Network Layer Security Protocols in Wireless Sensor Networks
Network Layer Security Protocols in Wireless Sensor Networks
Network Layer Security Protocols in Wireless Sensor Networks
PROTOCOLS IN WIRELESS
SENSOR NETWORKS
BY:
KOSURU HAVIESH
ID:1003519
INTRODUCTION
Wireless sensor network has an enormous attention due to its low cost and
tiny size where it can be embedded everywhere. It consists of hundreds or
thousands of sensor nodes distributed in a specific geographical area. These
nodes communicate together through wireless transceivers
Wireless sensor networks are widely used in different applications, such as
traffic management, battlefield, environment monitoring
ATTACKS IN NETWORK LAYER
Def: An attacker sends or replays a routing protocols HELLO packets with more
energy. Attacks on protocols that use HELLO packets to announce to neighbors.
These protocols assume that the sender of a received packet is within normal radio
range. Can be launched by insiders and outsiders.
Effects:
Attract a lot of nodes to use the forged high-quality routes.
Leave these nodes sufficiently far away form the attacker sending packets into
oblivion.
The network is at a state of confusion.
COUNTERMEASURES
Secure routing is vital to the acceptance and use of sensor networks for many
application. Link layer encryption and authentication mechanism may be
reasonable first approximation for defense.
THANK YOU