Wireless Sensor Networks: Attack Models and Detection

Unattended installation of sensor nodes (Motes) in the environment causes many security threats in the wireless sensor networks. Sinkhole attack is among the most destructive routing attacks for these networks. It may cause the intruder to lure all or most of the data flow that has to be captured at the base station. Routing protocol MintRoute is used to implement this attack. Once sinkhole attack has been implemented and the adversary node has started to work as network member in the data routing, it can apply some more threats such as, forwarding only the selective packets i.e., selective forwarding or dropping all the packets and forming a blackhole.

Provided by: International Association of Computer Science & Information Technology (IACSIT) Topic: Mobility Date Added: Jan 2012 Format: PDF

Find By Topic