0% found this document useful (0 votes)
60 views1 page

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

This document analyzes security issues in wireless sensor network routing protocols. It identifies several attacks that can be adapted from other network types or are novel to sensor networks, such as sinkholes and HELLO floods. None of the major sensor network routing protocols were designed with security as a goal, and the document describes attacks that could cripple all of them. It concludes by calling for countermeasures and secure design considerations to address these vulnerabilities.

Uploaded by

alok541
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views1 page

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

This document analyzes security issues in wireless sensor network routing protocols. It identifies several attacks that can be adapted from other network types or are novel to sensor networks, such as sinkholes and HELLO floods. None of the major sensor network routing protocols were designed with security as a goal, and the document describes attacks that could cripple all of them. It concludes by calling for countermeasures and secure design considerations to address these vulnerabilities.

Uploaded by

alok541
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Abstract:
We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks sinkholes and HELLO oods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the rst such analysis of secure routing in sensor networks.

-Alok Ranjan

You might also like