2012 IEEE International Conference on Computational Intelligence and Computing Research 2012
DOI: 10.1109/iccic.2012.6510237
|View full text |Cite
|
Sign up to set email alerts
|

Node capture attack in Wireless Sensor Network: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(21 citation statements)
references
References 6 publications
0
19
0
Order By: Relevance
“…An attacker gains full control over a key node, such as a gateway node. It may leak all information including communication between sender and receiver, a key used to make secure communication and information stored in memory [ 38 ]. Fake Node and Malicious: It is an attack in which an attacker adds a node to the system and inputs fake data.…”
Section: Iot Layered Architectures With Security Attacksmentioning
confidence: 99%
“…An attacker gains full control over a key node, such as a gateway node. It may leak all information including communication between sender and receiver, a key used to make secure communication and information stored in memory [ 38 ]. Fake Node and Malicious: It is an attack in which an attacker adds a node to the system and inputs fake data.…”
Section: Iot Layered Architectures With Security Attacksmentioning
confidence: 99%
“…Therefore, a node capture attack makes it possible to eavesdrop between nodes. In addition, it can be fatal to many important functions of the sensor network, such as routing, resource allocation, and malfunction detection because of the duplicated ID [42].…”
Section: ) Node Capturementioning
confidence: 99%
“…A node catch assault can cause a genuine effect on the system. To safeguard against this attack of node capture, viable plans to screen and distinguish malevolent nodes should be considered [31].…”
Section: Amentioning
confidence: 99%