Implementation of Wireless Sensor’s Integration Possibilities and Attacks on Wireless Network Control

  • R* M
  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Collection of independent sensor nodes is primarily used as a combination of wireless detection and data networks are called wireless sensor networks (WSN). Wireless networks face many unacceptable security threats as these types of sensors are used primarily in many critical tasks such as military applications, claims management, environmental conditions, health applications, and more. Although the energy problem of the sensor network is more critical due to the absence of sensor nodes. The suggestion that other classes of source-based attacks are referred to as vampire attacks. Vampire attacks result in greater use of power during message delivery, which in turn prevents the entire network from quickly emptying node batteries. Because it uses protocol complaint messages to create attacks that make it difficult to detect and prevent. In this article, we intend to study and analyze vampire attacks and their effects on WSN. We also study cryptographic techniques using solutions for these types of attacks. This document explores the investigation of vampire attacks and their solution is provided in combination with the Minimum Spanning Encryption (MST) and RC5 techniques.

Cite

CITATION STYLE

APA

R*, Ms. Poonkodi., & Selvam, Dr. N. S. (2019). Implementation of Wireless Sensor’s Integration Possibilities and Attacks on Wireless Network Control. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 5725–5730. https://doi.org/10.35940/ijrte.d8483.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free