Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Wireless sensor network
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Security === Infrastructure-less architecture (i.e. no gateways are included, etc.) and inherent requirements (i.e. unattended working environment, etc.) of WSNs might pose several weak points that attract adversaries. Therefore, [[Computer security|security]] is a big concern when WSNs are deployed for special applications such as military and healthcare. Owing to their unique characteristics, traditional security methods of [[computer network]]s would be useless (or less effective) for WSNs. Hence, lack of security mechanisms would cause intrusions towards those networks. These intrusions need to be detected and mitigation methods should be applied. There have been important innovations in securing wireless sensor networks. Most wireless embedded networks use omni-directional antennas and therefore neighbors can overhear communication in and out of nodes. This was used this to develop a primitive called "''local monitoring''"<ref>{{Cite book|last1=Khalil|first1=Issa|last2=Bagchi Saurabh|last3=Shroff|first3=N.B.|title=2005 International Conference on Dependable Systems and Networks (DSN'05) |chapter=LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks |date=2005|chapter-url=https://ieeexplore.ieee.org/document/1467835/;jsessionid=uTueYYCfo53VLLpCtnVIEiKbsdRLNoemV84PvINsBCUpJ-gq63t-!-1069638242|pages=612–621|doi=10.1109/DSN.2005.58|isbn=0-7695-2282-3|s2cid=2018708}}</ref> which was used for detection of sophisticated attacks, like blackhole or wormhole, which degrade the throughput of large networks to close-to-zero. This primitive has since been used by many researchers and commercial wireless packet sniffers. This was subsequently refined for more sophisticated attacks such as with collusion, mobility, and multi-antenna, multi-channel devices.<ref>{{Cite journal|last1=Mitchell|first1=Robert|last2=Chen|first2=Ing-Ray|date=2014-04-01|title=A survey of intrusion detection in wireless network applications|url=http://www.sciencedirect.com/science/article/pii/S0140366414000280|journal=Computer Communications|language=en|volume=42|pages=1–23|doi=10.1016/j.comcom.2014.01.012|issn=0140-3664}}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)