Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

An overview of wireless sensor network security attacks: Mode of operation, severity and mitigation techniques (2011.06779v1)

Published 13 Nov 2020 in cs.CR and cs.NI

Abstract: Wireless Sensor Network (WSN) is the network of the future. As it gradually gains ground by transforming our lives and environments into a Smart World, it will definitely call for attention from selfish minded Attackers. The first section of this paper introduces the Wireless Sensor Network, its constraints, architecture, and mode of operation. It goes ahead to discuss the applications of WSN in health, agriculture, military, transportation, environment, industries. However, WSN automatically inherits the security challenges of the traditional network. The Network security goals which are Confidentiality, Integrity, Availability, and Authentication sometimes called the CIA of Network security is discussed with respect to WSN. This is followed by the security challenges of WSN, these challenges are categorized into two (2), Passive and Active Attacks, Passive attack is interested in the message, data or information that traverses the network without hindering the network channel or medium of communication while Active attack is interested in both the data as well as compromising and if possible shutting down the communication channel in order to hinders the smooth running of the network. In line with these security challenges, mitigation techniques are proffered to possibly prevent or lessen the severity of the attacks as its almost impossible to stop attackers from carrying out their malicious activities.

Citations (4)

Summary

We haven't generated a summary for this paper yet.