Download now Free registration required
Wireless Sensor Networks (WSN) is becoming a viable tool for many applications. In many cases these applications may be of critical nature, where the transmitting of vital information from sensors to base station or sink is crucial, and data loss cannot be tolerated. In a Wireless Sensor Network, the sensor nodes rely upon a multi-hop routing protocol to relay their data to the base station. However, most WSN routing protocols are vulnerable to attacks in which a malicious node can disrupt the routes, drop, modify or divert data away from the base station.
- Format: PDF
- Size: 302.99 KB