انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

Security in WSN

Share |
الكلية كلية تكنولوجيا المعلومات     القسم قسم شبكات المعلومات     المرحلة 2
أستاذ المادة مهدي عبادي مانع الموسوي       01/06/2018 11:48:21
Wireless Sensor networks are vulnerable to security attacks due to the broadcast nature of the transmission medium
Wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected.
Basically attacks in WSN are classified as
active attacks
passive attacks

Monitor and Eavesdropping: this is the most common attack to privacy. By snooping to the data, the adversary could easily discover the communication contents
Traffic Analysis: Even when the messages transferred are encrypted, it still leaves a high possibility analysis of the communication patterns.
Camouflage Adversaries: One can insert their node or compromise the nodes to hide in the sensor network. After that these nodes can copy as a normal node to attract the packets, then misroute the packets, conducting the privacy analysis.


Active Attacks: The unauthorized attackers monitors, listens to and modifies the data stream in the communication channel are known as active attack. The attacks which act on the network layer are called routing attacks. An unprotected ad hoc routing is vulnerable to these types of attacks, as every node acts as a router, and can therefore directly affect routing information.
Create routing loops.
Extend or shorten service routes.
Generate false error messages.
Increase end-to-end latency.


المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .
الرجوع الى لوحة التحكم