Attacks on wireless network, Computer Network Security

Q. Attacks on wireless network

WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distribution, and multipath routing of packets. Hu, Ziobro, Tillett and Sharma, Karlof  and Wagner, and Kaplantzis that Sybil attacks as being critical in WSN because the attacks compromise the integrity of the network by ensuring broadcast packets based on direct vs. indirect communication, stolen vs. fabricated identities are undetected. Eschenauer and Gligor and Gautam, Lee, Pyun and Jae-Young show that Sybil attacks are propagated directly or indirectly using misbehaving nodes, voting, routing, data aggregation, and distributed storage techniques. A detailed study on solutions based on direct validation, indirect validation, resource testing are deficient countermeasures against such attacks. Liu, Ning and Li questions and affirms that modern techniques which depend on radio resource testing, post verification, RSSI based detection scheme, registration, code attestation, and random key distribution do not provide complete security to a WSN underscoring the need for a triple key management scheme.

Posted Date: 7/26/2013 7:09:51 AM | Location : United States







Related Discussions:- Attacks on wireless network, Assignment Help, Ask Question on Attacks on wireless network, Get Answer, Expert's Help, Attacks on wireless network Discussions

Write discussion on Attacks on wireless network
Your posts are moderated
Related Questions
Question (a) Estimate the average throughput between two hosts given that the RTT for a 100 bytes ICMP request-reply is 1 millisecond and that for a 1500 bytes is 2 millisecon

QUESTION (a) Briefly explain the contents of the Needs Analysis, which is step in the process of network design. (b) Describe on the three ways of improving the performan

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

TRANSPORT PROTOCOLS: Give application-to-application communication. Require extended addressing mechanisms to check applications. Are known end-to-end communicatio

BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

LEGAL, ETHICAL AND PROFESSIONAL ISSUES To minimize liabilities and reduce risks, information security practitioner should: •    to understand current legal environment •    to s

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Question: a) What do you meant by Privacy? b) Name the four privacy violations. c) Often, aggregate information and anonymized information can be combined to identif