Analysis and Removal of Vulnerabilities in Masquerading Attack in Wireless Sensor Networks

Wireless Sensor Networks (WSN) consist of tiny devices called sensor nodes with RF radio, processor, memory, battery and sensor hardware. Individual can specifically monitor the environment with widespread deployment of these devices. Sensor nodes are resource constrained in terms of the RF radio range, processor speed, memory size and power. WSNs are mostly unguarded. Hence, capturing a node physically, altering its code and getting private information like cryptographic keys is easily possible for an attacker. Wireless medium is inherently broadcast in nature.

Provided by: International Journal of Computer Technology and Electronics Engineering Topic: Mobility Date Added: Jun 2012 Format: PDF

Find By Topic