Node Capture Attack in Wireless Sensor Network: A Survey

被引:0
|
作者
Bharathi, M. Vivekananda [1 ]
Tanguturi, Rama Chaithanya [2 ]
Jayakumar, C. [3 ]
Selvamani, K. [2 ]
机构
[1] RMK Engn Coll, Madras, Tamil Nadu, India
[2] Anna Univ, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[3] RMK Engn Coll, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2012年
关键词
Wireless Sensor Networks; Security; Node Capture Attack;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Networks (WSNs) is an emerging and powerful technique for today's real world applications with interactive environments. The application of wireless sensor network starts from environment, household monitoring and ranging up to critical military applications. As their application involving in transmitting critical information, which require challenging methods to provide security for WSNs. Among various attacks in wireless sensor network, node capture attack is a serious attack through which an intruder can performs various operations on the network and can easily compromise the entire network. Node captures attack s one of the hazardous attack in WSNs. The wireless sensor network requires robust mechanism to improve the detection of node capture attack. Our survey analyzes various protocols and detection schemes to propose a new technique to achieve network resilience against node capture attacks.
引用
收藏
页码:340 / 342
页数:3
相关论文
共 50 条
  • [31] A Novel Reputation Model for Malicious Node Detection in Wireless Sensor Network
    Yin, Guisheng
    Yang, Guang
    Yang, Wu
    Yu, Xiang
    Zuo, Dongmei
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3462 - +
  • [32] Maximizing the Network Lifetime Using Supervisory Node in Wireless Sensor Networks
    Manasa, P.
    Shaila, K.
    Venugopal, K. R.
    2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,
  • [33] Survey of Network Management Protocols in Wireless Sensor Network
    Zhang, Bin
    Li, Guohui
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 850 - 854
  • [34] Blockchain-Based Wireless Sensor Networks for Malicious Node Detection: A Survey
    Ramasamy, Lakshmana Kumar
    Khan, Firoz K. P.
    Imoize, Agbotiname Lucky
    Ogbebor, Joshua O.
    Kadry, Seifedine
    Rho, Seungmin
    IEEE ACCESS, 2021, 9 : 128765 - 128785
  • [35] Security Against Black Hole Attack In Wireless Sensor Network-A Review
    Mishra, Binod Kumar
    Nikam, Mohan C.
    Lakkadwala, Prashant
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 615 - 620
  • [36] Node authentication algorithm for securing static wireless sensor networks from node clone attack
    Mohindru V.
    Singh Y.
    International Journal of Information and Computer Security, 2018, 10 (2-3) : 129 - 148
  • [37] Optimization of Adaptive Linear Sensor Node Array in Wireless Sensor Network
    Abd Malik, Nik Noordini Nik
    Esa, Mazlina
    Yusof, Sharifah Kamilah Syed
    APMC: 2009 ASIA PACIFIC MICROWAVE CONFERENCE, VOLS 1-5, 2009, : 2336 - 2339
  • [38] Impact of rate of recurrent communication of sensor node on network lifetime in a wireless sensor network
    Natarajan, Hemavathi
    Nagpal, Shobhit Kumar
    Selvaraj, Sudha
    IET SCIENCE MEASUREMENT & TECHNOLOGY, 2017, 11 (04) : 473 - 479
  • [39] A smart wireless sensor network node for fire detection
    Khalid, Wajahat
    Sattar, Asma
    Qureshi, Muhammad Ali
    Amin, Asjad
    Malik, Mobeen Ahmed
    Memon, Kashif Hussain
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2019, 27 (04) : 2541 - 2556
  • [40] Wireless sensor network operating systems: a survey
    Reddy, Adi Mallikarjuna, V
    Kumar, A. V. U. Phani
    Janakiram, D.
    Kumar, G. Ashok
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2009, 5 (04) : 236 - 255