Reference Hub2
An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network

An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network

Bhavana Butani, Piyush Kumar Shukla, Sanjay Silakari
ISBN13: 9781466665590|ISBN10: 1466665599|EISBN13: 9781466665606
DOI: 10.4018/978-1-4666-6559-0.ch019
Cite Chapter Cite Chapter

MLA

Butani, Bhavana, et al. "An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network." Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, edited by Ganesh Chandra Deka and Sambit Bakshi, IGI Global, 2015, pp. 412-432. https://doi.org/10.4018/978-1-4666-6559-0.ch019

APA

Butani, B., Shukla, P. K., & Silakari, S. (2015). An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network. In G. Deka & S. Bakshi (Eds.), Handbook of Research on Securing Cloud-Based Databases with Biometric Applications (pp. 412-432). IGI Global. https://doi.org/10.4018/978-1-4666-6559-0.ch019

Chicago

Butani, Bhavana, Piyush Kumar Shukla, and Sanjay Silakari. "An Outline of Threats and Sensor Cloud Infrastructure in Wireless Sensor Network." In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, edited by Ganesh Chandra Deka and Sambit Bakshi, 412-432. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6559-0.ch019

Export Reference

Mendeley
Favorite

Abstract

Wireless sensor networks are utilized in vital situations like military and commercial applications, traffic surveillance, habitat monitoring, and many other applications. WSNs have to face various issues and challenges in terms of memory, communication, energy, computation, and storage, which require efficient management of huge amount of sensor data. Therefore, storage is an important issue in the WSN. Emergence of Sensor-Cloud infrastructure overcomes several shortcomings of WSN such as storage capacity and offers high processing capabilities for huge sensor data. Security is also the major challenge that is faced by the sensor network. This chapter includes a brief overview of the importance of cloud computing in sensor networks and the goal of DDoS and Node Capture Attack in WSN. This chapter includes descriptions of different modeling techniques of Node Capture attack and various detection and key pre-distribution schemes to invent a new technique to improve network resilience against node capture attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.