Introduction With the increasing popularity of mobile devices and recent developments in wireless communication, wireless sensor networks are one of the upcoming fields of interest from research perspective. Sensor networks consists of ‘smart nodes’ which are resource constrained in terms of memory, energy, computation power. These nodes communicate wirelessly and pass their information to the main node usually called as sink node or base station. these sensor nodes comprised of their own sensors ,processor, radio transceiver, energy resource usually a battery providing them the ability of sensing, processing and communication capability. The first implementation of the wireless sensor networks was by military applications but nowadays these networks are used in environmental applications, medical applications, home appliances and various other commercial and consumer applications. In wireless sensor networks the sensor nodes are deployed densely which work collaboratively to monitor the specific task and then communicating with each other or with a base station. The topology of sensor networks may range from simple flat model to multihop clustering model. These networks have low memory, low bandwidth, low power and large scale node and the various other factors influencing the design of sensor networks are: fault tolerance, scalability, production costs, operating environment, hardware constraints etc. Therefore, the design of these networks must encounter all these factors. However, due to wireless nature of these networks and no tamper-resistant hardware makes it vulnerable to various types of attacks and these attacks are possible almost every layer of the OSI layer. As these networks are physically weak networks it is ve... ... middle of paper ... ...or the network traffic on the communication channels without the knowledge of sending and receiving party. As in the wireless sensor networks wireless signals are broadcasted which are accessible to the public and attacker can easily plug himself between the ranges of communication channel. 3: Jamming: These types of attacks are performed by deploying large number of nodes which can cause intense noise in the network and occupying the network channels making the transmission media unavailable for the other nodes. These types of attacks rarely occur because these jamming devices are easily detectable as sensor nodes sense the noise which is much larger than the usual noise in the network. MAC layer: At this layer the attacker tries to disrupt the various coordination rules and produces the harmful traffic. They also tries to spoof the identities at MAC layer.
Properly secure wireless systems: - To prevent data breaches it is very important to secure wireless networks. WI- Fi network security is necessary because it is very easy to hack the data and unauthorized access. Breaches can be prevented by using strong passwords, encryption methods, and strong verification.
Reed (November 21, 2003). Applying the OSI seven layer model to Information Security. Retrieved on January 11, 2008, from SANS Institute. Website: http://www.sans.org/reading_room/whitepapers/protocols/1309.php
An attacker wishing to disrupt a wireless network has a wide arsenal available to them. Many of these tools rely on using a faked MAC address, masquerading as an authorized wireless access point or as an authorized client. Using these tools, an attacker can launch denial of service attacks, bypass access control mechanisms, or falsely advertise services to wireless clients.
Large amounts of data streams are generated in resource-constrained environments. Sensor networks represent a typical example. These devices have short life batteries. The design of techniques that are energy efficient is a crucial issue given that sending all the generated stream to a central site is energy inefficient in addition to its lack of scalability problem.
The rapid progress of embedded MEMS (micro-sensing technologies) and wireless communication has made wireless sensor networks possible. Such an environment may have many wireless nodes which are inexpensive; each node is capable of collecting, storing and processing environmental data, and communicating with neighboring nodes. These sensors are connected with wires in the past but tod...
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important, especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions of the most dangerous wireless attacks out there today. Finally, I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
Networks are designed in a number of ways, based on the geographical area, the technology used, user group specific, application based etc. But we can roughly categorize the communication networks in 2 broad categories, based on transmission: Connection-Oriented and Connectionless.
Insecure medium- In VANET, due to broadcasting nature communication is not secure. It is hard for these networks to support different ...
A wireless sensor network (WSN) consists of distributed sensors to monitor environmental conditions such as temperature, sound, vibration, pressure, motion or detect dimensions, to pass their data through the network to a base station for processing. Advantages of WSN over a wired system considered in elimination of wiring cost, sensors can be installed in harsh environments. Each sensor node is a combination of Radio transceiver with an internal antenna or connection to an external antenna micro-controller, electronic circuit for interfacing with the sensors, energy source, usually a battery or an embedded form of energy harvesting. Drawback of using sensors is having limited power to consume, a memory that is capable of performing limited computations, in addition to probability of communication failures between nodes.
Primarily a wireless sensor network is a group of spatially spread sensors which are deployed to monitor and record the physical condition of the environment and also gather data like temperature, humidity, atmospheric pressure, sound and etc. The wireless sensor networks consist a few hundred to thousand sensor nodes which include radio transceiver with an antenna, electronic circuit, a battery and a microcontroller.
We consider a wireless sensor network with N = 100 nodes distributed randomly in 100m X 100m field. A gateway node is deployed in the centre of the sensing field. The BS is located far away from the sensing field. Both gateway node and BS are stationary after deployment. We consider packet size of 4000 bits. We compare our protocol with LEACH protocol. To assess performance of our protocol with LEACH, we ignore the effects caused by signal collision and interference in the wireless channel. Table 1 shows the radio parameters used in our
The key management problem is an bigger issue in sensor field. Each and every sensor nodes are needed to transmit the node, then only the data’s are reached to base station, so each and every sensor node within a group need an keys to transmit the data. While attacker entered and also get the full access of sensor node, and ready to hack data, but they need to wait. Because the node are none of the keys at the time, transmitting time only the nodes get access of keys from the cluster head. A cluster having a variety of group in the network and each and every groups are specified using their names. All of the groups are having the number of nodes to transmit the information over the network.
De Poorter, E., Troubleyn, E., Moerman, I., & Demeester, P. (2011). IDRA: A flexible system architecture for next generation wireless sensor networks. Wireless Networks, 17(6), 1423-1440. doi:http://dx.doi.org/10.1007/s11276-011-0356-5
Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connecting to wireless from the moment they leave their home till they get to work and then back. While wireless comm...
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.