Professional Documents
Culture Documents
Security in Wireless Sensor Network
Security in Wireless Sensor Network
Architecture of WSN
Attacks in WSN
Denial of Service:Physical Layer:- Jamming , Tampering Data link layer:-Collision,Exhaustion,Unfairness Network layer:-Neglect and Greed, Homing, Spoofing, Black Holes, Flooding Transport layer:-Flooding, De-synchronization
Sybil:Data Aggregation, Voting Wormhole:A routing attack where an adversary convinces a network node of a shorter, or zero, path to the base station, for example, and can disrupt the network in this manner. Sinkhole (Black hole):Sinkhole attacks typically work by making a compromised node look especially attractive to surrounding nodes with respect to the routing algorithm.
Security Requirements
Data Confidentiality Data Integrity Data Freshness Availability Self-Organization Time Synchronization Secure Localization Authentication
Conclusion
Security in sensor networks has been an increasingly important issue for both academia and in industry individuals and groups working in this fast growing research area. We have made a threat analysis to the Wireless Sensor Network and suggested some counter measures. A common assumption is most existing distributed key management schemes is that all sensor nodes have the same capability.