Mobility Investigate

Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks

Download now Free registration required

Executive Summary

Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power. WSNs are mostly unguarded. Hence, capturing a node physically, altering its code and getting private information like cryptographic keys is easily possible for an attacker. Wireless medium is inherently broadcast in nature.

  • Format: PDF
  • Size: 489.6 KB