can be compromised in a variety of ways, this research paper delves deep into different types of cyber attacks that strip out security from the innocent clients. The impact of these attacks depend more on the broad spectrum of opportunities that a novice user serves to an attacker unknowingly. Though a client sometimes has minimum power to withstand the technical prowess of a skilled attacker, still the probability of such attacks can be nullified by reducing the vulnerabilities of a particular computing system. Thus conscious risk management strategies need to be implemented to save organizations and billions of users across the world surfing the web wirelessly. The paper starts with a brief introduction about various wireless attacks that are frequently carried out in a local area network and their classifications. The research presents several schemes for detecting, mitigating and preventing such type of precarious attacks. Role of user awareness in diminishing the threatening effects of such assaults has been specially taken into consideration. The important features and limitations of the already reported methods against protection of such attacks have been examined.
Wireless Sensor Networks (WSNs) have a wonderful potential to interconnect with the physical world and collect data. Data estimation, long lifespan, deployment, routing, task scheduling, safety, and localization are the primary performance difficulties for WSNs. WSNs are made up of sensor nodes set up with minimal battery power to monitor and reveal the occurrences in the sensor field. Detecting the location is a difficult task, but it is a crucial characteristic in many WSN applications. Locating all of the sensor nodes efficiently to obtain the precise location of an occurrence is a critical challenge. Surveillance, animal monitoring, tracking of moving objects, and forest fire detection are just a few of the applications that demand precise location determination. To cope with localization challenges in WSNs, there is a variety of localization algorithms accessible in the literature. The goal of this research is to use various optimization strategies to solve the localization problem. In this work, a modified learning enthusiasm-based teaching–learning-based optimization (mLebTLBO) algorithm is used to cope with a 2D localization problem applying the notion of an exclusive anchor node and movable target nodes. A modified LebTLBO algorithm seeks to increase overall efficiency by assessing the exploration and exploitation abilities. The computational results reveal that this technique outperforms others with respect to localization errors in a 2D environment of WSN.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.