Investigation of techniques for combating malicious objects in unreliable wireless sensor networks

Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research...

Full description

Saved in:
Bibliographic Details
Main Authors: Salami, Abdulazeez F., Bello-Salau, Habeeb, Hussaini, Mukhtar, Anwar, Farhat
Format: Book Chapter
Language:English
Published: IIUM Press 2011
Subjects:
Online Access:http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf
http://irep.iium.edu.my/21965/
http://rms.research.iium.edu.my/bookstore/default.aspx
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
id my.iium.irep.21965
record_format dspace
spelling my.iium.irep.219652019-12-30T07:05:17Z http://irep.iium.edu.my/21965/ Investigation of techniques for combating malicious objects in unreliable wireless sensor networks Salami, Abdulazeez F. Bello-Salau, Habeeb Hussaini, Mukhtar Anwar, Farhat TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively IIUM Press 2011 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf Salami, Abdulazeez F. and Bello-Salau, Habeeb and Hussaini, Mukhtar and Anwar, Farhat (2011) Investigation of techniques for combating malicious objects in unreliable wireless sensor networks. In: Research Issues in Wireless Communication Networking. IIUM Press, Kuala Lumpur, pp. 290-300. ISBN 978-967-418-149-9 http://rms.research.iium.edu.my/bookstore/default.aspx
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
topic TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
spellingShingle TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices
Salami, Abdulazeez F.
Bello-Salau, Habeeb
Hussaini, Mukhtar
Anwar, Farhat
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
description Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively
format Book Chapter
author Salami, Abdulazeez F.
Bello-Salau, Habeeb
Hussaini, Mukhtar
Anwar, Farhat
author_facet Salami, Abdulazeez F.
Bello-Salau, Habeeb
Hussaini, Mukhtar
Anwar, Farhat
author_sort Salami, Abdulazeez F.
title Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
title_short Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
title_full Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
title_fullStr Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
title_full_unstemmed Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
title_sort investigation of techniques for combating malicious objects in unreliable wireless sensor networks
publisher IIUM Press
publishDate 2011
url http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf
http://irep.iium.edu.my/21965/
http://rms.research.iium.edu.my/bookstore/default.aspx
_version_ 1654959765664563200