Autor: |
Mahariya, Satish Kumar, Pandey, Mukesh, Malav, Anuraj, Rana, Arti, Ramnarayan, Vaqur, Musheer, Bisht, Yashwant Singh |
Předmět: |
|
Zdroj: |
AIP Conference Proceedings; 2023, Vol. 2771 Issue 1, p1-8, 8p |
Abstrakt: |
In this study we discussed Challenges and Constraints of WSN and different types of attack in the Wireless Sensor Node (WSN) networks. WSN is an ad-hoc low-cost and low-power wireless network in which sensor nodes work together to track and collect data from their surroundings before broadcasting it to other nodes. WSN's sensing and ubiquitous computational capabilities opened up a slew of new uses, expanding research opportunities. WSN has been used in a variety of settings, should include military, land, hygiene, and inventory management. Although energy is a significant factor for sensor nodes, a new form of attack has been identified that destroys the networks by draining the sensor network's battery life. This kind of power draining attack is referred to as a "Vampire attack", and it is not exclusive to any routing protocol. This study examines several strategies for detecting and mitigating this attack, which increases network energy usage, as well as principles for limiting the harm caused by vampires. [ABSTRACT FROM AUTHOR] |
Databáze: |
Complementary Index |
Externí odkaz: |
|