Attacks on wireless network, Computer Network Security

Q. Attacks on wireless network

WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distribution, and multipath routing of packets. Hu, Ziobro, Tillett and Sharma, Karlof  and Wagner, and Kaplantzis that Sybil attacks as being critical in WSN because the attacks compromise the integrity of the network by ensuring broadcast packets based on direct vs. indirect communication, stolen vs. fabricated identities are undetected. Eschenauer and Gligor and Gautam, Lee, Pyun and Jae-Young show that Sybil attacks are propagated directly or indirectly using misbehaving nodes, voting, routing, data aggregation, and distributed storage techniques. A detailed study on solutions based on direct validation, indirect validation, resource testing are deficient countermeasures against such attacks. Liu, Ning and Li questions and affirms that modern techniques which depend on radio resource testing, post verification, RSSI based detection scheme, registration, code attestation, and random key distribution do not provide complete security to a WSN underscoring the need for a triple key management scheme.

Posted Date: 7/26/2013 7:09:51 AM | Location : United States







Related Discussions:- Attacks on wireless network, Assignment Help, Ask Question on Attacks on wireless network, Get Answer, Expert's Help, Attacks on wireless network Discussions

Write discussion on Attacks on wireless network
Your posts are moderated
Related Questions
REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

Problem: (a) What do you meant by Network Address Translation (NAT)? Why is it used? (b) Given the following information by your ISP about your newly acquired Frame Relay c

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Question 1 Explain any two types of security policies Question 2 What is security attack? Explain with examples Question 3 Explain different characteristics that i

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

discuss the merits and demerits of computers freezing

define .

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

for making the assignment