Academic Journals Database
Disseminating quality controlled scientific knowledge

Jamming Attacks and Secure Routing In Wireless Sensor Networks

ADD TO MY LIST
 
Author(s): http://www.ijettjournal.org/volume-4/issue-8/IJETT-V4I8P118.pdf

Journal: International Journal of Engineering Trends and Technology
ISSN 2231-5381

Volume: 4;
Issue: 8;
Start page: 3336;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: wireless sensor | Networking | Security | Attacks.

ABSTRACT
we consider about routing security in wireless sensor networks. Several sensor network routing protocols are planned; however none of them are designed with security as a goal. we tend to propose security goals for routing in sensor networks, show however attacks against ad-hoc and peer-to-peer networks is tailored into powerful attacks against sensor networks, introduce 2 categories of novel attacks against sensor networks — sinkholes and hi floods, and analyze the protection of all the main sensor network routing protocols. We tend to describe incapacitating attacks against all of them and recommend countermeasures and style concerns. This is often the rest such analysis of secure routing in sensor networks.
Save time & money - Smart Internet Solutions     

Tango Rapperswil
Tango Rapperswil