|
Fake Data Termination in Wireless Sensor NetworksKeywords: Ad-hoc networks , sensor networks , attacks , security. Abstract: Wireless sensor networks are specified ad-hocnetworks. They are characterized by their limited computingpower and energy constraints because they are generally limitedin memory, power and computational ability. Thus they can onlytransmit data to a limited distance. The major challenges ofwireless sensor networks are security. This paper proposes astudy of security in this kind of network. Here a list of attackswith their specificities and vulnerabilities are presented. Basedon the location information presence of fake data can beidentified. Here a solution to terminate this fake information isdiscussed.
|