What is the attack in wireless sensor network?
Wormhole attack – The most devastating and complicated attack in a wireless sensor network is the Wormhole attack. In this attack, the attacker keeps track of the packets and makes a tunnel with other nodes of different communication networks, and thus the attacker passes the packets through this tunnel [21].
What are the different types of sensors present in sensor networks?
There two types of sensor networks, wired and wireless. The components of a sensor network include sensor nodes, sensors, the gateway, and a management node. The four topologies of sensor networks are point to point, star, tree, and mesh.
What is Blackhole attack?
Black-hole attacks occur when a router deletes all messages it is supposed to forward. From time to time, a router is misconfigured to offer a zero-cost route to every destination in the Internet. This causes all traffic to be sent to this router. Since no device can sustain such a load, the router fails.
Which type of attack exploits the weaknesses in the sensor network by attempting to disrupt the sensor network?
4.3 Denial of service attack. This type of attack exploits the weaknesses in the sensor network, by attempting to disrupt the sensor network. Denial of service (DoS) attack denies services to valid users [32].
Why are sensor networks different?
The topology of a wireless sensor network changes very frequently. Sensor nodes mainly use broadcast communication paradigms whereas most traditional ad hoc networks are based on point-to-point communications. Sensor nodes are limited in power, computational capabilities, and memory.
What is wormhole attack?
Wormhole attack is a severe security threat to WSNs. Wormhole attack in WSNs is one of the main attacks in which a malicious node entraps the packets from a single position in the network so that they can be tunneled to another malicious node at a far off point.
What is Hello Flood Attack?
Hello flood attack is the main attack in network layer. The Hello flood attacks can be caused by a node which broadcasts a Hello packet with very high power, so that a large number of nodes even far away in the network choose it as the parent node [4].
What is Sybil attack in WSN?
The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network.
What is node outage attack?
Node outage consists of stopping the functionality of the WSN’s components, such as a sensor node or a cluster-leader, by physically or logically damaging the network.
What is a sensor different types of sensors and their applications?
All types of sensors are further divided into analog and digital sensors. However, there are few types of sensors that are used in electronic applications such as pressure sensors, touch sensors, IR sensors, ultrasonic sensors, temperature sensors, proximity sensors, and so on.