Node Capture Attack in Wireless Sensor Network: A Survey

被引:0
|
作者
Bharathi, M. Vivekananda [1 ]
Tanguturi, Rama Chaithanya [2 ]
Jayakumar, C. [3 ]
Selvamani, K. [2 ]
机构
[1] RMK Engn Coll, Madras, Tamil Nadu, India
[2] Anna Univ, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
[3] RMK Engn Coll, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
来源
2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC) | 2012年
关键词
Wireless Sensor Networks; Security; Node Capture Attack;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless Sensor Networks (WSNs) is an emerging and powerful technique for today's real world applications with interactive environments. The application of wireless sensor network starts from environment, household monitoring and ranging up to critical military applications. As their application involving in transmitting critical information, which require challenging methods to provide security for WSNs. Among various attacks in wireless sensor network, node capture attack is a serious attack through which an intruder can performs various operations on the network and can easily compromise the entire network. Node captures attack s one of the hazardous attack in WSNs. The wireless sensor network requires robust mechanism to improve the detection of node capture attack. Our survey analyzes various protocols and detection schemes to propose a new technique to achieve network resilience against node capture attacks.
引用
收藏
页码:340 / 342
页数:3
相关论文
共 50 条
  • [41] Detailed Survey on Attacks in Wireless Sensor Network
    Dhakne, A. R.
    Chatur, P. N.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 319 - 331
  • [42] Study on node localization algorithms in wireless sensor network
    Jian, Deng
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3952 - 3955
  • [43] Node Architectures and Its Deployment in Wireless Sensor Networks: A Survey
    Kushwaha, Sumit
    Kumar, Vinay
    Jain, Sanjeev
    HIGH PERFORMANCE ARCHITECTURE AND GRID COMPUTING, 2011, 169 : 515 - +
  • [44] A NOVEL SYBIL ATTACK DETECTION SCHEME FOR WIRELESS SENSOR NETWORK
    Tian, Bin
    Yao, Yizhan
    Shi, Lei
    Shao, Shuai
    Liu, Zhaohui
    Xu, Changxing
    2013 5TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY (IC-BNMT), 2013, : 294 - 297
  • [45] Security issues in wireless sensor network - A survey
    Vikas
    Sagar, B. B.
    Munjul, Manisha
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (05) : 1415 - 1427
  • [46] A Detection and Prevention of Wormhole Attack in Homogeneous Wireless Sensor Network
    Bhagat, Swati
    Panse, Trishna
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [47] Attack Wireless Sensor Network using Compromised Key Redistribution
    Yein, Alan Dahgwo
    Chen, Cheng-Yeh
    Hsu, Te-Cheng
    Hsieh, Wen-Shyong
    Lin, Jiun-An
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 920 - +
  • [48] Securing Mobile Wireless Sensor Networks (WSNs) against Clone Node Attack
    Qabulio, Mumtaz
    Malkani, Yasir Arfat
    Keerio, Ayaz
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 50 - 55
  • [49] Strategies and techniques for node placement in wireless sensor networks: A survey
    Younis, Mohamed
    Akkaya, Kemal
    AD HOC NETWORKS, 2008, 6 (04) : 621 - 655
  • [50] Detecting node replication attacks in wireless sensor networks: A survey
    Zhu, Wen Tao
    Zhou, Jianying
    Deng, Robert H.
    Bao, Feng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (03) : 1022 - 1034