Sensors Network: In Regard with the Security Aspect and Counter Measures

Sensors Network: In Regard with the Security Aspect and Counter Measures

Mamta Bachani, Ahsan Memon, Faisal Karim Shaikh
ISBN13: 9781799824541|ISBN10: 1799824543|EISBN13: 9781799824558
DOI: 10.4018/978-1-7998-2454-1.ch001
Cite Chapter Cite Chapter

MLA

Bachani, Mamta, et al. "Sensors Network: In Regard with the Security Aspect and Counter Measures." Sensor Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 1-21. https://doi.org/10.4018/978-1-7998-2454-1.ch001

APA

Bachani, M., Memon, A., & Shaikh, F. K. (2020). Sensors Network: In Regard with the Security Aspect and Counter Measures. In I. Management Association (Ed.), Sensor Technology: Concepts, Methodologies, Tools, and Applications (pp. 1-21). IGI Global. https://doi.org/10.4018/978-1-7998-2454-1.ch001

Chicago

Bachani, Mamta, Ahsan Memon, and Faisal Karim Shaikh. "Sensors Network: In Regard with the Security Aspect and Counter Measures." In Sensor Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1-21. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2454-1.ch001

Export Reference

Mendeley
Favorite

Abstract

This chapter aims to develop an understanding of sensor networks and the security threats posed to them, owing to the inherently insecure wireless nature. It also highlights the current security issues associated with the exchange of information and presents respective countermeasures that can be used to secure the network of malevolent behavior. It builds the reader's understanding of security threats by presenting an idealistic security mechanism and comparing it to currently practiced security mechanisms. Doing so, it identifies the security flaws in each mechanism, henceforth, enumerating a list of well-known security attacks that are connected to the respective security flaws. To provide a better understanding of security threats, the security attacks, in general, are discussed in the perspective of a network administrator, and an adversary. Their impact is also considered from the side of a network administrator and its respective benefits to the adversary. The chapter is later concluded along with future directives and an insight on requirements of forthcoming technologies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.