Open Access Open Access  Restricted Access Subscription Access

Security Threats in Wireless Sensor Networks in Each Layer


Affiliations
1 Department of Electronics and Communication Engineering, Global Academy of Technology, Bangalore-98, India
2 Department of Information Science and Engineering, Global Academy of Technology, Bangalore-98, India
 

As the Wireless Sensor Networks (WSN) prove to be more beneficial in real-world applications. At the same time threatened by vulnerabilities. The threats faced by these WSN are similar but not limited to those observed in a simple network of computers or Internet. Attacks at all the layers of network protocol can be expected. Wireless sensor networks are characterized by severely constrained computational and energy resources and ad hoc operational environment. Resource limitations of WSN make these threats even more dangerous, even up to the extent of the consumption of a whole node or even a complete small network. This paper deals with the security aspects in the wireless sensor network giving the probable counter measures for the same.

Keywords

Data Authenticity, WSN, Attacks on Sensor Networks, Denial of Service, Reliability, Availability.
User
Notifications
Font Size

Abstract Views: 122

PDF Views: 2




  • Security Threats in Wireless Sensor Networks in Each Layer

Abstract Views: 122  |  PDF Views: 2

Authors

Anitha S. Sastry
Department of Electronics and Communication Engineering, Global Academy of Technology, Bangalore-98, India
Shazia Sulthana
Department of Electronics and Communication Engineering, Global Academy of Technology, Bangalore-98, India
S. Vagdevi
Department of Information Science and Engineering, Global Academy of Technology, Bangalore-98, India

Abstract


As the Wireless Sensor Networks (WSN) prove to be more beneficial in real-world applications. At the same time threatened by vulnerabilities. The threats faced by these WSN are similar but not limited to those observed in a simple network of computers or Internet. Attacks at all the layers of network protocol can be expected. Wireless sensor networks are characterized by severely constrained computational and energy resources and ad hoc operational environment. Resource limitations of WSN make these threats even more dangerous, even up to the extent of the consumption of a whole node or even a complete small network. This paper deals with the security aspects in the wireless sensor network giving the probable counter measures for the same.

Keywords


Data Authenticity, WSN, Attacks on Sensor Networks, Denial of Service, Reliability, Availability.