A Taxonomy of Internal Attacks in Wireless Sensor Network

Muhammed Ahmed, Xu Huang, Dharmendra Sharma

    Research output: Contribution to journalArticle

    8 Downloads (Pure)

    Abstract

    Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.
    Original languageEnglish
    Pages (from-to)427-430
    Number of pages4
    JournalWorld Academy of Science, Engineering and Technology
    Volume6
    Issue number2
    Publication statusPublished - 2012

    Fingerprint

    Taxonomies
    Wireless sensor networks
    OSI model
    Military applications
    Network security
    Communication
    Health
    Sensors
    Costs

    Cite this

    @article{7367312839ac4971b906340ea3fae59b,
    title = "A Taxonomy of Internal Attacks in Wireless Sensor Network",
    abstract = "Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.",
    author = "Muhammed Ahmed and Xu Huang and Dharmendra Sharma",
    year = "2012",
    language = "English",
    volume = "6",
    pages = "427--430",
    journal = "World Academy of Science, Engineering and Technology",
    issn = "2010-376X",
    publisher = "World Academy of Science Engineering and Technology",
    number = "2",

    }

    A Taxonomy of Internal Attacks in Wireless Sensor Network. / Ahmed, Muhammed; Huang, Xu; Sharma, Dharmendra.

    In: World Academy of Science, Engineering and Technology, Vol. 6, No. 2, 2012, p. 427-430.

    Research output: Contribution to journalArticle

    TY - JOUR

    T1 - A Taxonomy of Internal Attacks in Wireless Sensor Network

    AU - Ahmed, Muhammed

    AU - Huang, Xu

    AU - Sharma, Dharmendra

    PY - 2012

    Y1 - 2012

    N2 - Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.

    AB - Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.

    M3 - Article

    VL - 6

    SP - 427

    EP - 430

    JO - World Academy of Science, Engineering and Technology

    JF - World Academy of Science, Engineering and Technology

    SN - 2010-376X

    IS - 2

    ER -