Wireless Networks Security Using Dispersive Routing Mechanism

Download Now
Provided by: International Journal of Computer Science and Network
Topic: Security
Format: PDF
Attacks in wireless sensor networks are Compromised-Node (CN) and Denial-Of-Service (DOS). In the Compromised-Node attack (CN attack); an adversary physically compromises a subset of nodes to eavesdrop information, whereas in the denial-of-service attack, the adversary interferes with the normal operation of the network by actively disrupting, changing, or even paralyzing the functionality of a subset of nodes. These two attacks are similar in the sense that they both generate black holes areas within which the adversary can either passively intercept or actively block information delivery.
Download Now

Find By Topic