Title :
Security mechanisms Analysis of Wireless Sensor Networks specific Routing attacks
Author :
Su, Zhong ; Lin, Chuang ; Ren, Fengyuan ; Zhan, Xiaosu
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ.
Abstract :
Secure routing is a challenging task because ad-hoc and resource constrained nature of wireless sensor networks. In this paper, we discuss several specific routing attacks, such as wormhole attack, sinkhole attack, Sybil attack, false data insert attack etc. Some security mechanisms, which are used to defend against these attacks, are analyzed. This paper also points out the open research challenges in this field
Keywords :
telecommunication network routing; telecommunication security; wireless sensor networks; routing attacks; secure routing; security mechanisms analysis; wireless sensor network; Application software; Computer science; Computer security; Data security; Delay; Pervasive computing; Pollution; Routing; Telecommunication traffic; Wireless sensor networks; Routing Attack; Security mechanism; Wireless Sensor Networks;
Conference_Titel :
Pervasive Computing and Applications, 2006 1st International Symposium on
Conference_Location :
Urumqi
Print_ISBN :
1-4244-0326-x
Electronic_ISBN :
1-4244-0326-x
DOI :
10.1109/SPCA.2006.297488