Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf http://irep.iium.edu.my/21965/ http://rms.research.iium.edu.my/bookstore/default.aspx |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
Summary: | Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you
can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military
applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on
these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the
network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively |
---|