Research on the Attack and Defense Technologies of Wireless Sensor Networks

Article Preview

Abstract:

Wireless sensor network is one of the three emerging technologies which have changed peoples life in the 21st century. More and more scholars at home and abroad are interested in wireless sensor network because of its vast potentials for future development. However, because of openness of the wireless sensor network, it is easily attacked by several network aspects. This paper will introduce the basic concept of wireless sensor network first and then present potential safety hazards on each protocol stack layer of the wireless sensor network from the perspective of layered network. An overview of the current popular means of defense on each protocol stack layer will also be summarized and the future research trend of attack and defense means of the wireless sensor network will be put forward finally in this paper.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1943-1946

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Huazhong Zhang. Outlook of wireless sensor network [J] . Inner Mongolia Science and Technology and Economy, 2005(4) : 22-23.

Google Scholar

[2] Krontiris I, Dimitriou T, Giannetsos T, et al. Intrusion detection of sinkhole attacks[C] Proceedings of the 3rd international conference on Algorithmic aspects of wireless sensor networks, 2008: 150-161.

DOI: 10.1007/978-3-540-77871-4_14

Google Scholar

[3] Ngai E H, Liu Jiang-chuan, Lyu M R. An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks[J] . Computer Communications. 2007 (30) : 2353-2364.

DOI: 10.1016/j.comcom.2007.04.025

Google Scholar

[4] Madria S, Jian Yin. SeRWA: A secure routing protocol against wormhole attacks in sensor networks[J] . AD HOC Networks, 2009(7) : 1051-1063.

DOI: 10.1016/j.adhoc.2008.09.005

Google Scholar

[5] Liu Wei, Qiaolin Chai. Prevention of black-hole attacks using worm-holes theories [J]. Computer Engineering and Design, 2007, 28(20) : 4888-4892.

Google Scholar

[6] Yun J, Kim I, Lim J, et al. WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks[J]. Lecture Notes in Computer Science(LNCS), 2007, (4412): 200-209.

DOI: 10.1007/978-3-540-71789-8_21

Google Scholar

[7] Khalil I, Bagchi S, Shroff N B. Liteworp : detection and isolation of the wormhole attack in static multihop wireless networks[J] . Computer Networks, 2007(5): 3750-3772.

DOI: 10.1016/j.comnet.2007.04.001

Google Scholar

[8] Caixia Liu, Tinglei Huang. Research on Node Secure Localization Algorithm against Wormhole Attacks in WSN [J] . Chinese Journal of Sensors and Actuators, 2011, 24(10) : 1473-1478.

Google Scholar

[9] Qiming Zhou, Yiong He. Simulation and approach to defend of wormhole attack in DV-Hop algorithm [J] . Computer Engineering and Applications, 2010(14) : 88-90, 94.

Google Scholar