Network Layers Threats & its Countermeasures in WSNs

Vardaan Pruthi, Kanika Mittal, Nikhil Sharma, I. Kaushik
{"title":"Network Layers Threats & its Countermeasures in WSNs","authors":"Vardaan Pruthi, Kanika Mittal, Nikhil Sharma, I. Kaushik","doi":"10.1109/ICCCIS48478.2019.8974523","DOIUrl":null,"url":null,"abstract":"WSN can be termed as a collection of dimensionally diffused nodes which are capable of surveilling and analyzing their surroundings. The sensors are delicate, transportable and small in size while being economical at the same time. However, the diffused nature of these networks also exposes them to a variety of security hazards. Hence, ensuring a reliable file exchange in these networks is not an easy job due to various security requirements that must be fulfilled. In this paper we concentrate mainly on network layer threats and their security countermeasures to overcome the scope of intruders to access the information without having any authentication on the network layer. Various network layer intrusions that are discussed here include Sinkhole Attack, Sybil Attack, Wormhole Attack, Selective Forwarding Attack, Blackhole Attack And Hello Flood Attack.","PeriodicalId":436154,"journal":{"name":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCIS48478.2019.8974523","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

WSN can be termed as a collection of dimensionally diffused nodes which are capable of surveilling and analyzing their surroundings. The sensors are delicate, transportable and small in size while being economical at the same time. However, the diffused nature of these networks also exposes them to a variety of security hazards. Hence, ensuring a reliable file exchange in these networks is not an easy job due to various security requirements that must be fulfilled. In this paper we concentrate mainly on network layer threats and their security countermeasures to overcome the scope of intruders to access the information without having any authentication on the network layer. Various network layer intrusions that are discussed here include Sinkhole Attack, Sybil Attack, Wormhole Attack, Selective Forwarding Attack, Blackhole Attack And Hello Flood Attack.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络中的网络层威胁及其对策
无线传感器网络可以被称为维度上分散的节点的集合,这些节点能够监视和分析它们周围的环境。该传感器精密、便携、体积小,同时又经济实惠。然而,这些网络的分散性也使它们面临各种安全隐患。因此,由于必须满足各种安全需求,在这些网络中确保可靠的文件交换并不是一件容易的工作。本文主要研究了网络层的威胁及其安全对策,以克服入侵者不需要在网络层进行任何身份验证就可以访问信息的范围。这里讨论的各种网络层入侵包括天坑攻击、西比尔攻击、虫洞攻击、选择性转发攻击、黑洞攻击和Hello Flood攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Survey on Stress Emotion Recognition in Speech Weak Form Efficiency Of Currency Futures: Evidence From India YouTube Video Classification based on Title and Description Text SegNet-based Corpus Callosum segmentation for brain Magnetic Resonance Images (MRI) A synchronizer-mediator for lazy replicated databases over a decentralized P2P architecture
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1