Mobility

Wireless Sensor Networks: Attack Models and Detection

Free registration required

Executive Summary

Unattended installation of sensor nodes (Motes) in the environment causes many security threats in the wireless sensor networks. Sinkhole attack is among the most destructive routing attacks for these networks. It may cause the intruder to lure all or most of the data flow that has to be captured at the base station. Routing protocol MintRoute is used to implement this attack. Once sinkhole attack has been implemented and the adversary node has started to work as network member in the data routing, it can apply some more threats such as, forwarding only the selective packets i.e., selective forwarding or dropping all the packets and forming a blackhole.

  • Format: PDF
  • Size: 582.44 KB