2016
DOI: 10.3390/s16111932
|View full text |Cite
|
Sign up to set email alerts
|

Simulation of Attacks for Security in Wireless Sensor Network

Abstract: The increasing complexity and low-power constraints of current Wireless Sensor Networks (WSN) require efficient methodologies for network simulation and embedded software performance analysis of nodes. In addition, security is also a very important feature that has to be addressed in most WSNs, since they may work with sensitive data and operate in hostile unattended environments. In this paper, a methodology for security analysis of Wireless Sensor Networks is presented. The methodology allows designing attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(22 citation statements)
references
References 48 publications
(57 reference statements)
0
22
0
Order By: Relevance
“…Therefore, fast and accurate simulations of WSNs in the presence of an adversary are of the great value in designing resilient, but also secure sensor networks. In [68], authors surveyed most popular network simulators. What is common for all of them is that they lack an unified security module.…”
Section: Security Attacks Evaluation In Coojamentioning
confidence: 99%
“…Therefore, fast and accurate simulations of WSNs in the presence of an adversary are of the great value in designing resilient, but also secure sensor networks. In [68], authors surveyed most popular network simulators. What is common for all of them is that they lack an unified security module.…”
Section: Security Attacks Evaluation In Coojamentioning
confidence: 99%
“…Moreover, keeping signatures of attacks to generate data base is a complicated task for WSN due to its limited memory and processing capabilities. However, in very few studies, this method has been explored using watchdog approach [83][84][85][86]. Watchdog approach uses the abnormal behavior of a node to detect an intrusion.…”
Section: Misuse Detectionmentioning
confidence: 99%
“…In this type of attack, a malicious or fake node registers all the information and diverts it to wrong path. This attack can be formed without the knowledge of cryptography of actual wireless sensor node [84][85][86].…”
Section: Wormhole Attackmentioning
confidence: 99%
See 2 more Smart Citations