earticle

논문검색

Sinkhole Vulnerabilities in Wireless Sensor Networks

초록

영어

Sinkhole attacks in wireless sensor networks occur when a compromised node tries to attract network traffic by advertising un-authorized/illegitimate routing updates. The victim node sends data to the compromised node rather than sending it to the node it was formerly using. Sinkhole attacks are typically used to launch other attacks on the network such as selective forwarding and wormhole attacks. Once the network is compromised it is very hard to predict the kind of attack that is to follow. For this reason, there is a need to strengthen the security of wireless sensor networks. In this paper, we first describe the challenges in detecting sinkhole attacks in wireless sensor networks, followed by an analysis of methods to prevent, detect and neutralize sinkhole attacks. The analysis will be based on discussing the advantages and limitations of the proposed solutions.

목차

Abstract
 1. Introduction
 2. Sinkhole Attacks
 3. Challenges in Detecting Sinkhole Attacks in WSN
 4. Related Work
  4.1. Categorizing Existing Approaches
  4.2. Detection Based Approaches
  4.3. Prevention Based Approaches
  4.4. Hybrid Approaches
 5. Conclusion
 6. Future Research
 References

저자정보

  • Junaid Ahsenali Chaudhry Center for Advanced Image and Information Technology, School of Electronics & Information Engineering, ChonBuk National University, Jeonju, Korea.
  • Usman Tariq College of Computer Engineering & Sciences Salman Bin Abdulaziz University 151 Alkharj 11942 Kingdom of Saudi Arabia
  • Mohammed Arif Amin Department of Computer and Information Science (HCT), Abu Dhabi, United Arab Emirates.
  • Robert G. Rittenhouse Keimyung Adams College, Keimyung University Daegu, 704-701, South Korea,

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.