Investigation of techniques for combating malicious objects in unreliable wireless sensor networks
Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book Chapter |
Language: | English |
Published: |
IIUM Press
2011
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf http://irep.iium.edu.my/21965/ http://rms.research.iium.edu.my/bookstore/default.aspx |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English |
id |
my.iium.irep.21965 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.219652019-12-30T07:05:17Z http://irep.iium.edu.my/21965/ Investigation of techniques for combating malicious objects in unreliable wireless sensor networks Salami, Abdulazeez F. Bello-Salau, Habeeb Hussaini, Mukhtar Anwar, Farhat TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively IIUM Press 2011 Book Chapter PeerReviewed application/pdf en http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf Salami, Abdulazeez F. and Bello-Salau, Habeeb and Hussaini, Mukhtar and Anwar, Farhat (2011) Investigation of techniques for combating malicious objects in unreliable wireless sensor networks. In: Research Issues in Wireless Communication Networking. IIUM Press, Kuala Lumpur, pp. 290-300. ISBN 978-967-418-149-9 http://rms.research.iium.edu.my/bookstore/default.aspx |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English |
topic |
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices |
spellingShingle |
TK7800 Electronics. Computer engineering. Computer hardware. Photoelectronic devices Salami, Abdulazeez F. Bello-Salau, Habeeb Hussaini, Mukhtar Anwar, Farhat Investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
description |
Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you
can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military
applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on
these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the
network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectively |
format |
Book Chapter |
author |
Salami, Abdulazeez F. Bello-Salau, Habeeb Hussaini, Mukhtar Anwar, Farhat |
author_facet |
Salami, Abdulazeez F. Bello-Salau, Habeeb Hussaini, Mukhtar Anwar, Farhat |
author_sort |
Salami, Abdulazeez F. |
title |
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
title_short |
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
title_full |
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
title_fullStr |
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
title_full_unstemmed |
Investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
title_sort |
investigation of techniques for combating malicious objects in unreliable wireless sensor networks |
publisher |
IIUM Press |
publishDate |
2011 |
url |
http://irep.iium.edu.my/21965/1/Investigation_of_Techniques_for_Combating.pdf http://irep.iium.edu.my/21965/ http://rms.research.iium.edu.my/bookstore/default.aspx |
_version_ |
1654959765664563200 |