January 2012
Intermediate to advanced
848 pages
37h 36m
English
Jun-Won Ho and Sajal K. Das
In many applications involving wireless sensor networks, the network operator usually deploys sensor nodes in unattended fashion and remotely controls them. Hence, an adversary is able to compromise sensor nodes by exploiting this unattended nature and further force the compromised nodes to launch various types of attacks such as denial-of-service attacks, routing disruption and false data injection attacks, and network service disruption attacks [1–3]. Given that compromised nodes are the main sources of attacks, an attacker may adopt the limited node compromise strategy in which he physically captures sensor nodes and extracts their ...
Read now
Unlock full access