DocumentCode :
3355651
Title :
Security mechanisms Analysis of Wireless Sensor Networks specific Routing attacks
Author :
Su, Zhong ; Lin, Chuang ; Ren, Fengyuan ; Zhan, Xiaosu
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ.
fYear :
2006
fDate :
3-5 Aug. 2006
Firstpage :
579
Lastpage :
584
Abstract :
Secure routing is a challenging task because ad-hoc and resource constrained nature of wireless sensor networks. In this paper, we discuss several specific routing attacks, such as wormhole attack, sinkhole attack, Sybil attack, false data insert attack etc. Some security mechanisms, which are used to defend against these attacks, are analyzed. This paper also points out the open research challenges in this field
Keywords :
telecommunication network routing; telecommunication security; wireless sensor networks; routing attacks; secure routing; security mechanisms analysis; wireless sensor network; Application software; Computer science; Computer security; Data security; Delay; Pervasive computing; Pollution; Routing; Telecommunication traffic; Wireless sensor networks; Routing Attack; Security mechanism; Wireless Sensor Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing and Applications, 2006 1st International Symposium on
Conference_Location :
Urumqi
Print_ISBN :
1-4244-0326-x
Electronic_ISBN :
1-4244-0326-x
Type :
conf
DOI :
10.1109/SPCA.2006.297488
Filename :
4079059
Link To Document :
بازگشت