TAILIEUCHUNG - A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks

The security administrator logged into the Locate web console and input the IP address and dates from the IDS log. Locate looked up the historical information for the time period in question. He was immediately presented with the name, location, and phone number of the user who was using the workstation to log into the mainframe. Within seconds the security administrator had the information he needed to make his report. The Locate Solution The security administrator logged into the Locate web console and input the IP address and dates from the IDS log. Locate looked up the historical information for the time. | International Journal of Computer Trends and Technology- May to June Issue 2011 A Survey on Network Security and Attack Defense Mechanism For Wireless Sensor Networks Shio Kumar Singh 1 M P Singh 2 and D K Singh 3 Maintenance Engineering Department Electrical Tata Steel Limited Jamshedpur - 831001 Jharkhand India 2 Computer Science and Engineering Department National Institute of Technology Patna Bihar India 3 Electronics and Com. Engg. Dept Birsa Institute of Technology Sindri Dhanbad -828123 Jharkhand India Abstract The severe constraints and demanding deployment environments of wireless sensor networks make security for these systems more challenging than for conventional networks. However several properties of sensor networks may help address the challenge of building secure networks. The unique aspects of sensor networks may allow novel defenses not available in conventional networks. In this paper we investigate the security related issues and challenges in wireless sensor networks. We identify the security threats review proposed security mechanisms for wireless sensor networks. Keywords Wireless Sensor Networks WSNs Security Threats Attacks I. INTRODUCTION Wireless sensor network WSN is a heterogeneous system combining thousands to millions of tiny inexpensive sensor nodes with several distinguishing characteristics. It has very low processing power and radio ranges permitting very low energy consumption in the sensor nodes and performing limited and specific sensing and monitoring functions 2 3 4 5 6 7 . However WSNs form a particular class of ad hoc networks that operate with little or no infrastructure and have attracted researchers for its development and many potential civilian and military applications such as environmental monitoring battlefield surveillance and homeland security. In many important military and commercial applications it is critical to protect a sensor network from malicious attacks which presents a demand for providing security .

TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.