Attacks on wireless network, Computer Network Security

Q. Attacks on wireless network

WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distribution, and multipath routing of packets. Hu, Ziobro, Tillett and Sharma, Karlof  and Wagner, and Kaplantzis that Sybil attacks as being critical in WSN because the attacks compromise the integrity of the network by ensuring broadcast packets based on direct vs. indirect communication, stolen vs. fabricated identities are undetected. Eschenauer and Gligor and Gautam, Lee, Pyun and Jae-Young show that Sybil attacks are propagated directly or indirectly using misbehaving nodes, voting, routing, data aggregation, and distributed storage techniques. A detailed study on solutions based on direct validation, indirect validation, resource testing are deficient countermeasures against such attacks. Liu, Ning and Li questions and affirms that modern techniques which depend on radio resource testing, post verification, RSSI based detection scheme, registration, code attestation, and random key distribution do not provide complete security to a WSN underscoring the need for a triple key management scheme.

Posted Date: 7/26/2013 7:09:51 AM | Location : United States







Related Discussions:- Attacks on wireless network, Assignment Help, Ask Question on Attacks on wireless network, Get Answer, Expert's Help, Attacks on wireless network Discussions

Write discussion on Attacks on wireless network
Your posts are moderated
Related Questions
Guided Media These are those that give a conduit from one machine to another that add twisted-pair, fiber-optic cable and coaxial cable. A signal traveling along any of these

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i


PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc

A  full-duplex (FDX) , accepts communication in both ways, and, unlike half-duplex, accept this to occur simultaneously. Land-line telephone networks are full-duplex, since they