Computer Science &Amp; Information Technology ( CS &Amp; IT ) 2013
DOI: 10.5121/csit.2013.3611
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensor Networks - Architecture, Security Requirements, Security Threats and its Countermeasures

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…An affected node which is placed in the middle of some places makes a large "sphere of influence", gaining all traffic intended for BS from the indicator nodes. The enemy objectives a place to make sinkhole where it can entice the most traffic, possibly nearer to the BS so that the harmful node could be considered a platform place or BS [14]. Sybil Attack: A node can occupy several identities that result in failing of the redundancy techniques of allocated information storage networks in peer-to-peer networks Sybil strike features by its property of comprising several nodes at the same time.…”
Section: Network Layer Sinkholementioning
confidence: 99%
See 1 more Smart Citation
“…An affected node which is placed in the middle of some places makes a large "sphere of influence", gaining all traffic intended for BS from the indicator nodes. The enemy objectives a place to make sinkhole where it can entice the most traffic, possibly nearer to the BS so that the harmful node could be considered a platform place or BS [14]. Sybil Attack: A node can occupy several identities that result in failing of the redundancy techniques of allocated information storage networks in peer-to-peer networks Sybil strike features by its property of comprising several nodes at the same time.…”
Section: Network Layer Sinkholementioning
confidence: 99%
“…A choice of the alleged node is designed through collecting the guidelines from the alleged node"s others who live nearby, on the situation that neighbor of an alleged node finds going above a particular limit in the bundle variety which failed to be ahead by the alleged node. [14]. Spoofed, Changed, or Replayed Routing Information: This is the most widely recognized direct assault against a redirecting method.…”
Section: Network Layer Sinkholementioning
confidence: 99%