Download now Free registration required
Wireless Sensor Networks are deprived of high memory requirements, high processing power, and are limited in usage of efficient security mechanisms. They are susceptible to possible node compromise, passive and active attacks. Most of the public key cryptographic techniques are found to be more work prone with the secure exchange of keys, lengthy hash operations with high processing rounds etc. Even though comprehensive surveys are made in disseminating sensor reports securely to the sink, those mechanisms do not provide adequate verification process of reports from source to destination nor do they completely mitigate false report injection attacks and Denial of Service attacks (DoS).
- Format: PDF
- Size: 456.5 KB