Attacks in Wireless Sensor Networks

Attacks in Wireless Sensor Networks

George William Kibirige, Camilius A. Sanga
ISBN13: 9781799824541|ISBN10: 1799824543|EISBN13: 9781799824558
DOI: 10.4018/978-1-7998-2454-1.ch058
Cite Chapter Cite Chapter

MLA

Kibirige, George William, and Camilius A. Sanga. "Attacks in Wireless Sensor Networks." Sensor Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 1215-1232. https://doi.org/10.4018/978-1-7998-2454-1.ch058

APA

Kibirige, G. W. & Sanga, C. A. (2020). Attacks in Wireless Sensor Networks. In I. Management Association (Ed.), Sensor Technology: Concepts, Methodologies, Tools, and Applications (pp. 1215-1232). IGI Global. https://doi.org/10.4018/978-1-7998-2454-1.ch058

Chicago

Kibirige, George William, and Camilius A. Sanga. "Attacks in Wireless Sensor Networks." In Sensor Technology: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1215-1232. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2454-1.ch058

Export Reference

Mendeley
Favorite

Abstract

Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.