Attacks on wireless network, Computer Network Security

Q. Attacks on wireless network

WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distribution, and multipath routing of packets. Hu, Ziobro, Tillett and Sharma, Karlof  and Wagner, and Kaplantzis that Sybil attacks as being critical in WSN because the attacks compromise the integrity of the network by ensuring broadcast packets based on direct vs. indirect communication, stolen vs. fabricated identities are undetected. Eschenauer and Gligor and Gautam, Lee, Pyun and Jae-Young show that Sybil attacks are propagated directly or indirectly using misbehaving nodes, voting, routing, data aggregation, and distributed storage techniques. A detailed study on solutions based on direct validation, indirect validation, resource testing are deficient countermeasures against such attacks. Liu, Ning and Li questions and affirms that modern techniques which depend on radio resource testing, post verification, RSSI based detection scheme, registration, code attestation, and random key distribution do not provide complete security to a WSN underscoring the need for a triple key management scheme.

Posted Date: 7/26/2013 7:09:51 AM | Location : United States







Related Discussions:- Attacks on wireless network, Assignment Help, Ask Question on Attacks on wireless network, Get Answer, Expert's Help, Attacks on wireless network Discussions

Write discussion on Attacks on wireless network
Your posts are moderated
Related Questions
Let me know the details of protocol tcp/ip

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Problem: (a) Use a simple example to explain what is meant by a finite state machine. (b) Describe the time limit problem in an interrupt-driven system. (c) A certain m

Ask quIf you are pinging a web server from a user’s client PC, how might the statistical information provided by ping be useful to you?estion #Minimum 100 words accepted#

Risk Management Discussion Points Organizations should define level of risk it can live with Risk appetite: it defines quantity and nature of risk which organizations are wil

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

types of firewall and backup

Problem 1: a) One of the limitations of file processing systems is data inconsistency. Briefly explain with the help of an example what do you understand by this phrase. b)

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G