无线传感器网络中存在漏洞的各种路由协议综述

A. Majumdar, Debabrata Sarkar
{"title":"无线传感器网络中存在漏洞的各种路由协议综述","authors":"A. Majumdar, Debabrata Sarkar","doi":"10.1109/IEMCON.2015.7344446","DOIUrl":null,"url":null,"abstract":"Wireless Sensor Network (WSN) is made of a large number of sensor devices where the mode of communication is done over wireless media. Advancement in this field of application opens the path of availability of small and low costing sensors which are involved in different types of physical and environmental condition states, data process management and communication in the wireless media. WSN provides a large scale of sensor nodes which have transmission in the limited scale, along with their limited process, storage and energy availability through the clustering techniques, thus provides new and efficient way towards the prolonged lifetime of WSN system. It provides lot of its applications in the fields of military and health. Though the sensor networks are restricted towards resource utility, the network system becomes the open threat towards different types of traditional attacks. But the conventional techniques fail to find its way from security threats due to the limited resource availability in these types of networks. As a result of it, the security in WSN model becomes an important and challenging task in the research field due to inherited limitations of sensors itself. In this paper we are highly focused on the discussions on different type of attacking scopes in Wireless Sensor Network followed by the security description, analysis of routing protocols in terms of attacks and security goals, which concludes in some simulation results of the stated protocols with their merits and demerits.","PeriodicalId":111626,"journal":{"name":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Various types of routing protocols in Wireless Sensor Network with vulnerabilities: A review\",\"authors\":\"A. Majumdar, Debabrata Sarkar\",\"doi\":\"10.1109/IEMCON.2015.7344446\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless Sensor Network (WSN) is made of a large number of sensor devices where the mode of communication is done over wireless media. Advancement in this field of application opens the path of availability of small and low costing sensors which are involved in different types of physical and environmental condition states, data process management and communication in the wireless media. WSN provides a large scale of sensor nodes which have transmission in the limited scale, along with their limited process, storage and energy availability through the clustering techniques, thus provides new and efficient way towards the prolonged lifetime of WSN system. It provides lot of its applications in the fields of military and health. Though the sensor networks are restricted towards resource utility, the network system becomes the open threat towards different types of traditional attacks. But the conventional techniques fail to find its way from security threats due to the limited resource availability in these types of networks. As a result of it, the security in WSN model becomes an important and challenging task in the research field due to inherited limitations of sensors itself. In this paper we are highly focused on the discussions on different type of attacking scopes in Wireless Sensor Network followed by the security description, analysis of routing protocols in terms of attacks and security goals, which concludes in some simulation results of the stated protocols with their merits and demerits.\",\"PeriodicalId\":111626,\"journal\":{\"name\":\"2015 International Conference and Workshop on Computing and Communication (IEMCON)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference and Workshop on Computing and Communication (IEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMCON.2015.7344446\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference and Workshop on Computing and Communication (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMCON.2015.7344446","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

无线传感器网络(WSN)是由大量传感器设备组成的网络,其通信方式是通过无线媒体完成的。这一应用领域的进展为小型和低成本传感器的可用性开辟了道路,这些传感器涉及不同类型的物理和环境条件状态,数据处理管理和无线媒体中的通信。无线传感器网络通过聚类技术提供了在有限规模内进行传输的大规模传感器节点,以及它们有限的过程、存储和能量可用性,从而为延长无线传感器网络系统的使用寿命提供了新的有效途径。它在军事和卫生领域提供了许多应用。传感器网络虽然受到资源利用的限制,但面对不同类型的传统攻击,网络系统成为了开放的威胁。但是由于这些类型的网络资源有限,传统的技术无法找到解决安全威胁的方法。因此,由于传感器自身的局限性,无线传感器网络模型的安全性成为研究领域的一个重要而富有挑战性的课题。本文重点讨论了无线传感器网络中不同类型的攻击范围,然后进行了安全描述,从攻击和安全目标方面分析了路由协议,并对所述协议的一些仿真结果进行了总结,分析了它们的优缺点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Various types of routing protocols in Wireless Sensor Network with vulnerabilities: A review
Wireless Sensor Network (WSN) is made of a large number of sensor devices where the mode of communication is done over wireless media. Advancement in this field of application opens the path of availability of small and low costing sensors which are involved in different types of physical and environmental condition states, data process management and communication in the wireless media. WSN provides a large scale of sensor nodes which have transmission in the limited scale, along with their limited process, storage and energy availability through the clustering techniques, thus provides new and efficient way towards the prolonged lifetime of WSN system. It provides lot of its applications in the fields of military and health. Though the sensor networks are restricted towards resource utility, the network system becomes the open threat towards different types of traditional attacks. But the conventional techniques fail to find its way from security threats due to the limited resource availability in these types of networks. As a result of it, the security in WSN model becomes an important and challenging task in the research field due to inherited limitations of sensors itself. In this paper we are highly focused on the discussions on different type of attacking scopes in Wireless Sensor Network followed by the security description, analysis of routing protocols in terms of attacks and security goals, which concludes in some simulation results of the stated protocols with their merits and demerits.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信