2008 International Conference on Information and Automation 2008
DOI: 10.1109/icinfa.2008.4608027
|View full text |Cite
|
Sign up to set email alerts
|

Wireless sensor networks misdirection attacker challenges and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…The modules are the UI module, a database module, a detection module, and a prevention module. As a solution to the misdirection attack, a SASO algorithm [30] is applied in the network context. The simulation was done of a Local Administrative Function using Omnet++.…”
Section: Network Layer Attacks In Wbansmentioning
confidence: 99%
“…The modules are the UI module, a database module, a detection module, and a prevention module. As a solution to the misdirection attack, a SASO algorithm [30] is applied in the network context. The simulation was done of a Local Administrative Function using Omnet++.…”
Section: Network Layer Attacks In Wbansmentioning
confidence: 99%
“…There is a presence of the selfish nodes in the network which misdirect the packets and there is a decrease in the efficiency of the complete system due to this. [1,2,7,8].…”
Section: Misdirectional Attackmentioning
confidence: 99%
“…The paper also presented the challenges of sensor networks. Maan younis Abdullah et al [8], "Wireless Sensor Networks Misdirection Attacker Challenges and Solutions", 2008 There are various challenges that a wireless sensor network faces due to the misdirectional attacks. This type of attack does not allow the packets to be received by the destination address.…”
Section: Literature Survey Juby Joseph Et Al [1]mentioning
confidence: 99%
“…An investigation to network supervisors comprehend and evaluate the different threats connected with the utilization of remote innovation and various accessible answers for countering those threats are talked about. Remote Sensor Networks give a various chances to expanding profitability and minimizing costs [7]. Kalpana Sharma and M K Ghose discuss the issue of security is because of the wireless nature of the sensor organizes and obliged nature of resources on the wireless sensor nodes, which implies that security models utilized for conventional wireless systems are not practical.…”
Section: IImentioning
confidence: 99%
“…It is a network layer attack. The solution to this problem is monitoring the network and flexible routing schemes [7].…”
Section: A Worm Hole Attackmentioning
confidence: 99%